SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 351400 of 800 papers

TitleStatusHype
Joint Semantic Transfer Network for IoT Intrusion Detection0
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems0
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model0
DI-NIDS: Domain Invariant Network Intrusion Detection System0
VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT0
Anomaly Detection via Federated Learning0
FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems0
Network Intrusion Detection System in a Light Bulb0
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G0
Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection0
FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS0
Anomaly detection optimization using big data and deep learning to reduce false-positive0
Big data analysis and distributed deep learning for next-generation intrusion detection system optimization0
A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique0
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP'99 and NSL-KDD Datasets: A Comprehensive Survey0
A Comparative Study on Unsupervised Anomaly Detection for Time Series: Experiments and Analysis0
Nature Inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Grey Wolf Algorithm Techniques0
Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces0
CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detectionCode1
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data0
Zero-day DDoS Attack Detection0
A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networksCode0
ECU Identification using Neural Network Classification and Hyperparameter Tuning0
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset0
Designing an Artificial Immune System inspired Intrusion Detection System0
LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of VehiclesCode2
A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach0
Digital Twin-based Intrusion Detection for Industrial Control SystemsCode1
IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge0
Supervised Contrastive ResNet and Transfer Learning for the In-vehicle Intrusion Detection System0
Creating an Explainable Intrusion Detection System Using Self Organizing Maps0
Anomal-E: A Self-Supervised Network Intrusion Detection System based on Graph Neural NetworksCode1
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities0
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems0
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection0
An Intrusion Detection System based on Deep Belief NetworksCode1
AnoShift: A Distribution Shift Benchmark for Unsupervised Anomaly DetectionCode1
CoAP-DoS: An IoT Network Intrusion Dataset0
Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection SystemsCode1
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks0
Open-Source Framework for Encrypted Internet and Malicious Traffic ClassificationCode1
Using EBGAN for Anomaly Intrusion Detection0
Hands-on Wireless Sensing with Wi-Fi: A Tutorial0
When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic ClassificationCode0
RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System0
Are Embedding Spaces Interpretable? Results of an Intrusion Detection Evaluation on a Large French Corpus0
FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing0
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion DetectionCode0
User Localization using RF Sensing: A Performance comparison between LIS and mmWave Radars0
Multibit Tries Packet Classification with Deep Reinforcement Learning0
Show:102550
← PrevPage 8 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified