Figure 2From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments Time periods for the execution of the three attack steps and the respective time periods that the system was kept in normal state. Back to article page