Fig. 6From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationBig data proposed model for IDS optimization [17, 18]Back to article page