Research Article

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Figure 1

The differences of adversarial example generate process between IDS and computer vision.