Research Article

An Effective Fault-Tolerant Intrusion Detection System under Distributed Environment

Figure 6

Alarm service flow chart.