Research Article

Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment

Figure 5

The figure plot depicts the changing trend of the CPU when the system is underattacked or invaded.