The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones