Skip to main content

Advances, Systems and Applications

Table 5 Comparison of the six log files (one for each execution round) of the third attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

Gp= 1/5

thirdstep 1-2

2024.000000

2776.000000

thirdstep 2-3

2739.666667

3691.000000

thirdstep 3-4

2486.666667

3447.000000

thirdstep 4-5

3226.000000

4222.800000

thirdstep 5-6

3129.333333

4140.600000