SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 251275 of 800 papers

TitleStatusHype
KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation0
Strategic Deployment of Honeypots in Blockchain-based IoT Systems0
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities0
StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems0
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS0
Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection0
Large Language Models for Cyber Security: A Systematic Literature Review0
Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles0
Triadic-OCD: Asynchronous Online Change Detection with Provable Robustness, Optimality, and Convergence0
Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems0
Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study0
Feature Distribution Shift Mitigation with Contrastive Pretraining for Intrusion Detection0
LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems0
Intrusion Detection at Scale with the Assistance of a Command-line Language Model0
Integrating Graph Neural Networks with Scattering Transform for Anomaly Detection0
Privacy-Preserving Intrusion Detection using Convolutional Neural Networks0
Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach0
An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks0
Dealing with Imbalanced Classes in Bot-IoT Dataset0
A Transformer-Based Framework for Payload Malware Detection and Classification0
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice0
EG-ConMix: An Intrusion Detection Method based on Graph Contrastive Learning0
Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems0
Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis0
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats0
Show:102550
← PrevPage 11 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified