Research Article
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models
Figure 3
The confusion matrix of the target model. (a) The confusion matrix of the original traffic data. (b) The confusion matrix of the adversarial examples.
(a) |
(b) |