Figure 1From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments Test-bed environment. Back to article page