SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 401450 of 800 papers

TitleStatusHype
VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT0
Anomaly Detection via Federated Learning0
FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems0
Network Intrusion Detection System in a Light Bulb0
Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection0
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G0
FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS0
Big data analysis and distributed deep learning for next-generation intrusion detection system optimization0
Anomaly detection optimization using big data and deep learning to reduce false-positive0
A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique0
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP'99 and NSL-KDD Datasets: A Comprehensive Survey0
A Comparative Study on Unsupervised Anomaly Detection for Time Series: Experiments and Analysis0
Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces0
Nature Inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Grey Wolf Algorithm Techniques0
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data0
Zero-day DDoS Attack Detection0
A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networksCode0
ECU Identification using Neural Network Classification and Hyperparameter Tuning0
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset0
Designing an Artificial Immune System inspired Intrusion Detection System0
A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach0
IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge0
Supervised Contrastive ResNet and Transfer Learning for the In-vehicle Intrusion Detection System0
Creating an Explainable Intrusion Detection System Using Self Organizing Maps0
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities0
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems0
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection0
CoAP-DoS: An IoT Network Intrusion Dataset0
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks0
Using EBGAN for Anomaly Intrusion Detection0
Hands-on Wireless Sensing with Wi-Fi: A Tutorial0
When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic ClassificationCode0
RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System0
Are Embedding Spaces Interpretable? Results of an Intrusion Detection Evaluation on a Large French Corpus0
FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing0
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion DetectionCode0
Multibit Tries Packet Classification with Deep Reinforcement Learning0
User Localization using RF Sensing: A Performance comparison between LIS and mmWave Radars0
Explainable and Optimally Configured Artificial Neural Networks for Attack Detection in Smart Homes0
Many Field Packet Classification with Decomposition and Reinforcement Learning0
On Generalisability of Machine Learning-based Network Intrusion Detection Systems0
Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection0
Anomaly Detection in Intra-Vehicle Networks0
Federated Semi-Supervised Classification of Multimedia Flows for 3D Networks0
An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks0
A review of Federated Learning in Intrusion Detection Systems for IoT0
STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles0
ARLIF-IDS -- Attention augmented Real-Time Isolation Forest Intrusion Detection System0
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach0
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection0
Show:102550
← PrevPage 9 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified