Figure 3From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments Time periods for the execution of the smurf attack and the respective time periods that the system was kept in normal state. Back to article page