SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 151200 of 800 papers

TitleStatusHype
An Anomaly Detection System Based on Generative Classifiers for Controller Area Network0
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats0
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer0
Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings0
A Dependable Hybrid Machine Learning Model for Network Intrusion Detection0
A Compendium on Network and Host based Intrusion Detection Systems0
A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT0
A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI0
Analysis of Zero Day Attack Detection Using MLP and XAI0
A SVM and K-means clustering based fast and efficient intrusion detection system0
A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes0
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System0
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks0
A Temporal Convolutional Network-based Approach for Network Intrusion Detection0
A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems0
A Transfer Learning Approach for Network Intrusion Detection0
A Transfer Learning Framework for Anomaly Detection in Multivariate IoT Traffic Data0
A Transformer-Based Framework for Payload Malware Detection and Classification0
Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models0
Attribute Learning for Network Intrusion Detection0
AutoIDS: Auto-encoder Based Method for Intrusion Detection System0
Automating Privilege Escalation with Deep Reinforcement Learning0
AutoOD: Automated Outlier Detection via Curiosity-guided Search and Self-imitation Learning0
A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems0
Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks0
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction0
BayBFed: Bayesian Backdoor Defense for Federated Learning0
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection0
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection0
BEBP: An Poisoning Method Against Machine Learning Based IDSs0
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods0
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems0
Benchmarking the Benchmark -- Analysis of Synthetic NIDS Datasets0
An Ensemble Deep Learning-based Cyber-Attack Detection in Industrial Control System0
Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks0
Bidirectional RNN for Medical Event Detection in Electronic Health Records0
Big data analysis and distributed deep learning for next-generation intrusion detection system optimization0
Binary and Multi-Class Intrusion Detection in IoT Using Standalone and Hybrid Machine and Deep Learning Models0
Blockchain Large Language Models0
Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security0
1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data0
CoAP-DoS: An IoT Network Intrusion Dataset0
BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection0
Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework0
ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection0
CADeSH: Collaborative Anomaly Detection for Smart Homes0
Comprehensive Survey on Adversarial Examples in Cybersecurity: Impacts, Challenges, and Mitigation Strategies0
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model0
A survey on deep packet inspection for intrusion detection systems0
A Survey of Learning-Based Intrusion Detection Systems for In-Vehicle Network0
Show:102550
← PrevPage 4 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified