SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 401450 of 800 papers

TitleStatusHype
Explainable and Optimally Configured Artificial Neural Networks for Attack Detection in Smart Homes0
Many Field Packet Classification with Decomposition and Reinforcement Learning0
On Generalisability of Machine Learning-based Network Intrusion Detection Systems0
Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection0
Anomaly Detection in Intra-Vehicle Networks0
CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-LevelCode1
Federated Semi-Supervised Classification of Multimedia Flows for 3D Networks0
An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks0
A review of Federated Learning in Intrusion Detection Systems for IoT0
Euler: Detecting Network Lateral Movement via Scalable Temporal Link PredictionCode1
STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles0
Representation Learning for Content-Sensitive Anomaly Detection in Industrial NetworksCode1
ARLIF-IDS -- Attention augmented Real-Time Isolation Forest Intrusion Detection System0
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach0
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection0
EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector0
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats0
Towards Explainable Meta-Learning for DDoS Detection0
Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks0
IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset0
FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic0
Collaborative Learning for Cyberattack Detection in Blockchain Networks0
The Cross-evaluation of Machine Learning-based Network Intrusion Detection SystemsCode0
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection0
Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection0
Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations0
NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks0
Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things0
Trustworthy Anomaly Detection: A Survey0
A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic ClassificationCode1
Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection0
Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks0
A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of VehiclesCode2
Early Detection of Network Attacks Using Deep Learning0
One-Shot Learning on Attributed Sequences0
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots0
An Interpretable Federated Learning-based Network Intrusion Detection Framework0
Feature Selection-based Intrusion Detection System Using Genetic Whale Optimization Algorithm and Sample-based Classification0
Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems0
Protocol Based Deep Intrusion Detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT data-setsCode1
A Heterogeneous Graph Learning Model for Cyber-Attack Detection0
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)0
Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review0
Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System0
Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration0
Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks0
Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion DetectionCode0
Graph-based Solutions with Residuals for Intrusion Detection: the Modified E-GraphSAGE and E-ResGAT AlgorithmsCode1
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection0
Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic ApproachCode0
Show:102550
← PrevPage 9 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified