ML-Based IDS

Adversarial Training for Deep Learning-based Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20
ML-Based IDS
Backdoor Attack
Adversarial Example

Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network

Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31
ML-Based IDS
Machine Learning Method
Anomaly Detection Method

Exploring Edge TPU for Network Intrusion Detection in IoT

Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30
ML-Based IDS
Model Selection
Machine Learning Method

A flow-based IDS using Machine Learning in eBPF

Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2021-02-19 | Updated: 2022-03-04
ML-Based IDS
Watermarking
Attack Method

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami | Published: 2020-12-16
ML-Based IDS
Machine Learning Application
Complexity of the Environment

Towards a Universal Features Set for IoT Botnet Attacks Detection

Authors: Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali | Published: 2020-12-01
DDoS Attack
ML-Based IDS
Feature Extraction Method

SparseIDS: Learning Packet Sampling with Reinforcement Learning

Authors: Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby | Published: 2020-02-10 | Updated: 2020-05-04
ML-Based IDS
Training Method
Reinforcement Learning

Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests

Authors: Simon D. Duque Anton, Sapna Sinha, Hans Dieter Schotten | Published: 2019-07-24
ML-Based IDS
Data Dependency
Feature Interdependence

CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection

Authors: Ayush Hariharan, Ankit Gupta, Trisha Pal | Published: 2019-07-23
ML-Based IDS
Cyber Threat
Data Contamination Detection

Network Attacks Anomaly Detection Using SNMP MIB Interface Parameters

Authors: Ghazi Al-Naymatm, Ahmed Hambouz, Mouhammd Alkasassbeh | Published: 2019-05-14 | Updated: 2019-10-19
ML-Based IDS
Dataset Analysis
Network Packet Management