SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 576600 of 800 papers

TitleStatusHype
Intrusion Detection with Segmented Federated Learning for Large-Scale Multiple LANsCode1
Graph-Based Intrusion Detection System for Controller Area Networks0
Experimental Review of Neural-based approaches for Network Intrusion Management0
Intrusion Detection for Cyber-Physical Systems using Generative Adversarial Networks in Fog EnvironmentCode1
MSTREAM: Fast Anomaly Detection in Multi-Aspect StreamsCode1
Machine Learning Applications in Misuse and Anomaly Detection0
PIDNet: An Efficient Network for Dynamic Pedestrian Intrusion Detection0
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion DetectionCode0
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection0
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection SystemsCode1
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection0
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection0
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion DetectionCode0
A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures0
Fragments-Expert: A Graphical User Interface MATLAB Toolbox for Classification of File Fragments0
NERD: Neural Network for Edict of Risky Data Streams0
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs0
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection -- Application to Intrusion DetectionCode1
Leveraging Siamese Networks for One-Shot Intrusion Detection Model0
Efficient Deep CNN-BiLSTM Model for Network Intrusion DetectionCode1
AutoOD: Automated Outlier Detection via Curiosity-guided Search and Self-imitation Learning0
A Novel SDN Dataset for Intrusion Detection in IoT NetworksCode1
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks0
Learning With Differential Privacy0
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System0
Show:102550
← PrevPage 24 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified