Skip to main content

Advances, Systems and Applications

Table 3 Comparison of the six log files (one for each execution round) of the second attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

Gp= 1/5

secondstep 1-2

2419.333333

3103.000000

secondstep 2-3

1870.666667

2662.200000

secondstep 3-4

1907.666667

2816.600000

secondstep 4-5

2477.333333

3276.600000

secondstep 5-6

1668.000000

2351.200000