Defense When Faced With Persistent Hacker Task