SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 501550 of 800 papers

TitleStatusHype
PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning0
Past, Present, Future: A Comprehensive Exploration of AI Use Cases in the UMBRELLA IoT Testbed0
Payload-Aware Intrusion Detection with CMAE and Large Language Models0
PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments0
Pelican: A Deep Residual Network for Network Intrusion Detection0
Performance Analysis of a Foreground Segmentation Neural Network Model0
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection0
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System0
Performance Evaluation of Machine Learning Techniques for DoS Detection in Wireless Sensor Network0
PIDNet: An Efficient Network for Dynamic Pedestrian Intrusion Detection0
Planning Landmark Based Goal Recognition Revisited: Does Using Initial State Landmarks Make Sense?0
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour0
PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning0
Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis0
PowerRadio: Manipulate Sensor Measurementvia Power GND Radiation0
PPT-GNN: A Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security0
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward0
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS0
Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System (ICS) Environment0
Predicting Network Attacks Using Ontology-Driven Inference0
Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets0
Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection0
Privacy-Preserving Intrusion Detection using Convolutional Neural Networks0
Probabilistic Modeling for Novelty Detection with Applications to Fraud Identification0
Protection of an information system by artificial intelligence: a three-phase approach based on behaviour analysis to detect a hostile scenario0
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks0
PyOD 2: A Python Library for Outlier Detection with LLM-powered Model Selection0
Quantised Neural Network Accelerators for Low-Power IDS in Automotive Networks0
Rallying Adversarial Techniques against Deep Learning for Network Security0
RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks0
Real-time Network Intrusion Detection via Decision Transformers0
Real-time Regular Expression Matching0
Real-Time Zero-Day Intrusion Detection System for Automotive Controller Area Network on FPGAs0
Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach0
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection0
REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response0
Reinforcement Learning for Feedback-Enabled Cyber Resilience0
Relevant Feature Selection Model Using Data Mining for Intrusion Detection System0
RePAD: Real-time Proactive Anomaly Detection for Time Series0
ReRe: A Lightweight Real-time Ready-to-Go Anomaly Detection Approach for Time Series0
Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems0
Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems0
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture0
RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning0
Road Context-aware Intrusion Detection System for Autonomous Cars0
A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset0
Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS20170
Robust Attack Detection Approach for IIoT Using Ensemble Classifier0
Robust Intrusion Detection System with Explainable Artificial Intelligence0
Robustness of ML-Enhanced IDS to Stealthy Adversaries0
Show:102550
← PrevPage 11 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified