SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 651700 of 800 papers

TitleStatusHype
Change Detection in Noisy Dynamic Networks: A Spectral Embedding Approach0
Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network0
K-Metamodes: frequency- and ensemble-based distributed k-modes clustering for security analyticsCode0
LuNet: A Deep Neural Network for Network Intrusion DetectionCode0
Detecting malicious logins as graph anomalies0
Walling up Backdoors in Intrusion Detection SystemsCode0
Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined Networks0
A Transfer Learning Approach for Network Intrusion Detection0
TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction0
SynGAN: Towards Generating Synthetic Network Attacks using GANs0
Sparse Bayesian approach for metric learning in latent spaceCode0
Omni SCADA Intrusion Detection Using Deep Learning Algorithms0
Road Context-aware Intrusion Detection System for Autonomous Cars0
Learning Neural Representations for Network Anomaly DetectionCode0
Data Analysis of Wireless Networks Using Classification Techniques0
New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning0
Using Temporal and Topological Features for Intrusion Detection in Operational Networks0
Multivariate Big Data Analysis for Intrusion Detection: 5 steps from the haystack to the needle0
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning0
Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings0
Deep Reinforcement Learning for Cyber Security0
A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS0
CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data0
Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things0
The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?0
Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models0
Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework0
Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection0
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks0
Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection -- An Analysis on CIC-AWS-2018 dataset0
Convolutional Neural Network for Intrusion Detection System In Cyber Physical Systems0
Mimic Learning to Generate a Shareable Network Intrusion Detection Model0
Exploring Information Centrality for Intrusion Detection in Large Networks0
End-to-End Adversarial Learning for Intrusion Detection in Computer Networks0
Should I Raise The Red Flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms0
A Compendium on Network and Host based Intrusion Detection Systems0
Efficient GAN-based method for cyber-intrusion detection0
Active Learning for Network Intrusion Detection0
Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier0
Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning0
Rallying Adversarial Techniques against Deep Learning for Network Security0
Probabilistic Modeling for Novelty Detection with Applications to Fraud Identification0
A comparative evaluation of novelty detection algorithms for discrete sequences0
Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning0
Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework0
A short review on Applications of Deep learning for Cyber security0
Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection0
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification0
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks0
Cyber Anomaly Detection Using Graph-node Role-dynamics0
Show:102550
← PrevPage 14 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified