Adversarial challenges and defenses in ml-driven cybersecurity systems