SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 751800 of 800 papers

TitleStatusHype
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesCode0
Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks0
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer0
Energy-based Models for Video Anomaly Detection0
Model Selection for Anomaly Detection0
A Machine Learning Based Intrusion Detection System for Software Defined 5G Network0
Hybrid Isolation Forest - Application to Intrusion DetectionCode0
Data Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation0
Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System0
Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network0
eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry KeysCode0
On the (Statistical) Detection of Adversarial Examples0
Learning detectors of malicious web requests for intrusion detection in network traffic0
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey0
SoK: Applying Machine Learning in Security - A Survey0
LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems0
"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law0
Conformalized density- and distance-based anomaly detection in time-series data0
Attribute Learning for Network Intrusion Detection0
Sorting out typicality with the inverse moment matrix SOS polynomial0
Bidirectional RNN for Medical Event Detection in Electronic Health Records0
Detecting Novel Processes with CANDIES -- An Holistic Novelty Detection Technique based on Probabilistic Models0
Learning Privately from Multiparty Data0
Multi-centrality Graph Spectral Decompositions and their Application to Cyber Intrusion Detection0
More Efficient Topic Modelling Through a Noun Only Approach0
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System0
Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data0
Extreme bandits0
Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection0
Keystroke Patterns as Prosody in Digital Writings: A Case Study with Deceptive Reviews and Essays0
Efficient classification using parallel and scalable compressed model and Its application on intrusion detection0
A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm0
A New Clustering Approach for Anomaly Intrusion Detection0
Relevant Feature Selection Model Using Data Mining for Intrusion Detection System0
Continuous Features Discretization for Anomaly Intrusion Detectors Generation0
Security Evaluation of Support Vector Machines in Adversarial Environments0
Toward Supervised Anomaly Detection0
An Identification System Using Eye Detection Based On Wavelets And Neural Networks0
Intrusion Detection using Continuous Time Bayesian Networks0
A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents0
Two Timescale Convergent Q-learning for Sleep--Scheduling in Wireless Sensor Networks0
Machine Learning Techniques for Intrusion Detection0
A Review of Machine Learning based Anomaly Detection Techniques0
The Dendritic Cell Algorithm for Intrusion Detection0
Immune System Approaches to Intrusion Detection - A Review (ICARIS)0
A SVM and K-means clustering based fast and efficient intrusion detection system0
Predicting Network Attacks Using Ontology-Driven Inference0
Fast Feature Reduction in intrusion detection datasets0
A survey on deep packet inspection for intrusion detection systems0
Intrusion Detection Systems Using Adaptive Regression Splines0
Show:102550
← PrevPage 16 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified