Skip to main content

Advances, Systems and Applications

Table 7 Comparison of the six log files (one for each execution round) of the smurf attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

Gp= 1/5

smurfstep 1-2

3155.333333

3277.000000

smurfstep 2-3

2758.333333

2891.400000

smurfstep 3-4

3093.333333

3179.800000

smurfstep 4-5

3230.666667

3304.800000

smurfstep 5-6

2712.666667

2838.400000