Research Article
Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
Box 2
Problem description.
Given | (1) all possible defense configurations set, including defense resource allocation and defending strategies, | (2) all possible attack configurations set, including attacker attributes, strategies, and selection criterion, | (3) the total attack times on each service. | Objective | to minimize the service compromised probability of the target network. | Subject to | (1) budget constrain for both the defender and attackers, | (2) the minimum QoS requirement for legitimate users. | To determine | the effective defense strategies to allocate resources. |
|