Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 5 Comparison of the six log files (one for each execution round) of the third attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison Gp= 1/3 Gp= 1/5
thirdstep 1-2 2024.000000 2776.000000
thirdstep 2-3 2739.666667 3691.000000
thirdstep 3-4 2486.666667 3447.000000
thirdstep 4-5 3226.000000 4222.800000
thirdstep 5-6 3129.333333 4140.600000