Research Article

An Effective Fault-Tolerant Intrusion Detection System under Distributed Environment

Figure 5

System monitoring function diagram.