Hacker Simulation and Strategic Monitoring