SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 176200 of 800 papers

TitleStatusHype
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction0
BayBFed: Bayesian Backdoor Defense for Federated Learning0
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection0
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection0
BEBP: An Poisoning Method Against Machine Learning Based IDSs0
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods0
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems0
Benchmarking the Benchmark -- Analysis of Synthetic NIDS Datasets0
An Ensemble Deep Learning-based Cyber-Attack Detection in Industrial Control System0
Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks0
Bidirectional RNN for Medical Event Detection in Electronic Health Records0
Big data analysis and distributed deep learning for next-generation intrusion detection system optimization0
Binary and Multi-Class Intrusion Detection in IoT Using Standalone and Hybrid Machine and Deep Learning Models0
Blockchain Large Language Models0
Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security0
1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data0
CoAP-DoS: An IoT Network Intrusion Dataset0
BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection0
Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework0
ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection0
CADeSH: Collaborative Anomaly Detection for Smart Homes0
Comprehensive Survey on Adversarial Examples in Cybersecurity: Impacts, Challenges, and Mitigation Strategies0
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model0
A survey on deep packet inspection for intrusion detection systems0
A Survey of Learning-Based Intrusion Detection Systems for In-Vehicle Network0
Show:102550
← PrevPage 8 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified