|
Notation | Description |
|
| The index set of all nodes |
| The index set of all core nodes |
| The index set of all links |
| The index set of all levels of virtual machine monitors (VMMs) |
| The index set of all types of honeypots |
| The index set of candidate nodes equipped with false target function |
| The index set of candidate nodes equipped with fake traffic generating function |
| The index set of candidate nodes equipped with false target and fake traffic generating function |
| The index set of all kinds of services |
| The defender’s total budget |
| The cost of constructing one intermediate node |
| The cost of constructing one core node |
| The cost of each virtual machine (VM) |
| The maximum number of virtual machines on VMM level , where |
| The weight of th service, where |
| All possible defense configurations, including resources allocation and defending strategies |
| All possible attack configurations, including attacker attributes, strategies, and transition rules |
| An attack configuration, including the attributes, strategies, and transition rules of the attacker launches th attack on th service, where , |
| The total attacking times on th service for all attackers, where |
| The cost of constructing a reconfiguration function to one node |
| The minimum number of hops from core node attackers can start to compromise |
| The number of hops from core node category i attackers starts to compromise, where |
|