Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against m...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2013-01-01
|
| Series: | Journal of Applied Mathematics |
| Online Access: | http://dx.doi.org/10.1155/2013/518213 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850178185922084864 |
|---|---|
| author | Frank Yeong-Sung Lin Yu-Shun Wang Ming-Yang Huang |
| author_facet | Frank Yeong-Sung Lin Yu-Shun Wang Ming-Yang Huang |
| author_sort | Frank Yeong-Sung Lin |
| collection | DOAJ |
| description | Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances. |
| format | Article |
| id | doaj-art-c4e48c2e3ad4415d99a65a63b5f0a6c3 |
| institution | OA Journals |
| issn | 1110-757X 1687-0042 |
| language | English |
| publishDate | 2013-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | Journal of Applied Mathematics |
| spelling | doaj-art-c4e48c2e3ad4415d99a65a63b5f0a6c32025-08-20T02:18:47ZengWileyJournal of Applied Mathematics1110-757X1687-00422013-01-01201310.1155/2013/518213518213Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized HoneynetFrank Yeong-Sung Lin0Yu-Shun Wang1Ming-Yang Huang2Department of Information Management, National Taiwan University, Taipei, TaiwanDepartment of Information Management, National Taiwan University, Taipei, TaiwanDepartment of Information Management, National Taiwan University, Taipei, TaiwanVirtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.http://dx.doi.org/10.1155/2013/518213 |
| spellingShingle | Frank Yeong-Sung Lin Yu-Shun Wang Ming-Yang Huang Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet Journal of Applied Mathematics |
| title | Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet |
| title_full | Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet |
| title_fullStr | Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet |
| title_full_unstemmed | Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet |
| title_short | Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet |
| title_sort | effective proactive and reactive defense strategies against malicious attacks in a virtualized honeynet |
| url | http://dx.doi.org/10.1155/2013/518213 |
| work_keys_str_mv | AT frankyeongsunglin effectiveproactiveandreactivedefensestrategiesagainstmaliciousattacksinavirtualizedhoneynet AT yushunwang effectiveproactiveandreactivedefensestrategiesagainstmaliciousattacksinavirtualizedhoneynet AT mingyanghuang effectiveproactiveandreactivedefensestrategiesagainstmaliciousattacksinavirtualizedhoneynet |