Research Article
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models
Figure 6
The recall rate of the KDD99 dataset and its adversarial examples. (a) The recall rate of the original network flow data. (b) The recall rate of the network flow adversarial example.
(a) |
(b) |