
Notation  Description 

 The index set of all nodes 
 The index set of all core nodes 
 The index set of all links 
 The index set of all levels of virtual machine monitors (VMMs) 
 The index set of all types of honeypots 
 The index set of candidate nodes equipped with false target function 
 The index set of candidate nodes equipped with fake traffic generating function 
 The index set of candidate nodes equipped with false target and fake traffic generating function 
 The index set of all kinds of services 
 The defender’s total budget 
 The cost of constructing one intermediate node 
 The cost of constructing one core node 
 The cost of each virtual machine (VM) 
 The maximum number of virtual machines on VMM level , where 
 The weight of th service, where 
 All possible defense configurations, including resources allocation and defending strategies 
 All possible attack configurations, including attacker attributes, strategies, and transition rules 
 An attack configuration, including the attributes, strategies, and transition rules of the attacker launches th attack on th service, where , 
 The total attacking times on th service for all attackers, where 
 The cost of constructing a reconfiguration function to one node 
 The minimum number of hops from core node attackers can start to compromise 
 The number of hops from core node category i attackers starts to compromise, where 
