Skip to main content

Advances, Systems and Applications

Table 4 Comparison of the six log files (one for each execution round) of the second attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison Gp= 1/3 Gp= 1/5
secondstep1 –snormal1 171.333333 174.400000
secondstep2 –snormal2 452.333333 889.200000
secondstep3 –snormal3 1004.666667 1343.800000
secondstep4 –snormal4 562.000000 977.600000
secondstep5 –snormal5 787.000000 1123.400000
secondstep6 –snormal6 595.000000 1051.800000