SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 551575 of 800 papers

TitleStatusHype
Explaining Network Intrusion Detection System Using Explainable AI Framework0
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack0
ZYELL-NCTU NetTraffic-1.0: A Large-Scale Dataset for Real-World Network Anomaly Detection0
Characterization of Neural Networks Automatically Mapped on Automotive-grade Microcontrollers0
Clustering Algorithm to Detect Adversaries in Federated Learning0
How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection?0
TINKER: A framework for Open source Cyberthreat Intelligence0
Moving Object Classification with a Sub-6 GHz Massive MIMO Array using Real Data0
Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based NetworksCode0
DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware0
Robust Attack Detection Approach for IIoT Using Ensemble Classifier0
Federated Intrusion Detection for IoT with Heterogeneous Cohort Privacy0
Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset0
Multi-Source Data Fusion for Cyberattack Detection in Power Systems0
Time-Based CAN Intrusion Detection Benchmark0
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks0
RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks0
Towards Network Traffic Monitoring Using Deep Transfer Learning0
A Novel Resampling Technique for Imbalanced Dataset Optimization0
A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset0
Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On AutoencoderCode0
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS0
Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File FragmentsCode0
RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning0
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape0
Show:102550
← PrevPage 23 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified