
Notation  Description 

 A defense configuration, including resource allocation and defending strategies on th service, where 
 1 if the attacker achieves his goal successfully and 0 otherwise, where , 
 The proactive defense resource allocated to node , where 
 The number of VMM level purchased, where 
 The number of services that honeypot can simulate, where 
 The interactive capability of false target honeypot , where 
 The maximum throughput of fake traffic of honeypot , where 
 The cost of VMM level with VMMs, where 
 The cost of constructing a false target honeypot, where 
 The cost of constructing a fake traffic generator honeypot, where 
 The cost of constructing a honeypot equipped with false target and fake traffic functions, where 
 The budget of constructing nodes and links 
 The budget of proactive defense resource 
 The budget of reactive defense resource 
 The budget of virtualization 
 The budget of honeypots 
 The budget of reconfiguration functions 
 The total number of intermediate nodes 
 The capacity of direct link between nodes and , where , 
 The cost of constructing a link from node to node with capacity , where , 
 1 if node is equipped with false target function and 0 otherwise, where 
 1 if node is equipped with fake traffic generating function and 0 otherwise, where 
 1 if node is equipped with reconfiguration function and 0 otherwise, where 
