SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 351375 of 800 papers

TitleStatusHype
Joint Semantic Transfer Network for IoT Intrusion Detection0
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems0
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model0
DI-NIDS: Domain Invariant Network Intrusion Detection System0
VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT0
Anomaly Detection via Federated Learning0
FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems0
Network Intrusion Detection System in a Light Bulb0
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G0
Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection0
FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS0
Anomaly detection optimization using big data and deep learning to reduce false-positive0
Big data analysis and distributed deep learning for next-generation intrusion detection system optimization0
A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique0
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP'99 and NSL-KDD Datasets: A Comprehensive Survey0
A Comparative Study on Unsupervised Anomaly Detection for Time Series: Experiments and Analysis0
Nature Inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Grey Wolf Algorithm Techniques0
Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces0
CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detectionCode1
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data0
Zero-day DDoS Attack Detection0
A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networksCode0
ECU Identification using Neural Network Classification and Hyperparameter Tuning0
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset0
Designing an Artificial Immune System inspired Intrusion Detection System0
Show:102550
← PrevPage 15 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified