Research Article

Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment

Figure 3

The figure plot showing the trend of the CPU index (Server 1).