|
Notation | Description |
|
| A defense configuration, including resource allocation and defending strategies on th service, where |
| 1 if the attacker achieves his goal successfully and 0 otherwise, where , |
| The proactive defense resource allocated to node , where |
| The number of VMM level purchased, where |
| The number of services that honeypot can simulate, where |
| The interactive capability of false target honeypot , where |
| The maximum throughput of fake traffic of honeypot , where |
| The cost of VMM level with VMMs, where |
| The cost of constructing a false target honeypot, where |
| The cost of constructing a fake traffic generator honeypot, where |
| The cost of constructing a honeypot equipped with false target and fake traffic functions, where |
| The budget of constructing nodes and links |
| The budget of proactive defense resource |
| The budget of reactive defense resource |
| The budget of virtualization |
| The budget of honeypots |
| The budget of reconfiguration functions |
| The total number of intermediate nodes |
| The capacity of direct link between nodes and , where , |
| The cost of constructing a link from node to node with capacity , where , |
| 1 if node is equipped with false target function and 0 otherwise, where |
| 1 if node is equipped with fake traffic generating function and 0 otherwise, where |
| 1 if node is equipped with reconfiguration function and 0 otherwise, where |
|