SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 51100 of 800 papers

TitleStatusHype
Sketch-Based Anomaly Detection in Streaming GraphsCode1
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of VehiclesCode1
Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion DetectionCode1
Machine learning on knowledge graphs for context-aware security monitoringCode1
E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoTCode1
A flow-based IDS using Machine Learning in eBPFCode1
Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural NetworkCode1
Adaptive Intrusion Detection in the Networking of Large-Scale LANs with Segmented Federated LearningCode1
Intrusion Detection with Segmented Federated Learning for Large-Scale Multiple LANsCode1
Intrusion Detection for Cyber-Physical Systems using Generative Adversarial Networks in Fog EnvironmentCode1
MSTREAM: Fast Anomaly Detection in Multi-Aspect StreamsCode1
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection SystemsCode1
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection -- Application to Intrusion DetectionCode1
Efficient Deep CNN-BiLSTM Model for Network Intrusion DetectionCode1
A Novel SDN Dataset for Intrusion Detection in IoT NetworksCode1
SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference MeasureCode1
Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion DetectorsCode1
Packet2Vec: Utilizing Word2Vec for Feature Extraction in Packet DataCode1
LogicNets: Co-Designed Neural Networks and Circuits for Extreme-Throughput ApplicationsCode1
SUOD: Accelerating Large-Scale Unsupervised Heterogeneous Outlier DetectionCode1
SparseIDS: Learning Packet Sampling with Reinforcement LearningCode1
AnomalyDAE: Dual autoencoder for anomaly detection on attributed networksCode1
Cyber Attack Detection thanks to Machine Learning AlgorithmsCode1
Explainability and Adversarial Robustness for RNNsCode1
Tree-based Intelligent Intrusion Detection System in Internet of VehiclesCode1
CyberRAG: An agentic RAG cyber attack classification and reporting tool0
Detection of Cyber Attack in Network using Machine Learning Techniques.0
Generative Adversarial Evasion and Out-of-Distribution Detection for UAV Cyber-Attacks0
Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis0
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs0
Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS20170
Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT0
On the Performance of Cyber-Biomedical Features for Intrusion Detection in Healthcare 5.00
A Lightweight IDS for Early APT Detection Using a Novel Feature Selection Method0
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation0
Are Trees Really Green? A Detection Approach of IoT Malware Attacks0
Fuse and Federate: Enhancing EV Charging Station Security with Multimodal Fusion and Federated Learning0
Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning0
A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges0
A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT0
INSIGHT: A Survey of In-Network Systems for Intelligent, High-Efficiency AI and Topology Optimization0
Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications0
A Robust PPO-optimized Tabular Transformer Framework for Intrusion Detection in Industrial IoT SystemsCode0
A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles0
Neuromorphic Mimicry Attacks Exploiting Brain-Inspired Computing for Covert Cyber Intrusions0
CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model for Complex and Imbalanced Data0
SecCAN: An Extended CAN Controller with Embedded Intrusion DetectionCode0
Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded Intrusion Detection on the EdgeCode0
A Survey of Learning-Based Intrusion Detection Systems for In-Vehicle Network0
Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning0
Show:102550
← PrevPage 2 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified