Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 2 Comparison of the six log files (one for each execution round) of the first attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison Gp= 1/3 Gp= 1/5
firststep1 –fnormal1 571.333333 630.800000
firststep2 –fnormal2 1180.666667 1261.400000
firststep3 –fnormal3 1162.666667 1227.800000
firststep4 –fnormal4 1107.666667 1189.000000
firststep5 –fnormal5 1198.000000 1261.200000
firststep6 –fnormal6 144.000000 247.000000