Skip to main content

Advances, Systems and Applications

Table 2 Comparison of the six log files (one for each execution round) of the first attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

Gp= 1/5

firststep1 –fnormal1

571.333333

630.800000

firststep2 –fnormal2

1180.666667

1261.400000

firststep3 –fnormal3

1162.666667

1227.800000

firststep4 –fnormal4

1107.666667

1189.000000

firststep5 –fnormal5

1198.000000

1261.200000

firststep6 –fnormal6

144.000000

247.000000