Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Table 2

Decision variables.

NotationDescription

A defense configuration, including resource allocation and defending strategies on th service, where
1 if the attacker achieves his goal successfully and 0 otherwise, where ,
The proactive defense resource allocated to node , where
The number of VMM level purchased, where
The number of services that honeypot can simulate, where
The interactive capability of false target honeypot , where
The maximum throughput of fake traffic of honeypot , where
The cost of VMM level with VMMs, where
The cost of constructing a false target honeypot, where
The cost of constructing a fake traffic generator honeypot, where
The cost of constructing a honeypot equipped with false target and fake traffic functions, where
The budget of constructing nodes and links
The budget of proactive defense resource
The budget of reactive defense resource
The budget of virtualization
The budget of honeypots
The budget of reconfiguration functions
The total number of intermediate nodes
The capacity of direct link between nodes and , where ,
The cost of constructing a link from node to node with capacity , where ,
1 if node is equipped with false target function and 0 otherwise, where
1 if node is equipped with fake traffic generating function and 0 otherwise, where
1 if node is equipped with reconfiguration function and 0 otherwise, where