Skip to main content

Advances, Systems and Applications

Table 8 Comparison of the six log files (one for each execution round) of the smurf attack step for Gp equal to 1/3 and 1/5

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

Gp= 1/5

smurfstep1 –smnormal1

217.000000

443.600000

smurfstep2 –smnormal2

176.666667

403.400000

smurfstep3 –smnormal3

641.333333

791.600000

smurfstep4 –smnormal4

695.666667

922.400000

smurfstep5 –smnormal5

106.000000

265.000000

smurfstep6 –smnormal6

738.333333

1052.800000