Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Figure 2

Sample network and resource allocation scheme.
518213.fig.002