SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 426450 of 800 papers

TitleStatusHype
Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review0
Survey of Graph Neural Network for Internet of Things and NextG Networks0
Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things0
Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process0
Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications0
SynGAN: Towards Generating Synthetic Network Attacks using GANs0
Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks0
Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic0
Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles0
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems0
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack0
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN0
Technical Report: Generating the WEB-IDS23 Dataset0
Temporal Analysis of NetFlow Datasets for Network Intrusion Detection Systems0
TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction0
The Dendritic Cell Algorithm for Intrusion Detection0
The Effective Methods for Intrusion Detection With Limited Network Attack Data: Multi-Task Learning and Oversampling0
The Efficacy of Transformer-based Adversarial Attacks in Security Domains0
The importance of the clustering model to detect new types of intrusion in data traffic0
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey0
Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System0
TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection0
Time-Based CAN Intrusion Detection Benchmark0
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data0
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks0
Show:102550
← PrevPage 18 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified