(1) all possible defense configurations set, including defense resource allocation and defending strategies,
(2) all possible attack configurations set, including attacker attributes, strategies, and selection criterion,
(3) the total attack times on each service.
to minimize the service compromised probability of the target network.
Subject to
(1) budget constrain for both the defender and attackers,
(2) the minimum QoS requirement for legitimate users.
To determine
the effective defense strategies to allocate resources.
Box 2: Problem description.