Intrusion Detection System

Large Language Models powered Network Attack Detection: Architecture, Opportunities and Case Study

Authors: Xinggong Zhang, Qingyang Li, Yunpeng Tan, Zongming Guo, Lei Zhang, Yong Cui | Published: 2025-03-24
Prompt Injection
Prompt leaking
Intrusion Detection System

CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

Authors: Francesco Marchiori, Mauro Conti | Published: 2024-04-06
Intrusion Detection System
Adversarial Training
Threat modeling

An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks

Authors: Abdullah H Alqahtani | Published: 2024-04-01
Online Learning
Intrusion Detection System
Anomaly Detection Method

Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks

Authors: Andrea Venturi, Dario Stabili, Mirco Marchetti | Published: 2024-03-18 | Updated: 2024-04-23
Intrusion Detection System
Adversarial Training
Structural Attack

A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
Intrusion Detection System
Unknown Attack Detection
Hierarchical Classification Methods

usfAD Based Effective Unknown Attack Detection Focused IDS Framework

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
DDoS Attack Detection
Intrusion Detection System
Unknown Attack Detection

ZTRAN: Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments

Authors: Aly S. Abdalla, Joshua Moore, Nisha Adhikari, Vuk Marojevic | Published: 2024-03-06
Zero Trust
Network Slicing
Intrusion Detection System

IT Intrusion Detection Using Statistical Learning and Testbed Measurements

Authors: Xiaoxuan Wang, Rolf Stadler | Published: 2024-02-20
CVE Information Extraction
Intrusion Detection System
Attack Method

MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs

Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal | Published: 2024-02-17 | Updated: 2024-02-22
Data Preprocessing
Model Performance Evaluation
Intrusion Detection System

On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection

Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15
Dataset Generation
Intrusion Detection System
Attack Evaluation