Adversary simulation using a security twin represents a paradigm shift in proactive cybersecurity, moving beyond static vulnerability scanning to dynamic, behavioral risk assessment. Unlike standard simulations, a security twin ensures fidelity as the twin is synchronized with the live environment. This paper presents a quantitative comparison of four strategies an attacker may use to build intrusions: Greedy Value, Max Probability, Stealth, and Random. The simulations are executed on a security twin of a university network, constructed by the NOTLINE platform. We introduce a novel two-phase Monte Carlo simulation methodology to ensure both the exhaustive discovery of attack paths and the statistical convergence of performance metrics. Our experiments evaluate each strategy under three distinct defensive postures. Results confirm a quantifiable trade-off between the time of an intrusion and detection probability: while aggressive strategies are up to 50% faster, stealth-oriented approaches achieve comparable success rates in high-security environments by evading detection. We further discuss threats to validity related to network scale and modelling abstractions.

Evaluating Adversary Strategies Through a Security Twin

Fabrizio Baiardi
;
Vincenzo Sammartino
;
Salvatore Ruggieri
2026-01-01

Abstract

Adversary simulation using a security twin represents a paradigm shift in proactive cybersecurity, moving beyond static vulnerability scanning to dynamic, behavioral risk assessment. Unlike standard simulations, a security twin ensures fidelity as the twin is synchronized with the live environment. This paper presents a quantitative comparison of four strategies an attacker may use to build intrusions: Greedy Value, Max Probability, Stealth, and Random. The simulations are executed on a security twin of a university network, constructed by the NOTLINE platform. We introduce a novel two-phase Monte Carlo simulation methodology to ensure both the exhaustive discovery of attack paths and the statistical convergence of performance metrics. Our experiments evaluate each strategy under three distinct defensive postures. Results confirm a quantifiable trade-off between the time of an intrusion and detection probability: while aggressive strategies are up to 50% faster, stealth-oriented approaches achieve comparable success rates in high-security environments by evading detection. We further discuss threats to validity related to network scale and modelling abstractions.
File in questo prodotto:
File Dimensione Formato  
Paper_Adversary_Strategies__DIGITA26_ (1).pdf

accesso aperto

Tipologia: Documento in Post-print
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 193 kB
Formato Adobe PDF
193 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/1345229
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact