Fig. 2From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationNIDS types (no reference, it is our conclusion)Back to article page