Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers.
Tzong-Jye LiuPublished in: Comput. J. (2024)
Keyphrases
- training set
- network intrusion detection systems
- intrusion detection
- intrusion detection system
- network intrusion
- decision trees
- classification accuracy
- active learning
- training data
- network intrusion detection
- multi agent
- network security
- supervised learning
- flow patterns
- fraud detection
- flow field
- information retrieval
- anomaly detection
- data analysis
- cost sensitive
- data mining techniques
- e government
- data mining