SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 201225 of 800 papers

TitleStatusHype
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection0
Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space0
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN0
Fair Anomaly Detection For Imbalanced Groups0
Federated Learning in Adversarial Environments: Testbed Design and Poisoning Resilience in Cybersecurity0
Towards a graph-based foundation model for network traffic analysis0
A Novel Perturb-ability Score to Mitigate Evasion Adversarial Attacks on Flow-Based ML-NIDS0
SDOoop: Capturing Periodical Patterns and Out-of-phase Anomalies in Streaming Data AnalysisCode0
C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks0
AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN)0
Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic0
Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks0
Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks0
Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey0
Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine LearningCode0
Towards Explainable Network Intrusion Detection using Large Language Models0
AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent0
Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets0
A Life-long Learning Intrusion Detection System for 6G-Enabled IoV0
Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions0
Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach0
Integrating Artificial Intelligence into Operating Systems: A Comprehensive Survey on Techniques, Applications, and Future Directions0
Impacts of Data Preprocessing and Hyperparameter Optimization on the Performance of Machine Learning Models Applied to Intrusion Detection Systems0
A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes0
Multi-agent Reinforcement Learning-based Network Intrusion Detection System0
Show:102550
← PrevPage 9 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified