SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 351375 of 800 papers

TitleStatusHype
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning0
Effective Intrusion Detection in Highly Imbalanced IoT Networks with Lightweight S2CGAN-IDS0
Federated Deep Learning for Intrusion Detection in IoT Networks0
Exploring Global and Local Information for Anomaly Detection with Normal Samples0
REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response0
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation0
Anomaly Detection Dataset for Industrial Control Systems0
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour0
Blockchain Large Language Models0
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review0
Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations0
Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection0
BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection0
Explainable Intrusion Detection Systems Using Competitive Learning Techniques0
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination0
Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection0
Feature Reduction Method Comparison Towards Explainability and Efficiency in Cybersecurity Intrusion Detection Systems0
A Novel Multi-Stage Approach for Hierarchical Intrusion DetectionCode0
Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems0
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems0
CADeSH: Collaborative Anomaly Detection for Smart Homes0
EdgeServe: A Streaming System for Decentralized Model Serving0
Deep Neural Networks based Meta-Learning for Network Intrusion Detection0
Anomaly based network intrusion detection for IoT attacks using deep learning technique0
IoT Botnet Detection Using an Economic Deep Learning Model0
Show:102550
← PrevPage 15 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified