SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 751775 of 800 papers

TitleStatusHype
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesCode0
Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks0
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer0
Energy-based Models for Video Anomaly Detection0
Model Selection for Anomaly Detection0
A Machine Learning Based Intrusion Detection System for Software Defined 5G Network0
Hybrid Isolation Forest - Application to Intrusion DetectionCode0
Data Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation0
Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System0
Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network0
eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry KeysCode0
On the (Statistical) Detection of Adversarial Examples0
Learning detectors of malicious web requests for intrusion detection in network traffic0
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey0
SoK: Applying Machine Learning in Security - A Survey0
LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems0
"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law0
Conformalized density- and distance-based anomaly detection in time-series data0
Attribute Learning for Network Intrusion Detection0
Sorting out typicality with the inverse moment matrix SOS polynomial0
Bidirectional RNN for Medical Event Detection in Electronic Health Records0
Detecting Novel Processes with CANDIES -- An Holistic Novelty Detection Technique based on Probabilistic Models0
Learning Privately from Multiparty Data0
Multi-centrality Graph Spectral Decompositions and their Application to Cyber Intrusion Detection0
More Efficient Topic Modelling Through a Noun Only Approach0
Show:102550
← PrevPage 31 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified