Fig. 1From: Classifying malware attacks in IaaS cloud environmentsA generic cloud scenario showing every actor, namely the EE, the CP, and the VM, as source or target of attack. Dashed red arrows represent a VM being a target and blue arrows represent a VM being source of attacks. Dotted arrows represent directions of attacks that do not involve VMsBack to article page