Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Box 2

Problem description.
Given
(1) all possible defense configurations set, including defense resource allocation and defending strategies,
(2) all possible attack configurations set, including attacker attributes, strategies, and selection criterion,
(3) the total attack times on each service.
Objective
to minimize the service compromised probability of the target network.
Subject to
(1) budget constrain for both the defender and attackers,
(2) the minimum QoS requirement for legitimate users.
To determine
the effective defense strategies to allocate resources.