SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 101150 of 800 papers

TitleStatusHype
Applications of Positive Unlabeled (PU) and Negative Unlabeled (NU) Learning in Cybersecurity0
Machine Learning-based Android Intrusion Detection System0
Convolutional Neural Networks and Mixture of Experts for Intrusion Detection in 5G Networks and beyond0
Optimized IoT Intrusion Detection using Machine Learning Technique0
Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles0
Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications0
Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks0
An AutoML-based approach for Network Intrusion Detection0
The importance of the clustering model to detect new types of intrusion in data traffic0
Feature Selection for Network Intrusion Detection0
Take Package as Language: Anomaly Detection Using TransformerCode0
Intelligent Green Efficiency for Intrusion Detection0
Sdn Intrusion Detection Using Machine Learning Method0
Securing from Unseen: Connected Pattern Kernels (CoPaK) for Zero-Day Intrusion Detection0
Enhanced Real-Time Threat Detection in 5G Networks: A Self-Attention RNN Autoencoder Approach for Spectral Intrusion Analysis0
Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection0
SCGNet-Stacked Convolution with Gated Recurrent Unit Network for Cyber Network Intrusion Detection and Intrusion Type ClassificationCode0
Implementing Lightweight Intrusion Detection System on Resource Constrained DevicesCode0
A Generative Model Based Honeypot for Industrial OPC UA CommunicationCode0
NIDS Neural Networks Using Sliding Time Window Data Processing with Trainable Activations and its Generalization Capability0
A Comprehensive Comparative Study of Individual ML Models and Ensemble Strategies for Network Intrusion Detection SystemsCode0
FedMSE: Federated learning for IoT network intrusion detectionCode1
XAI-based Feature Selection for Improved Network Intrusion Detection SystemsCode0
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI0
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data0
Data Distribution ValuationCode0
Evaluating the Performance of Machine Learning-Based Classification Models for IoT Intrusion DetectionCode0
Effective Intrusion Detection for UAV Communications using Autoencoder-based Feature Extraction and Machine Learning Approach0
Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security0
Exploring QUIC Dynamics: A Large-Scale Dataset for Encrypted Traffic AnalysisCode1
Efficient Federated Intrusion Detection in 5G ecosystem using optimized BERT-based modelCode0
Enhanced Convolution Neural Network with Optimized Pooling and Hyperparameter Tuning for Network Intrusion DetectionCode0
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection0
Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space0
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN0
Fair Anomaly Detection For Imbalanced Groups0
Federated Learning in Adversarial Environments: Testbed Design and Poisoning Resilience in Cybersecurity0
Towards a graph-based foundation model for network traffic analysis0
A Novel Perturb-ability Score to Mitigate Evasion Adversarial Attacks on Flow-Based ML-NIDS0
Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion DetectionCode1
SDOoop: Capturing Periodical Patterns and Out-of-phase Anomalies in Streaming Data AnalysisCode0
C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks0
AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN)0
Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic0
Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks0
XG-NID: Dual-Modality Network Intrusion Detection using a Heterogeneous Graph Neural Network and Large Language ModelCode1
Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks0
Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey0
Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine LearningCode0
Towards Explainable Network Intrusion Detection using Large Language Models0
Show:102550
← PrevPage 3 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified