SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 401450 of 800 papers

TitleStatusHype
A Machine Learning Based Intrusion Detection System for Software Defined 5G Network0
A Machine-Learning Phase Classification Scheme for Anomaly Detection in Signals with Periodic Characteristics0
A model for multi-attack classification to improve intrusion detection performance using deep learning approaches0
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods0
A multiagent based framework secured with layered SVM-based IDS for remote healthcare systems0
An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks0
An Adversarial Approach for Explainable AI in Intrusion Detection Systems0
An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection0
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System0
Analysis of Zero Day Attack Detection Using MLP and XAI0
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks0
Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings0
An Anomaly Detection System Based on Generative Classifiers for Controller Area Network0
An Attribute Oriented Induction based Methodology for Data Driven Predictive Maintenance0
An AutoML-based approach for Network Intrusion Detection0
An Autonomous Intrusion Detection System Using an Ensemble of Advanced Learners0
Sorting out typicality with the inverse moment matrix SOS polynomial0
Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection0
StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems0
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems0
STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles0
Strategic Deployment of Honeypots in Blockchain-based IoT Systems0
Strengthening Network Intrusion Detection in IoT Environments with Self-Supervised Learning and Few Shot Learning0
Towards Explainable Meta-Learning for DDoS Detection0
Supervised Contrastive ResNet and Transfer Learning for the In-vehicle Intrusion Detection System0
Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review0
Survey of Graph Neural Network for Internet of Things and NextG Networks0
Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things0
Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process0
Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications0
SynGAN: Towards Generating Synthetic Network Attacks using GANs0
Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks0
Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic0
Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles0
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems0
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack0
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN0
Technical Report: Generating the WEB-IDS23 Dataset0
Temporal Analysis of NetFlow Datasets for Network Intrusion Detection Systems0
TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction0
The Dendritic Cell Algorithm for Intrusion Detection0
The Effective Methods for Intrusion Detection With Limited Network Attack Data: Multi-Task Learning and Oversampling0
The Efficacy of Transformer-based Adversarial Attacks in Security Domains0
The importance of the clustering model to detect new types of intrusion in data traffic0
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey0
Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System0
TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection0
Time-Based CAN Intrusion Detection Benchmark0
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data0
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks0
Show:102550
← PrevPage 9 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified