惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

U
Unit 42
V
V2EX
Martin Fowler
Martin Fowler
博客园 - Franky
P
Proofpoint News Feed
P
Palo Alto Networks Blog
H
Hackread – Cybersecurity News, Data Breaches, AI and More
B
Blog
The Register - Security
The Register - Security
Latest news
Latest news
S
Security @ Cisco Blogs
Simon Willison's Weblog
Simon Willison's Weblog
Recorded Future
Recorded Future
大猫的无限游戏
大猫的无限游戏
M
Microsoft Research Blog - Microsoft Research
Scott Helme
Scott Helme
T
Tailwind CSS Blog
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
Application and Cybersecurity Blog
Application and Cybersecurity Blog
T
True Tiger Recordings
有赞技术团队
有赞技术团队
I
Intezer
Cisco Talos Blog
Cisco Talos Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
The GitHub Blog
The GitHub Blog
cs.AI updates on arXiv.org
cs.AI updates on arXiv.org
T
Tenable Blog
博客园 - 叶小钗
Hugging Face - Blog
Hugging Face - Blog
Hacker News: Ask HN
Hacker News: Ask HN
S
Security Archives - TechRepublic
F
Future of Privacy Forum
爱范儿
爱范儿
PCI Perspectives
PCI Perspectives
H
Help Net Security
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
T
The Blog of Author Tim Ferriss
MyScale Blog
MyScale Blog
N
Netflix TechBlog - Medium
罗磊的独立博客
Apple Machine Learning Research
Apple Machine Learning Research
MongoDB | Blog
MongoDB | Blog
Security Latest
Security Latest
美团技术团队
博客园 - 三生石上(FineUI控件)
S
Schneier on Security
量子位
C
CERT Recently Published Vulnerability Notes
SecWiki News
SecWiki News

cs.LG updates on arXiv.org

Expectation Consistency Loss: Rethink Confidence Calibration under Covariate Shift Dynamic Mixture of Latent Memories for Self-Evolving Agents Models Can Model, But Can't Bind: Structured Grounding in Text-to-Optimization Provable Robustness against Backdoor Attacks via the Primal-Dual Perspective on Differential Privacy AutoMCU: Feasibility-First MCU Neural Network Customization via LLM-based Multi-Agent Systems PhylaFlow: Hybrid Flow Matching in Billera-Holmes-Vogtmann Tree Space for Phylogenetic Inference Equilibrium Propagation and Hamiltonian Inference in the Diffusive Fitzhugh-Nagumo Model DualOptim+: Bridging Shared and Decoupled Optimizer States for Better Machine Unlearning in Large Language Models Detecting Atypical Clients in Federated Learning via Representation-Level Divergence Can Breath Biomarkers Causally Influence Blood Glucose? Investigating VOC-Mediated Modulation in Diabetes The Attribution Impossibility: No Feature Ranking Is Faithful, Stable, and Complete Under Collinearity TBP-mHC: full expressivity for manifold-constrained hyper connections through transportation polytopes Beyond Euclidean Proximity: Repairing Latent World Models with Horizon-Matched Trajectory Reachability Metrics Manifold-Guided Attention Steering Can Transformers Learn to Verify During Backtracking Search? CausalGuard: Conformal Inference under Graph Uncertainty TONIC: Token-Centric Semantic Communication for Task-Oriented Wireless Systems What are the Right Symmetries for Formal Theorem Proving? Three Costs of Amortizing Gaussian Process Inference with Neural Processes Riemannian geometry meets fMRI: the advantages of modeling correlation manifolds and eigenvector subspaces Double descent for least-squares interpolation on contaminated data: A simulation study AgForce Enables Antigen-conditioned Generative Antibody Design Dropout Universality: Scaling Laws and Optimal Scheduling at the Edge-of-Chaos Beyond Single Slot: Joint Optimization for Multi-Slot Guaranteed Display Advertising VeriScale: Adversarial Test-Suite Scaling for Verifiable Code Generation How Sparsity Allocation Shapes Label-Free Post-Pruning Recoverability ARC-STAR: Auditable Post-Hoc Correction for PDE Foundation Models One-Way Policy Optimization for Self-Evolving LLMs A Reproducible Log-Driven AutoML Framework for Interpretable Pipeline Optimization in Healthcare Risk Prediction Ex-GraphRAG: Interpretable Evidence Routing for Graph-Augmented LLMs Toward Understanding Adversarial Distillation: Why Robust Teachers Fail When to Switch, Not Just What: Transition Quality Prediction in Clash Royale PEARL: Unbiased Percentile Estimation via Contrastive Learning for Industrial-Scale Livestream Recommendation Correcting Class Imbalance in Prior-Data Fitted Networks for Tabular Classification Quantitative coronary calcification analysis for prediction of myocardial ischemia using non-contrast CT calcium scoring Representation Gap: Explaining the Unreasonable Effectiveness of Neural Networks from a Geometric Perspective Objective-Induced Bias and Search Dynamics in Multiobjective Unsupervised Feature Selection MMD-Balls as Credal Sets: A PAC-Bayesian Framework for Epistemic Uncertainty in Test-Time Adaptation Symbolic Density Estimation for Discrete Distributions Explainable AI for Data-Driven Design of High-Dimensional Predictive Studies Same Architecture, Different Capacity: Optimizer-Induced Spectral Scaling Laws Local Covariate Selection for Average Causal Effect Estimation without Pretreatment and Causal Sufficiency Assumptions EmoTrack: Robust Depression Tracking from Counseling Transcripts across Session Regimes Chebyshev Policies and the Mountain Car Problem: Reinforcement Learning for Low-Dimensional Control Tasks On the Sample Complexity of Discounted Reinforcement Learning with Optimized Certainty Equivalents LABO: LLM-Accelerated Bayesian Optimization through Broad Exploration and Selective Experimentation Algebraic Machine Learning for Small-to-Medium Datasets Is Competitive against Strong Standard Baselines Adaptive Measurement Allocation for Learning Kernelized SVMs Under Noisy Observations Noise Schedule Design for Diffusion Models: An Optimal Control Perspective An Improved Adaptive PID Optimizer with Enhanced Convergence and Stability for Deep Learning No Epoch Like the Present: Robust Climate Emulation Requires Out-of-Distribution Generalisation Protein Thoughts: Interpretable Reasoning with Tree of Thoughts and Embedding-Space Flow Matching for Protein-Protein Interaction Discovery CASE-NET: Deep Spatio-Temporal Representation Learning via Causal Attention and Channel Recalibration for Multivariate Time Series Classification Discovering Entity-Conditioned Lag Heterogeneity: A Lag-Gated Neural Audit Framework for Panel Time Series ConTact: Contact-First Antibody CDR Design via Explicit Interface Reasoning Aerodynamic force reconstruction using physics-informed Gaussian processes PeakFocus: Bridging Peak Localization and Intensity Regression via a Unified Multi-Scale Framework for Electricity Load Forecasting Embedding-Based Federated Learning with Runtime Governance for Iron Deficiency Prediction Support-aware offline policy selection for advertising marketplaces From Sequential Nodes to GPU Batches: Parallel Branch and Bound for Optimal $k$-Sparse GLMs Harnesses for Inference-Time Alignment over Execution Trajectories Scalable On-Policy Reinforcement Learning via Adaptive Batch Scaling Leveraging Self-Paced Curriculum Learning for Enhanced Modality Balance in Multimodal Conversational Emotion Recognition I-SAFE: Wasserstein Coherence Metrics for Structural Auditing of Scientific AI Models $\textit{BlockFormer}$ : Transformer-based inference from interaction maps Machine learning prediction of obstructive coronary artery disease using opportunistic coronary calcium and epicardial fat assessments from CT calcium scoring scans Alike Parts: A Feature-Informed Approach to Local and Global Prototype Explanations Prototype-Guided Classification Sub-Task Decoupling Framework: Enhancing Generalization and Interpretability for Multivariate Time Series IKNO: Infinite-order Kernel Neural Operators The Illusion of Reasoning: Exposing Evasive Data Contamination in LLMs via Zero-CoT Truncation ChronoMedicalWorld: A Medical World Model for Learning Patient Trajectories from Longitudinal Care Data stable-worldmodel: A Platform for Reproducible World Modeling Research and Evaluation How Many Different Outputs Can a Transformer Generate? On-Policy Consistency Training Improves LLM Safety with Minimal Capability Degradation Bandit Convex Optimization with Gradient Prediction Adaptivity Engineering Hybrid Physics-Informed Neural Networks for Next-Generation Electricity Systems: A State-of-the-Art Review SCI-Defense: Defending Manipulation Attacks from Generative Engine Optimization Short-Term-to-Long-Term Memory Transfer for Knowledge Graphs under Partial Observability Calibration, Uncertainty Communication, and Deployment Readiness in CKD Risk Prediction: A Framework Evaluation Study One LR Doesn't Fit All: Heavy-Tail Guided Layerwise Learning Rates for LLMs SepsisAI Orchestrator: A Containerized and Scalable Platform for Deploying AI Models and Real-Time Monitoring in Early Sepsis Detection Frequency-Domain Regularized Adversarial Alignment for Transferable Attacks against Closed-Source MLLMs Holomorphic Neural ODEs with Kolmogorov-Arnold Networks for Interpretable Discovery of Complex Dynamics When Are Teacher Tokens Reliable? Position-Weighted On-Policy Self-Distillation for Reasoning Visibility nowcasting in South Korea: a machine learning approach to class imbalance and distribution shift Graph neural network explanations reveal a topological signature of disease-associated hubs in biological networks Learning Causal Orderings for In-Context Tabular Prediction Temporal Contrastive Transformer for Financial Crime Detection: Self-Supervised Sequence Embeddings via Predictive Contrastive Coding Optimal Guarantees for Auditing Rényi Differentially Private Machine Learning Tailoring Teaching to Aptitude: Direction-Adaptive Self-Distillation for LLM Reasoning Beyond Scalar Objectives: Expert-Feedback-Driven Autonomous Experimentation for Scientific Discovery at the Nanoscale Long-term Fairness with Selective Labels Reinforced Graph of Thoughts: RL-Driven Adaptive Prompting for LLMs Provable Joint Decontamination for Benchmarking Multiple Large Language Models Reasoning through Verifiable Forecast Actions: Consistency-Grounded RL for Financial LLMs OPPO: Bayesian Value Recursion for Token-Level Credit Assignment in LLM Reasoning Memory-R2: Fair Credit Assignment for Long-Horizon Memory-Augmented LLM Agents Position: The Time for Sampling Is Now! Charting a New Course for Bayesian Deep Learning Predicting Performance of Symbolic and Prompt Programs with Examples Decomposing Ensemble Spread in Lorenz '96 With Learned Stochastic Parameterizations
HIDBench: Benchmarking Large Language Models for Host-Based Intrusion Detection
Danyu Sun, J · 2026-05-23 · via cs.LG updates on arXiv.org

View PDF HTML (experimental)

Abstract:Recent benchmark efforts have advanced the evaluation of large language models (LLMs) in cybersecurity, including tasks such as penetration testing and vulnerability identification. However, a critical cybersecurity task, namely intrusion detection from system logs, remains unexplored. In this work, we present a new benchmark to assess LLMs' capabilities in supporting host-based intrusion detection systems (HIDS). This task requires fine-grained reasoning over large-scale, noisy, and highly imbalanced system logs, where complex interactions between benign and malicious activities make reliable detection challenging. Our benchmark unifies three public system log datasets, DARPA-E3, DARPA-E5, and NodLink, and introduces a data construction pipeline that transforms raw host telemetry into LLM-compatible inputs, enabling systematic evaluation under realistic intrusion detection settings. Our evaluation of frontier LLMs reveals substantial performance gaps across datasets. While many models achieve high precision (often above 0.8) on simpler datasets, their performance degrades significantly as system logs become noisier and more complex, with MCC frequently dropping below 0.5 and false positive rates increasing sharply. We further analyze model behavior and identify distinct regimes, including conservative detectors with low false positive rates and over-sensitive models that generate excessive alerts. Overall, our results highlight that while LLMs show strong potential for HIDS, their effectiveness is highly sensitive to data complexity, and robust system design is essential for reliable deployment.
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Cite as: arXiv:2605.21773 [cs.CR]
  (or arXiv:2605.21773v1 [cs.CR] for this version)
  https://doi.org/10.48550/arXiv.2605.21773

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Danyu Sun [view email]
[v1] Wed, 20 May 2026 22:07:12 UTC (1,516 KB)