Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Table 1

Given parameters.

NotationDescription

The index set of all nodes
The index set of all core nodes
The index set of all links
The index set of all levels of virtual machine monitors (VMMs)
The index set of all types of honeypots
The index set of candidate nodes equipped with false target function
The index set of candidate nodes equipped with fake traffic generating function
The index set of candidate nodes equipped with false target and fake traffic generating function
The index set of all kinds of services
The defender’s total budget
The cost of constructing one intermediate node
The cost of constructing one core node
The cost of each virtual machine (VM)
The maximum number of virtual machines on VMM level , where
The weight of th service, where
All possible defense configurations, including resources allocation and defending strategies
All possible attack configurations, including attacker attributes, strategies, and transition rules
An attack configuration, including the attributes, strategies, and transition rules of the attacker launches th attack on th service, where ,
The total attacking times on th service for all attackers, where
The cost of constructing a reconfiguration function to one node
The minimum number of hops from core node attackers can start to compromise
The number of hops from core node category i attackers starts to compromise, where