{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T01:26:33Z","timestamp":1769649993712,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819530601","type":"print"},{"value":"9789819530618","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3061-8_26","type":"book-chapter","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T05:02:50Z","timestamp":1762923770000},"page":"248-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semantic Information Extraction with\u00a0Language Models for\u00a0Zero-Day Attack Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4469-8320","authenticated-orcid":false,"given":"Shyamali Sinali","family":"Karunarathne","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6559-6736","authenticated-orcid":false,"given":"Sutharshan","family":"Rajasegarar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-8330","authenticated-orcid":false,"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Bilge, L., Dumitra\u015f, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proc. of the ACM Conf. on Computer and Communications Security, pp. 833\u2013844 (2012)","DOI":"10.1145\/2382196.2382284"},{"issue":"2","key":"26_CR2","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C Elkan","year":"2000","unstructured":"Elkan, C.: Results of the kdd\u201999 classifier learning. ACM SIGKDD Explorations Newsl 1(2), 63\u201364 (2000)","journal-title":"ACM SIGKDD Explorations Newsl"},{"issue":"1","key":"26_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s42484-024-00163-2","volume":"6","author":"M Hdaib","year":"2024","unstructured":"Hdaib, M., Rajasegarar, S., Pan, L.: Quantum deep learning-based anomaly detection for enhanced network security. Quantum Mach. Intell. 6(1), 26 (2024)","journal-title":"Quantum Mach. Intell."},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Miao, Y., Pan, L., Rajasegarar, S., Zhang, J., Leckie, C., Xiang, Y.: Distributed detection of zero-day network traffic flows. In: 15th Australasian Conf. on Data Mining, AusDM, pp. 173\u2013191. Springer (2018)","DOI":"10.1007\/978-981-13-0292-3_11"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Motlagh, F.N., Hajizadeh, M., Majd, M., Najafi, P., Cheng, F., Meinel, C.: Large language models in cybersecurity: State-of-the-art. arXiv preprint arXiv:2402.00891 (2024)","DOI":"10.5220\/0013377600003899"},{"issue":"13","key":"26_CR6","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: Ciciot 2023: a real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13), 5941 (2023)","journal-title":"Sensors"},{"issue":"3","key":"26_CR7","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/SURV.2013.112813.00168","volume":"16","author":"C O\u2019Reilly","year":"2014","unstructured":"O\u2019Reilly, C., Gluhak, A., Imran, M.A., Rajasegarar, S.: Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Commun. Surv. Tutorials 16(3), 1413\u20131432 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Pokhrel, S.R., Yang, L., Rajasegarar, S., Li, G.: Robust zero trust architecture: Joint blockchain based federated learning and anomaly detection based framework. In: Proc. of the SIGCOMM Workshop on Zero Trust Arch. for Next Gen. Comm., pp. 7\u201312 (2024)","DOI":"10.1145\/3672200.3673878"},{"issue":"4","key":"26_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","volume":"15","author":"S Rajasegarar","year":"2008","unstructured":"Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. 15(4), 34\u201340 (2008)","journal-title":"IEEE Wirel. Commun."},{"key":"26_CR10","unstructured":"Shilton, A., Rajasegarar, S., Palaniswami, M.: Multiclass anomaly detector: the cs++ support vector machine. Int. Mach. Learn. Res. 21(213), 1\u201339 (2020)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, Y., Guo, Y.: Unknown network attack detection method based on reinforcement zero-shot learning. J. Phys. Conf. Ser. 2303, 012008. IOP Publishing (2022)","DOI":"10.1088\/1742-6596\/2303\/1\/012008"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2017","unstructured":"Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., Zhu, M.: Hast-ids: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE access 6, 1792\u20131806 (2017)","journal-title":"IEEE access"},{"issue":"6","key":"26_CR13","first-page":"1","volume":"18","author":"J Yang","year":"2024","unstructured":"Yang, J., Jin, H., Tang, R., Han, X., Feng, Q., Jiang, H., Zhong, S., Yin, B., Hu, X.: Harnessing the power of llms in practice: a survey on chatgpt and beyond. ACM Trans. Knowl. Discov. Data 18(6), 1\u201332 (2024)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"26_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103580","volume":"212","author":"T Yi","year":"2023","unstructured":"Yi, T., Chen, X., Zhu, Y., Ge, W., Han, Z.: Review on the application of deep learning in network attack detection. J. Netw. Comput. Appl. 212, 103580 (2023)","journal-title":"J. Netw. Comput. Appl."},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"193981","DOI":"10.1109\/ACCESS.2020.3033494","volume":"8","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Liu, Q., Qiu, S., Zhou, S., Zhang, C.: Unknown attack detection based on zero-shot learning. IEEE Access 8, 193981\u2013193991 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3061-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T12:14:00Z","timestamp":1769602440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3061-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,13]]},"ISBN":["9789819530601","9789819530618"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3061-8_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,13]]},"assertion":[{"value":"13 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ksem2025.scimeeting.cn\/en\/web\/index\/27434","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}