Research Article

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Figure 9

The effect of step size on black-box attack.