Intrusion Detection

101 papers with code • 4 benchmarks • 7 datasets

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Libraries

Use these libraries to find Intrusion Detection models and implementations

PolyLUT: Learning Piecewise Polynomials for Ultra-Low Latency FPGA LUT-based Inference

martaandronic/polylut 5 Sep 2023

We show that by using polynomial building blocks, we can achieve the same accuracy using considerably fewer layers of soft logic than by using linear functions, leading to significant latency and area improvements.

28
05 Sep 2023

Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?

andreacorsini1/cyberood 28 Aug 2023

Our findings suggest that existing detectors can identify a consistent portion of new malicious traffic, and that improved embedding spaces enhance detection.

5
28 Aug 2023

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

provenanceanalytics/kairos 9 Aug 2023

Sifting through their design documents, we identify four common dimensions that drive the development of provenance-based intrusion detection systems (PIDSes): scope (can PIDSes detect modern attacks that infiltrate across application boundaries?

34
09 Aug 2023

Towards Reliable Rare Category Analysis on Graphs via Individual Calibration

wulongfeng/calirare 19 Jul 2023

In particular, to quantify the uncertainties in RCA, we develop a node-level uncertainty quantification algorithm to model the overlapping support regions with high uncertainty; to handle the rarity of minority classes in miscalibration calculation, we generalize the distribution-based calibration metric to the instance level and propose the first individual calibration measurement on graphs named Expected Individual Calibration Error (EICE).

6
19 Jul 2023

OptIForest: Optimal Isolation Forest for Anomaly Detection

xiagll/optiforest 22 Jun 2023

Extensive experiments on a series of benchmarking datasets for comparative and ablation studies demonstrate that our approach can efficiently and robustly achieve better detection performance in general than the state-of-the-arts including the deep learning based methods.

4
22 Jun 2023

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

hihey54/pragmaticassessment 30 Apr 2023

Unfortunately, the value of ML for NID depends on a plethora of factors, such as hardware, that are often neglected in scientific literature.

5
30 Apr 2023

FlowTransformer: A Transformer Framework for Flow-based Network Intrusion Detection Systems

liamdm/flowtransformer 28 Apr 2023

This paper presents the FlowTransformer framework, a novel approach for implementing transformer-based Network Intrusion Detection Systems (NIDSs).

54
28 Apr 2023

TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversarial Networks

labsaint/tsi-gan 22 Mar 2023

To achieve these goals, we convert each input time-series into a sequence of 2D images using two encoding techniques with the intent of capturing temporal patterns and various types of deviance.

11
22 Mar 2023

A Novel Multi-Stage Approach for Hierarchical Intrusion Detection

mverkerk/multi-stage-hierarchical-ids IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2023

An intrusion detection system (IDS), traditionally an example of an effective security monitoring system, is facing significant challenges due to the ongoing digitization of our modern society.

0
21 Mar 2023

ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

trust-tuda/argus-data 15 Feb 2023

ARGUS monitors the contextual setting based on the state and actions of IoT devices in the environment.

7
15 Feb 2023