{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:06:55Z","timestamp":1758672415266,"version":"3.44.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032061546","type":"print"},{"value":"9783032061553","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06155-3_5","type":"book-chapter","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T05:22:05Z","timestamp":1758604925000},"page":"83-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Parameter-Efficient Fine-Tuning of\u00a0LLMs for\u00a0Intrusion Detection and\u00a0Firewall Rule Generation: A Comparative Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7612-3853","authenticated-orcid":false,"given":"Chi","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5455-6931","authenticated-orcid":false,"given":"Muhammad Shadi","family":"Hajar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6430-9558","authenticated-orcid":false,"given":"Harsha","family":"Kalutarage","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6918-3587","authenticated-orcid":false,"given":"Lankeshwara","family":"Munasinghe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,24]]},"reference":[{"issue":"5","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/s10207-023-00682-2","volume":"22","author":"OH Abdulganiyu","year":"2023","unstructured":"Abdulganiyu, O.H., Ait Tchakoucht, T., Saheed, Y.K.: A systematic literature review for network intrusion detection system (IDS). Int. J. Inf. Secur. 22(5), 1125\u20131162 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"5_CR2","unstructured":"AI, M.: Llama 2: Open foundation and fine-tuned chat models (2023). https:\/\/ai.meta.com\/llama\/"},{"key":"5_CR3","unstructured":"AI, M.: Mistral 7B (2023). https:\/\/mistral.ai\/news\/introducing-mistral-7b\/"},{"key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124","volume":"189","author":"A Aldweesh","year":"2020","unstructured":"Aldweesh, A., Derhab, A., Emam, A.Z.: Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl.-Based Syst. 189, 105124 (2020)","journal-title":"Knowl.-Based Syst."},{"key":"5_CR5","unstructured":"Brown, T., et al.: Language models are few-shot learners advances. In: Proceedings of the 34th International Conference on Neural Information Processing Systems, p.\u00a033 (2020)"},{"key":"5_CR6","unstructured":"Cloud, A.: Qwen2: The next generation of Qwen models (2024). https:\/\/huggingface.co\/Qwen\/Qwen2-7B"},{"key":"5_CR7","unstructured":"Dettmers, T., Beiranvand, E., Shoeybi, M., et\u00a0al.: PEFT: State-of-the-art parameter-efficient fine-tuning methods. https:\/\/github.com\/huggingface\/peft (2023). hugging Face"},{"issue":"1","key":"5_CR8","first-page":"1","volume":"8","author":"O Aeraj","year":"2024","unstructured":"Aeraj, O., Leghris, C.: Analysis of the snort intrusion detection system using machine learning. Int. J. Inf. Sci. Technol. 8(1), 1\u20139 (2024)","journal-title":"Int. J. Inf. Sci. Technol."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Essid, M., Jemili, F., Korbaa, O.: Distributed architecture of snort ids in cloud environment. In: Intelligent Systems Design and Applications: 19th International Conference on Intelligent Systems Design and Applications (ISDA 2019) held December 3-5, 2019 19, pp. 100\u2013111. Springer (2021)","DOI":"10.1007\/978-3-030-49342-4_10"},{"key":"5_CR10","unstructured":"Face, H.: PEFT: Parameter-efficient fine-tuning of transformers. https:\/\/github.com\/huggingface\/peft (2023). Accessed July 2025"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Alwahedi, F., Battah, A., Cherif, B., Mechri, A., Tihanyi, N.: Generative AI and large language models for cyber security: All insights you need. Available at SSRN 4853709 (2024)","DOI":"10.2139\/ssrn.4853709"},{"key":"5_CR12","unstructured":"Houlsby, N., et al.: Parameter-efficient transfer learning for NLP. In: International Conference on Machine Learning, pp. 2790\u20132799. PMLR (2019)"},{"issue":"2","key":"5_CR13","first-page":"3","volume":"1","author":"EJ Hu","year":"2022","unstructured":"Hu, E.J., et al.: LoRA: low-rank adaptation of large language models. ICLR 1(2), 3 (2022)","journal-title":"ICLR"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Hu, X., et al.: A LLM-based agent for the automatic generation and generalization of IDS rules. In: 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1875\u20131880. IEEE (2024)","DOI":"10.1109\/TrustCom63139.2024.00259"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Hu, Z., et al.: LLM-adapters: An adapter family for parameter-efficient fine-tuning of large language models. arXiv preprint arXiv:2304.01933 (2023)","DOI":"10.18653\/v1\/2023.emnlp-main.319"},{"key":"5_CR16","unstructured":"Lee, A.N., Hunter, C.J., Ruiz, N.: Platypus: Quick, cheap, and powerful refinement of LLMs. arXiv preprint arXiv:2308.07317 (2023)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Lester, B., Al-Rfou, R., Constant, N.: The power of scale for parameter-efficient prompt tuning. arXiv preprint arXiv:2104.08691 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.243"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Li, X.L., Liang, P.: Prefix-tuning: Optimizing continuous prompts for generation. arXiv preprint arXiv:2101.00190 (2021)","DOI":"10.18653\/v1\/2021.acl-long.353"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Likhar, P., Yadav, R.S.: Impacts of replace venerable iptables and embrace Nftables in a new futuristic Linux firewall framework. In: 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), pp. 1735\u20131742. IEEE (2021)","DOI":"10.1109\/ICCMC51019.2021.9418298"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Louro, B., Abreu, R., Cabral\u00a0Costa, J., F.\u00a0Sequeiros, J.B., M.\u00a0In\u00e1cio, P.R.: Analysis of the capability and training of chat bots in the generation of rules for firewall or intrusion detection systems. In: Proceedings of the 19th International Conference on Availability, Reliability and Security, pp.\u00a01\u20137 (2024)","DOI":"10.1145\/3664476.3670902"},{"key":"5_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106301","volume":"92","author":"M Masdari","year":"2020","unstructured":"Masdari, M., Khezri, H.: A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Appl. Soft Comput. 92, 106301 (2020)","journal-title":"Appl. Soft Comput."},{"key":"5_CR22","unstructured":"Proofpoint, Inc.: Emerging threats open ruleset. https:\/\/rules.emergingthreats.net\/ (2024). Accessed 03 July 2025"},{"issue":"1","key":"5_CR23","first-page":"1","volume":"15","author":"G Sebastian","year":"2023","unstructured":"Sebastian, G.: Privacy and data protection in ChatGPT and other AI chatbots: strategies for securing user information. Int. J. Secur. Priv. Pervasive Comput. (IJSPPC) 15(1), 1\u201314 (2023)","journal-title":"Int. J. Secur. Priv. Pervasive Comput. (IJSPPC)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Sowmya, T., Anita, E.M.: A comprehensive review of AI based intrusion detection system. Measur. Sens. 28, 100827 (2023)","DOI":"10.1016\/j.measen.2023.100827"},{"key":"5_CR25","unstructured":"Unsloth AI: Fine-tuning guide. https:\/\/docs.unsloth.ai\/get-started\/fine-tuning-guide (2024). Accessed 5 May 2025"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Yamamoto, Y., Yamaguchi, S.: On an LLM-based method to generate from PoC codes to IPS\/IDS rules. In: 2025 International Conference on Electronics, Information, and Communication (ICEIC), pp.\u00a01\u20135. IEEE (2025)","DOI":"10.1109\/ICEIC64972.2025.10879613"},{"key":"5_CR27","unstructured":"Zhao, et\u00a0al.: A survey of large language models. arXiv preprint arXiv:2303.182231(2) (2023)"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06155-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T05:22:17Z","timestamp":1758604937000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06155-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,24]]},"ISBN":["9783032061546","9783032061553"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06155-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,24]]},"assertion":[{"value":"24 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Security and Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nics.uma.es\/stm2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}