Deploying intrusion detection systems is essential for every modern company, in order to defend against attackers. In the previous chapters, we learned how to build machine learning, based intrusion detection systems. Now, it is time to learn how to bypass these systems with adversarial learning; to defend your systems, you need to learn how to attack them first.
In this chapter, we will cover the following:
- Adversarial machine learning algorithms
- Machine learning threat models
- Evading intrusion detection systems with adversarial network systems