Research Article

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Table 1

Notations and terminology used in this paper.

Notations and symbolsDescription

The original data
The class that is labeled by the machine learning model
The adversarial example
The label of the adversarial examples
The loss function
The noise that is added to the original data
The parameters of the machine learning model
The target machine learning model or deep learning model
The substitute model
The constraint vector of the perturbation
The influence coefficients vector of the features
The step size of the perturbation in the single iteration