Skip to main content

Advances, Systems and Applications

Table 1 Comparison of the six log files (one for each execution round) of the first attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

Gp= 1/5

firststep 1-2

1697.000000

1783.800000

firststep 2-3

2065.000000

2160.600000

firststep 3-4

2116.333333

2212.600000

firststep 4-5

1825.000000

1939.400000

firststep 5-6

1805.333333

1898.600000