Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors.
Hangsheng ZhangDongqi HanYinlong LiuZhiliang WangJiyan SunShangyuan ZhuangJiqiang LiuJinsong DongPublished in: CoRR (2024)
Keyphrases
- network intrusion
- network intrusion detection
- intrusion detection
- network security
- anomaly detection
- maximum likelihood
- fraud detection
- network intrusion detection systems
- negative selection algorithm
- network traffic
- object detection
- intrusion detection system
- multi agent
- computer networks
- classification accuracy
- data model
- similarity measure
- image sequences
- clustering algorithm
- information retrieval