SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 726750 of 800 papers

TitleStatusHype
An Effective Networks Intrusion Detection Approach Based on Hybrid Harris Hawks and Multi-Layer Perceptron0
An Efficient Anomaly Detection Approach using Cube Sampling with Streaming Data0
Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier0
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods0
An Ensemble Deep Learning-based Cyber-Attack Detection in Industrial Control System0
A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm0
A New Clustering Approach for Anomaly Intrusion Detection0
A New Intrusion Detection System using the Improved Dendritic Cell Algorithm0
A new semi-supervised inductive transfer learning framework: Co-Transfer0
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks0
Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion Detection0
An Identification System Using Eye Detection Based On Wavelets And Neural Networks0
An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks0
An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices0
An Interpretable Federated Learning-based Network Intrusion Detection Framework0
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques0
An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies0
Anomaly based network intrusion detection for IoT attacks using deep learning technique0
Anomaly Detection Dataset for Industrial Control Systems0
Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection0
Cybersecurity Anomaly Detection in Adversarial Environments0
Anomaly Detection in Intra-Vehicle Networks0
Anomaly detection in wide area network mesh using two machine learning anomaly detection algorithms0
Anomaly detection optimization using big data and deep learning to reduce false-positive0
Anomaly Detection via Federated Learning0
Show:102550
← PrevPage 30 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified