Research Article
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
Table 1
Description of the log entry.
| Field | Description |
| 199.120.110.21 | Client ip address | %l | Requested information | %u | User id | %t | Time format | Get images | Request for logo protocol | %b | Status code |
|
|