Research Article

An Effective Fault-Tolerant Intrusion Detection System under Distributed Environment

Figure 7

Schematic diagram of TCP network connection number when system is attacked.