SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 150 of 800 papers

TitleStatusHype
CyberRAG: An agentic RAG cyber attack classification and reporting tool0
Detection of Cyber Attack in Network using Machine Learning Techniques.0
Generative Adversarial Evasion and Out-of-Distribution Detection for UAV Cyber-Attacks0
Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis0
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs0
Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS20170
Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT0
On the Performance of Cyber-Biomedical Features for Intrusion Detection in Healthcare 5.00
A Lightweight IDS for Early APT Detection Using a Novel Feature Selection Method0
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation0
Are Trees Really Green? A Detection Approach of IoT Malware Attacks0
Fuse and Federate: Enhancing EV Charging Station Security with Multimodal Fusion and Federated Learning0
Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning0
A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges0
A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT0
INSIGHT: A Survey of In-Network Systems for Intelligent, High-Efficiency AI and Topology Optimization0
Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications0
A Robust PPO-optimized Tabular Transformer Framework for Intrusion Detection in Industrial IoT SystemsCode0
A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles0
Neuromorphic Mimicry Attacks Exploiting Brain-Inspired Computing for Covert Cyber Intrusions0
SecCAN: An Extended CAN Controller with Embedded Intrusion DetectionCode0
CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model for Complex and Imbalanced Data0
Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded Intrusion Detection on the EdgeCode0
A Survey of Learning-Based Intrusion Detection Systems for In-Vehicle Network0
Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning0
Self-Supervised Transformer-based Contrastive Learning for Intrusion Detection SystemsCode0
Simultaneous Intrusion Detection and Localization Using ISAC Network0
Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced DatasetsCode0
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems0
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability0
Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking0
Smart Water Security with AI and Blockchain-Enhanced Digital Twins0
A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems0
Simplified and Secure MCP Gateways for Enterprise AI IntegrationCode1
Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization0
Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics0
Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security0
FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection0
Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs0
Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network Security0
Deep Learning-based Intrusion Detection Systems: A Survey0
Hybrid Temporal Differential Consistency Autoencoder for Efficient and Sustainable Anomaly Detection in Cyber-Physical Systems0
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems0
CO-DEFEND: Continuous Decentralized Federated Learning for Secure DoH-Based Threat DetectionCode0
Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries0
Integrated LLM-Based Intrusion Detection with Secure Slicing xApp for Securing O-RAN-Enabled Wireless Network Deployments0
Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems0
Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture0
Payload-Aware Intrusion Detection with CMAE and Large Language Models0
Robust Intrusion Detection System with Explainable Artificial Intelligence0
Show:102550
← PrevPage 1 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified