Research Article

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Algorithm 1

Reservoir sampling algorithm.
Input: , , where is the sample set, is the sample size, and is the number of samples
Output: , where R is the set of sampling results
(1)set
(2)fordo
(3)   random integer between
(4)  ifthen
(5)   
(6)  end if
(7)end for
(8)return