Skip to main content

Advances, Systems and Applications

Table 6 Comparison of the six log files (one for each execution round) of the third attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

Gp= 1/5

thirdstep1 –tnormal1

536.666667

559.200000

thirdstep2 –tnormal2

573.666667

1042.400000

thirdstep3 –tnormal3

688.666667

1269.000000

thirdstep4 –tnormal4

478.666667

970.600000

thirdstep5 –tnormal5

878.000000

1323.400000

thirdstep6 –tnormal6

562.333333

973.200000