Figure 5From: Intrusion detection and Big Heterogeneous Data: a SurveyAn enterprise security monitoring reference architecture [[75]].Back to article page