Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 3 Comparison of the six log files (one for each execution round) of the second attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison Gp= 1/3 Gp= 1/5
secondstep 1-2 2419.333333 3103.000000
secondstep 2-3 1870.666667 2662.200000
secondstep 3-4 1907.666667 2816.600000
secondstep 4-5 2477.333333 3276.600000
secondstep 5-6 1668.000000 2351.200000