Skip to main content

Advances, Systems and Applications

Table 9 Comparison of the two log files for each attack step with normal execution with a large amount of network operations for Gp equal to 1/3

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison

Gp= 1/3

firststep1 –fnormal1

422.000000

firststep2 –fnormal2

449.000000

secondstep1 –snormal1

529.666667

secondstep2 –snormal2

556.333333

thirdstep1 –snormal1

218.666667

thirdstep2 –snormal2

259.666667

smurfstep1-smnormal1

126.333333

smurfstep2-smnormal2

211.666667