Research Article

Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment

Figure 2

MapReduce processing.