Research Article

Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment

Figure 2

Structure of the intrusion detection model.