Research Article

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Figure 6

The recall rate of the KDD99 dataset and its adversarial examples. (a) The recall rate of the original network flow data. (b) The recall rate of the network flow adversarial example.
(a)
(b)