Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Figure 1

Explanations of Components.
518213.fig.001