Investigating the practicality of adversarial evasion attacks on network intrusion detection.
Mohamed Amine MerzoukFrédéric CuppensNora Boulahia-CuppensReda YaichPublished in: Ann. des Télécommunications (2022)
Keyphrases
- network intrusion detection
- network intrusion
- network attacks
- network anomaly detection
- network traffic data
- countermeasures
- network intrusions
- intrusion detection
- anomaly detection
- fraud detection
- intrusion detection system
- artificial immune
- information security
- network traffic
- network security
- data sets
- electronic commerce
- data mining techniques