Research Article
Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
Box 1
Problem assumptions.
(1) Attackers only have incomplete information. | (2) The defender only has incomplete information regarding the network since there are unaware vulnerabilities. | (3) A service is provided by multiple core nodes. | (4) Each service has different weights. | (5) One virtual machine only provides one service. | (6) Only malicious nodal attacks are considered. | (7) The compromise probability of a target node is determined by the Contest Success Function (CSF). |
|