Research Article

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Figure 7

The recall rate of the CSE-CIC-IDS2018 dataset and its adversarial examples. (a) The recall rate of the original traffic data. (b) The recall rate of the traffic adversarial example.
(a)
(b)