Research Article

Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment

Figure 1

The structure diagram of the distributed intrusion detection system.