Figure 2From: Intrusion detection and Big Heterogeneous Data: a SurveySuggested network topology for Big Data analytics [[43]].Back to article page