Figure 8From: Intrusion detection and Big Heterogeneous Data: a SurveyHierarchical CIDS architecture [[9]].Back to article page