SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 726750 of 800 papers

TitleStatusHype
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection0
Onion-Peeling Outlier Detection in 2-D data Sets0
BEBP: An Poisoning Method Against Machine Learning Based IDSs0
Online Feature Ranking for Intrusion Detection Systems0
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion DetectionCode0
First-order bifurcation detection for dynamic complex networks0
Generative Models for Spear Phishing Posts on Social Media0
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly DetectionCode0
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks0
Anomaly detection in wide area network mesh using two machine learning anomaly detection algorithms0
Secure Mobile Crowdsensing with Deep Learning0
Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput ComputingCode0
Fusion of ANN and SVM Classifiers for Network Attack Detection0
Evaluation of Machine Learning Algorithms for Intrusion Detection System0
Learning automata based SVM for intrusion detection0
A Deep Belief Network Based Machine Learning System for Risky Host Detection0
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods0
Manifold regularization based on Nyström type subsampling0
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System0
A Renewal Model of IntrusionCode0
A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection0
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward0
A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic DataCode0
Security Evaluation of Pattern Classifiers under Attack0
Machine Learning Approach for Detection of nonTor Traffic0
Show:102550
← PrevPage 30 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified