Research Article
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models
Algorithm 1
Reservoir sampling algorithm.
| Input: , , where is the sample set, is the sample size, and is the number of samples | | Output: , where R is the set of sampling results | (1) | set | (2) | fordo | (3) | random integer between | (4) | ifthen | (5) | | (6) | end if | (7) | end for | (8) | return |
|