Crafting Adversarial Example to Bypass Flow-&ML- based Botnet Detector via RL.
Junnan WangQixu LiuDi WuYing DongXiang CuiPublished in: RAID (2021)
Keyphrases
- reinforcement learning
- maximum likelihood
- multi agent
- peer to peer
- flow patterns
- flow field
- learning process
- function approximation
- state space
- temporal difference
- denial of service attacks
- data sets
- markov random field
- detection algorithm
- monte carlo
- network traffic
- learning classifier systems
- action selection
- ddos attacks
- interest point detectors