Figure 7From: Handling compromised components in an IaaS cloud installation Discarding messages to/from the compromised node. Back to article page