Table 20 Comparison core criteria.

From: Mathematical modeling of adaptive information security strategies using composite behavior models

Criterion

Description

Adaptability

Ability to update defense strategies dynamically in respect to evolving attacks

Prediction accuracy

Correctness in identifying malicious vs. benign activities

Computational efficiency

Resource consumption, including processing time and memory overhead, during adaptation and detection

Robustness to noice and evasion

Sustained performance under noisy data and a stealthy attack attempt

Scalability

Capability to handle large-scale network data and complex attack scenarios