Figure 4From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environmentsGraph depicting similarity between attacks and between attacks and normal system state for gp 1/3 and 1/5 respectively. Lower gp offers greater similarity.Back to article page