Enabling The Design And Evaluation of Autonomous Network Attackers And Defenders