Copyright
(a) traditional static models cannot cope with dynamics of network data,
(b) model predictions often lack explainability, impeding successful deployability in practice,
© systems that aim at detecting network attacks are faced with a highly adversarial environment, and
(d) detectors developed in the past frequently relied on information that is not available for encrypted traffic.