Skip to main content

Advances, Systems and Applications

Table 9 Comparison of the two log files for each attack step with normal execution with a large amount of network operations for Gp equal to 1/3

From: If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Log file comparison Gp= 1/3
firststep1 –fnormal1 422.000000
firststep2 –fnormal2 449.000000
secondstep1 –snormal1 529.666667
secondstep2 –snormal2 556.333333
thirdstep1 –snormal1 218.666667
thirdstep2 –snormal2 259.666667
smurfstep1-smnormal1 126.333333
smurfstep2-smnormal2 211.666667