Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Table 4

Environment Parameters.

Testing platform

Programming languageC
CompilerGNU GCC 4.6.2
Total evaluation times60,000
Distributions applied to describe attackers’ attributesNormal distribution