Intrusion Detection System

A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2025-06-03
Trigger Detection
Intrusion Detection System
Analysis of Detection Methods

A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT

Authors: Mohammad Shamim Ahsan, Salekul Islam, Swakkhar Shatabda | Published: 2025-05-31 | Updated: 2025-06-03
Prompt Injection
Intrusion Detection System
Selection and Evaluation of Optimization Algorithms

Large Language Models powered Network Attack Detection: Architecture, Opportunities and Case Study

Authors: Xinggong Zhang, Qingyang Li, Yunpeng Tan, Zongming Guo, Lei Zhang, Yong Cui | Published: 2025-03-24
Prompt Injection
Prompt leaking
Intrusion Detection System

CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

Authors: Francesco Marchiori, Mauro Conti | Published: 2024-04-06
Intrusion Detection System
Adversarial Training
Threat modeling

An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks

Authors: Abdullah H Alqahtani | Published: 2024-04-01
Online Learning
Intrusion Detection System
Anomaly Detection Method

Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks

Authors: Andrea Venturi, Dario Stabili, Mirco Marchetti | Published: 2024-03-18 | Updated: 2024-04-23
Intrusion Detection System
Adversarial Training
Structural Attack

A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
Intrusion Detection System
Unknown Attack Detection
Hierarchical Classification Methods

usfAD Based Effective Unknown Attack Detection Focused IDS Framework

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
DDoS Attack Detection
Intrusion Detection System
Unknown Attack Detection

ZTRAN: Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments

Authors: Aly S. Abdalla, Joshua Moore, Nisha Adhikari, Vuk Marojevic | Published: 2024-03-06
Zero Trust
Network Slicing
Intrusion Detection System

IT Intrusion Detection Using Statistical Learning and Testbed Measurements

Authors: Xiaoxuan Wang, Rolf Stadler | Published: 2024-02-20
CVE Information Extraction
Intrusion Detection System
Attack Method