SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 601625 of 800 papers

TitleStatusHype
The Effective Methods for Intrusion Detection With Limited Network Attack Data: Multi-Task Learning and Oversampling0
The Efficacy of Transformer-based Adversarial Attacks in Security Domains0
The importance of the clustering model to detect new types of intrusion in data traffic0
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey0
Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System0
TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection0
Time-Based CAN Intrusion Detection Benchmark0
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data0
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks0
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification0
Towards a graph-based foundation model for network traffic analysis0
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks0
Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services0
Towards Explainable Network Intrusion Detection using Large Language Models0
Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems0
Towards Network Traffic Monitoring Using Deep Transfer Learning0
Toward Supervised Anomaly Detection0
Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection0
Training a quantum annealing based restricted Boltzmann machine on cybersecurity data0
Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations0
Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey0
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI0
Triadic-OCD: Asynchronous Online Change Detection with Provable Robustness, Optimality, and Convergence0
Trustworthy Anomaly Detection: A Survey0
Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space0
Show:102550
← PrevPage 25 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified