Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Figure 14

Service compromised probability of aggressive attacker under circumstance.
518213.fig.0014