Skip to main content

Advances, Systems and Applications

Table 4 Comparison of the six log files (one for each execution round) of the second attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

Gp= 1/5

secondstep1 –snormal1

171.333333

174.400000

secondstep2 –snormal2

452.333333

889.200000

secondstep3 –snormal3

1004.666667

1343.800000

secondstep4 –snormal4

562.000000

977.600000

secondstep5 –snormal5

787.000000

1123.400000

secondstep6 –snormal6

595.000000

1051.800000