This paper is structured as follows: section II discusses the common security solutions for addressing hacking. Section III examines scanning properties. The active defense system is explained in section IV. Section V provides a security analysis of the defense system using threat trees on a Windows system. Section VI concludes this paper.