Table 3. Comparison of ID/PS Methods and Features

From

Big Data in Intrusion Detection Systems and Intrusion Prevention Systems

Lidong Wang

Journal of Computer Networks. 2017, 4(1), 48-55 doi:10.12691/jcn-4-1-5