SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 676700 of 800 papers

TitleStatusHype
Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models0
Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework0
Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection0
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks0
Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection -- An Analysis on CIC-AWS-2018 dataset0
Convolutional Neural Network for Intrusion Detection System In Cyber Physical Systems0
Mimic Learning to Generate a Shareable Network Intrusion Detection Model0
Exploring Information Centrality for Intrusion Detection in Large Networks0
End-to-End Adversarial Learning for Intrusion Detection in Computer Networks0
Should I Raise The Red Flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms0
A Compendium on Network and Host based Intrusion Detection Systems0
Efficient GAN-based method for cyber-intrusion detection0
Active Learning for Network Intrusion Detection0
Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier0
Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning0
Rallying Adversarial Techniques against Deep Learning for Network Security0
Probabilistic Modeling for Novelty Detection with Applications to Fraud Identification0
A comparative evaluation of novelty detection algorithms for discrete sequences0
Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning0
Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework0
A short review on Applications of Deep learning for Cyber security0
Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection0
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification0
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks0
Cyber Anomaly Detection Using Graph-node Role-dynamics0
Show:102550
← PrevPage 28 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified