Intrusion Detection
101 papers with code • 4 benchmarks • 7 datasets
Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.
Libraries
Use these libraries to find Intrusion Detection models and implementationsDatasets
Latest papers with no code
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Our paper provides empirical comparisons between recent IDSs to provide an objective comparison between them to help users choose the most appropriate solution based on their requirements.
EG-ConMix: An Intrusion Detection Method based on Graph Contrastive Learning
As the number of IoT devices increases, security concerns become more prominent.
Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems
The MIAE model is trained in an unsupervised learning mode to transform the heterogeneous inputs into lower-dimensional representation, which helps classifiers distinguish between normal behaviour and different types of attacks.
usfAD Based Effective Unknown Attack Detection Focused IDS Framework
To address this challenge, we put forth two strategies for semi-supervised learning based IDS where training samples of attacks are not required: 1) training a supervised machine learning model using randomly and uniformly dispersed synthetic attack samples; 2) building a One Class Classification (OCC) model that is trained exclusively on benign network traffic.
Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis
With the increased use of network technologies like Internet of Things (IoT) in many real-world applications, new types of cyberattacks have been emerging.
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats
Within this second tier, we also embed a multi-classification mechanism coupled with a clustering algorithm.
Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems
The Internet of Medical Things (IoMT) transcends traditional medical boundaries, enabling a transition from reactive treatment to proactive prevention.
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques
Importantly, in UKM-IDS20, IG successfully identifies all three anomalous instances without prior exposure, demonstrating its generalization capabilities.
MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network
The STcAM with fine-pruning uses one-dimensional convolution (Conv1D) to extract spatial features and subsequently utilizes the Bidirectional Long Short Term Memory (Bi-LSTM) to extract the temporal features, where the attention mechanism will focus on the important time steps.
An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection
As cyber-attacks become more sophisticated, improving the robustness of Machine Learning (ML) models must be a priority for enterprises of all sizes.