Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against m...

Full description

Saved in:
Bibliographic Details
Main Authors: Frank Yeong-Sung Lin, Yu-Shun Wang, Ming-Yang Huang
Format: Article
Language:English
Published: Wiley 2013-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2013/518213
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850178185922084864
author Frank Yeong-Sung Lin
Yu-Shun Wang
Ming-Yang Huang
author_facet Frank Yeong-Sung Lin
Yu-Shun Wang
Ming-Yang Huang
author_sort Frank Yeong-Sung Lin
collection DOAJ
description Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.
format Article
id doaj-art-c4e48c2e3ad4415d99a65a63b5f0a6c3
institution OA Journals
issn 1110-757X
1687-0042
language English
publishDate 2013-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-c4e48c2e3ad4415d99a65a63b5f0a6c32025-08-20T02:18:47ZengWileyJournal of Applied Mathematics1110-757X1687-00422013-01-01201310.1155/2013/518213518213Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized HoneynetFrank Yeong-Sung Lin0Yu-Shun Wang1Ming-Yang Huang2Department of Information Management, National Taiwan University, Taipei, TaiwanDepartment of Information Management, National Taiwan University, Taipei, TaiwanDepartment of Information Management, National Taiwan University, Taipei, TaiwanVirtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.http://dx.doi.org/10.1155/2013/518213
spellingShingle Frank Yeong-Sung Lin
Yu-Shun Wang
Ming-Yang Huang
Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
Journal of Applied Mathematics
title Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
title_full Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
title_fullStr Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
title_full_unstemmed Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
title_short Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
title_sort effective proactive and reactive defense strategies against malicious attacks in a virtualized honeynet
url http://dx.doi.org/10.1155/2013/518213
work_keys_str_mv AT frankyeongsunglin effectiveproactiveandreactivedefensestrategiesagainstmaliciousattacksinavirtualizedhoneynet
AT yushunwang effectiveproactiveandreactivedefensestrategiesagainstmaliciousattacksinavirtualizedhoneynet
AT mingyanghuang effectiveproactiveandreactivedefensestrategiesagainstmaliciousattacksinavirtualizedhoneynet