3260 papers • 126 benchmarks • 313 datasets
Network intrusion detection is the task of monitoring network traffic to and from all devices on a network in order to detect computer attacks.
(Image credit: Papersgraph)
These leaderboards are used to track progress in network-intrusion-detection-1
Use these libraries to find network-intrusion-detection-1 models and implementations
No subtasks available.
A novel anomaly detection framework and its instantiation that can be trained substantially more data-efficiently and achieves significantly better anomaly scoring than state-of-the-art competing methods is introduced.
Intrusion detection system (IDS) has become an essential layer in all the latest ICT system due to an urge towards cyber safety in the day-to-day world. Reasons including uncertainty in finding the types of attacks and increased the complexity of advanced cyber attacks, IDS calls for the need of integration of Deep Neural Networks (DNNs). In this paper, DNNs have been utilized to predict the attacks on Network Intrusion Detection System (N-IDS). A DNN with 0.1 rate of learning is applied and is run for 1000 number of epochs and KDDCup-‘99’ dataset has been used for training and benchmarking the network. For comparison purposes, the training is done on the same dataset with several other classical machine learning algorithms and DNN of layers ranging from 1 to 5. The results were compared and concluded that a DNN of 3 layers has superior performance over all the other classical machine learning algorithms.
Kitsune is presented: a plug and play NIDS which can learn to detect attacks on the local network, without supervision, and in an efficient online manner, and demonstrates that Kitsune can be a practical and economic NIDS.
This paper introduces a ranking model-based framework, called RAMODO, that unifies representation learning and outlier detection to learn low-dimensional representations that are tailored for a state-of-the-art outlier Detection approach - the random distance-based approach.
A deep joint representation learning framework for anomaly detection through a dual autoencoder (AnomalyDAE), which captures the complex interactions between network structure and node attribute for high-quality embeddings.
A unique combination of the taxonomy and the analysis of the datasets provided in this manuscript aims to improve the creation of datasets and the collection of real-world data and reflect network threats more accurately within new datasets.
The conclusion was made that it is possible to use machine learning methods to detect computer attacks taking into account these limitations.
This proposal is the first successful, practical, and extensively evaluated approach of applying GNNs on the problem of network intrusion detection for IoT using flow-based data, and outperforms the state-of-the-art in terms of key classification metrics.
IoTGeM is presented, an approach for modeling IoT network attacks that focuses on generalizability, yet also leads to better detection and performance, and an improved rolling window approach for feature extraction, which demonstrates superior generalization compared to traditional flow-based models.
The resulting Hybrid Isolation Forest (HIF) is evaluated on a synthetic dataset to analyze the effect of the new meta-parameters that are introduced and verify that the addressed limitation of the IF algorithm is effectively overcame.
Adding a benchmark result helps the community track progress.