Research Article

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Figure 3

The confusion matrix of the target model. (a) The confusion matrix of the original traffic data. (b) The confusion matrix of the adversarial examples.
(a)
(b)