Intrusion Detection

101 papers with code • 4 benchmarks • 7 datasets

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Libraries

Use these libraries to find Intrusion Detection models and implementations

Latest papers with no code

Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice

no code yet • 26 Mar 2024

Our paper provides empirical comparisons between recent IDSs to provide an objective comparison between them to help users choose the most appropriate solution based on their requirements.

EG-ConMix: An Intrusion Detection Method based on Graph Contrastive Learning

no code yet • 24 Mar 2024

As the number of IoT devices increases, security concerns become more prominent.

Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems

no code yet • 22 Mar 2024

The MIAE model is trained in an unsupervised learning mode to transform the heterogeneous inputs into lower-dimensional representation, which helps classifiers distinguish between normal behaviour and different types of attacks.

usfAD Based Effective Unknown Attack Detection Focused IDS Framework

no code yet • 17 Mar 2024

To address this challenge, we put forth two strategies for semi-supervised learning based IDS where training samples of attacks are not required: 1) training a supervised machine learning model using randomly and uniformly dispersed synthetic attack samples; 2) building a One Class Classification (OCC) model that is trained exclusively on benign network traffic.

Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis

no code yet • 17 Mar 2024

With the increased use of network technologies like Internet of Things (IoT) in many real-world applications, new types of cyberattacks have been emerging.

A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats

no code yet • 17 Mar 2024

Within this second tier, we also embed a multi-classification mechanism coupled with a clustering algorithm.

Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems

no code yet • 14 Mar 2024

The Internet of Medical Things (IoMT) transcends traditional medical boundaries, enabling a transition from reactive treatment to proactive prevention.

An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques

no code yet • 12 Mar 2024

Importantly, in UKM-IDS20, IG successfully identifies all three anomalous instances without prior exposure, demonstrating its generalization capabilities.

MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network

no code yet • 7 Mar 2024

The STcAM with fine-pruning uses one-dimensional convolution (Conv1D) to extract spatial features and subsequently utilizes the Bidirectional Long Short Term Memory (Bi-LSTM) to extract the temporal features, where the attention mechanism will focus on the important time steps.

An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection

no code yet • 25 Feb 2024

As cyber-attacks become more sophisticated, improving the robustness of Machine Learning (ML) models must be a priority for enterprises of all sizes.