no code implementations • 10 Mar 2021 • Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici
Prior research on bypassing NIDSs has mainly focused on perturbing the features extracted from the attack traffic to fool the detection system, however, this may jeopardize the attack's functionality.