Research Article
A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification
Table 2
Notations of attack model.
| Notation | Description | Remark |
| | Network traffic observed by attackers | | | Feature set of traffic | | | Application type set corresponding to network traffic | | | Classification function of the classification model | Input value is traffic , output value is the probability of the th application type in application set C |
|
|