Fig. 1From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationIDS types [2]Back to article page