Research Article
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models
Figure 7
The recall rate of the CSE-CIC-IDS2018 dataset and its adversarial examples. (a) The recall rate of the original traffic data. (b) The recall rate of the traffic adversarial example.
(a) |
(b) |