Network Intrusion Detection
47 papers with code • 5 benchmarks • 12 datasets
Network intrusion detection is the task of monitoring network traffic to and from all devices on a network in order to detect computer attacks.
Libraries
Use these libraries to find Network Intrusion Detection models and implementationsDatasets
Most implemented papers
Separating Flows in Encrypted Tunnel Traffic
In this paper, we show that it is indeed possible to separate packets belonging to different flows purely from patterns observed in the interleaved packet sequence.
Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks
Network Intrusion Detection Systems (NIDS) are tools or software that are widely used to maintain the computer networks and information systems keeping them secure and preventing malicious traffics from penetrating into them, as they flag when somebody is trying to break into the system.
A Novel Multi-Stage Approach for Hierarchical Intrusion Detection
An intrusion detection system (IDS), traditionally an example of an effective security monitoring system, is facing significant challenges due to the ongoing digitization of our modern society.
TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversarial Networks
To achieve these goals, we convert each input time-series into a sequence of 2D images using two encoding techniques with the intent of capturing temporal patterns and various types of deviance.
FlowTransformer: A Transformer Framework for Flow-based Network Intrusion Detection Systems
This paper presents the FlowTransformer framework, a novel approach for implementing transformer-based Network Intrusion Detection Systems (NIDSs).
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Unfortunately, the value of ML for NID depends on a plethora of factors, such as hardware, that are often neglected in scientific literature.
Towards Reliable Rare Category Analysis on Graphs via Individual Calibration
In particular, to quantify the uncertainties in RCA, we develop a node-level uncertainty quantification algorithm to model the overlapping support regions with high uncertainty; to handle the rarity of minority classes in miscalibration calculation, we generalize the distribution-based calibration metric to the instance level and propose the first individual calibration measurement on graphs named Expected Individual Calibration Error (EICE).
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
Our findings suggest that existing detectors can identify a consistent portion of new malicious traffic, and that improved embedding spaces enhance detection.
PolyLUT: Learning Piecewise Polynomials for Ultra-Low Latency FPGA LUT-based Inference
We show that by using polynomial building blocks, we can achieve the same accuracy using considerably fewer layers of soft logic than by using linear functions, leading to significant latency and area improvements.
LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection
Through experiments, we prove that LiPar has great detection performance, running efficiency, and lightweight model size, which can be well adapted to the in-vehicle environment practically and protect the in-vehicle CAN bus security.