Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 1 Comparison of the six log files (one for each execution round) of the first attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison Gp= 1/3 Gp= 1/5
firststep 1-2 1697.000000 1783.800000
firststep 2-3 2065.000000 2160.600000
firststep 3-4 2116.333333 2212.600000
firststep 4-5 1825.000000 1939.400000
firststep 5-6 1805.333333 1898.600000