Table 13 Simulation parameter settings.
From: Mathematical modeling of adaptive information security strategies using composite behavior models
Parameter | Description | Value/range | Source/notes |
|---|---|---|---|
Number of attacker sub-models (m) | Number of distinct attacker behavior patterns | 4 | Kill chain stages28 |
Number of defender sub-models (n) | Number of adaptive defender policies | 3 | Anomaly detection, firewall, resource allocation |
Simulation duration | Total simulation timesteps per run | 10,000 | Reflecting several hours of operation |
Transition probabilities (attack) | State transition matrix values for attacker phases | Empirical ranges 0.2 to 0.8 | Derived from KDD’99 data analysis29 |
Adaptation learning rates | Defender adaptation step size for learning algorithms | 0.01 to 0.1 | Tuned per pilot experiments |
Observation noise level | Standard deviation of Gaussian noise in system observations | 0.05 to 0.15 | Models sensor inaccuracies |
Attack intensity | Probability/strength of attacker actions per timestep | 0.3–0.7 | Calibrated from UNSW-NB1530 |
Defender resource limits | Maximum computational or network defense resources | 100 units | System constraint modeling |