Skip to main content

Advances, Systems and Applications

Table 8 Comparison of the six log files (one for each execution round) of the smurf attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison Gp= 1/3 Gp= 1/5
smurfstep1 –smnormal1 217.000000 443.600000
smurfstep2 –smnormal2 176.666667 403.400000
smurfstep3 –smnormal3 641.333333 791.600000
smurfstep4 –smnormal4 695.666667 922.400000
smurfstep5 –smnormal5 106.000000 265.000000
smurfstep6 –smnormal6 738.333333 1052.800000