{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:58:59Z","timestamp":1773269939297,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":46,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_18","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:24:56Z","timestamp":1767320696000},"page":"332-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revealing the\u00a0Frailty of\u00a0Static Benchmarks: The DyNA-IDS Framework for\u00a0Concept Drift Adaptation in\u00a0Time-Series Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Kun","family":"Jia","sequence":"first","affiliation":[]},{"given":"Haizhen","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jiyun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiayin","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Ali, A.H., Charfeddine, M., Ammar, B., Al-Zoubi, M.B.: Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey. Front. Comput. Sci. 6, 1387354 (2024). https:\/\/doi.org\/10.3389\/fcomp.2024.1387354","DOI":"10.3389\/fcomp.2024.1387354"},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s13042-024-02100-3","volume":"16","author":"U Ali","year":"2025","unstructured":"Ali, U., Mahmood, T.: A novel framework for concept drift detection using autoencoders for classification problems in data streams. Int. J. Mach. Learn. Cybern. 16(1), 397\u2013418 (2025). https:\/\/doi.org\/10.1007\/s13042-024-02100-3","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"10","key":"18_CR3","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3991\/ijim.v14i10.13876","volume":"14","author":"MS Althabiti","year":"2020","unstructured":"Althabiti, M.S., Abdullah, M.: CDDM: concept drift detection model for data stream. Int. J. Interact. Mob. Technol. 14(10), 108\u2013121 (2020). https:\/\/doi.org\/10.3991\/ijim.v14i10.13876","journal-title":"Int. J. Interact. Mob. Technol."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Amalapuram, S.K., Tamma, B.R., Channappayya, S.S.: Spider: A semi-supervised continual learning-based network intrusion detection system. In: IEEE INFOCOM 2024-IEEE Conference on Computer Communications (2024)","DOI":"10.1109\/INFOCOM52122.2024.10621428"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Andresini, G., Pendlebury, F., Pierazzi, F., et al.: Insomnia: towards concept-drift robustness in network intrusion detection. In: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, pp. 111\u2013122 (2021)","DOI":"10.1145\/3474369.3486864"},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"2039","DOI":"10.1007\/s10115-023-02030-x","volume":"66","author":"A Angbera","year":"2024","unstructured":"Angbera, A., Chan, H.Y.: SABeDM: a sliding adaptive beta distribution model for concept drift detection in a dynamic environment. Knowl. Inf. Syst. 66(3), 2039\u20132062 (2024). https:\/\/doi.org\/10.1007\/s10115-023-02030-x","journal-title":"Knowl. Inf. Syst."},{"key":"18_CR7","unstructured":"Baena-Garc\u00eda, M., del Campo-\u00c1vila, J., Fidalgo, R., Bifet, A., Gavalda, R., Morales-Bueno, R.: Early drift detection method. In: Fourth International Workshop on Knowledge Discovery from Data Streams (2006)"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Bhurani, P., Chouhan, S.S., Mittal, N.: ExBCIL: an exemplar-based class incremental learning for intrusion detection system. Int. J. Mach. Learn. Cybern. 1\u201321 (2024). https:\/\/doi.org\/10.1007\/s13042-024-02166-z","DOI":"10.1007\/s13042-024-02166-z"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Bifet, A., Gavalda, R.: Learning from time-changing data with adaptive windowing. In: Proceedings of the 2007 SIAM International Conference on Data Mining, pp. 443\u2013448 (2007). https:\/\/doi.org\/10.1137\/1.9781611972771.40","DOI":"10.1137\/1.9781611972771.40"},{"issue":"11","key":"18_CR10","doi-asserted-by":"publisher","first-page":"4351","DOI":"10.1007\/s10994-023-06399-5","volume":"112","author":"V Cerqueira","year":"2023","unstructured":"Cerqueira, V., Gomes, H.M., Bifet, A., Bifet, G.: STUDD: a student\u2013teacher method for unsupervised concept drift detection. Mach. Learn. 112(11), 4351\u20134378 (2023). https:\/\/doi.org\/10.1007\/s10994-023-06399-5","journal-title":"Mach. Learn."},{"key":"18_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3414935","author":"Y Chai","year":"2024","unstructured":"Chai, Y., Chen, X., Qiu, J., et al.: MalFSCIL: a few-shot class-incremental learning approach for malware detection. IEEE Trans. Inf. Forensics Secur. (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3414935","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Faber, K., Corizzo, R., Sniezynski, B., Japkowicz, N.: Lifelong continual learning for anomaly detection: New challenges, perspectives, and insights. IEEE Access 12, 41364\u201341380 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3379109","DOI":"10.1109\/ACCESS.2024.3379109"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Feldhans, R., Wilke, A., Heindorf, S., et al.: Drift detection in text data with document embeddings. In: International Conference on Intelligent Data Engineering and Automated Learning, Springer, Cham, pp. 107\u2013118 (2021)","DOI":"10.1007\/978-3-030-91608-4_11"},{"issue":"3","key":"18_CR14","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TKDE.2014.2345382","volume":"27","author":"I Frias-Blanco","year":"2014","unstructured":"Frias-Blanco, I., del Campo-\u00c1vila, J., Ramos-Jimenez, G., Morales-Bueno, R.: Online and non-parametric drift detection methods based on Hoeffding\u2019s bounds. IEEE Trans. Knowl. Data Eng. 27(3), 810\u2013823 (2014). https:\/\/doi.org\/10.1109\/TKDE.2014.2345382","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"18_CR15","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.1007\/s10489-022-03598-1","volume":"53","author":"B Friedrich","year":"2023","unstructured":"Friedrich, B., Sawabe, T., Hein, A.: Unsupervised statistical concept drift detection for behaviour abnormality detection. Appl. Intell. 53(3), 2527\u20132537 (2023). https:\/\/doi.org\/10.1007\/s10489-022-03598-1","journal-title":"Appl. Intell."},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Gama, J., Medas, P., Castillo, G., Rodrigues, P.: Learning with drift detection. In: Advances in Artificial Intelligence\u2013SBIA 2004, pp. 286\u2013295. Springer, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-28645-5_29"},{"issue":"4","key":"18_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama, J., \u017dliobait\u0117, I., Bifet, A., Pechenizkiy, M., Bouchachia, A.: A survey on concept drift adaptation. ACM Comput. Surv. (CSUR) 46(4), 1\u201337 (2014). https:\/\/doi.org\/10.1145\/2523813","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Greco S, Vacchetti B, Apiletti D, et al. Unsupervised concept drift detection from deep learning representations in real-time. IEEE Trans. Knowl. Data Eng. (2025)","DOI":"10.1109\/TKDE.2025.3593123"},{"issue":"10","key":"18_CR19","doi-asserted-by":"publisher","first-page":"4709","DOI":"10.1007\/s13042-024-02096-w","volume":"15","author":"M Han","year":"2024","unstructured":"Han, M., Mu, D., Li, A., Wang, H.: Concept drift detection methods based on different weighting strategies. Int. J. Mach. Learn. Cybern. 15(10), 4709\u20134732 (2024). https:\/\/doi.org\/10.1007\/s13042-024-02096-w","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Huete, J., Qahtan, A.A., Hassani, M.: PrefixCDD: effective online concept drift detection over event streams using prefix trees. In: 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 328\u2013333 (2023). https:\/\/doi.org\/10.1109\/COMPSAC57700.2023.00055","DOI":"10.1109\/COMPSAC57700.2023.00055"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1007\/s10586-021-03228-4","volume":"24","author":"M Jain","year":"2021","unstructured":"Jain, M., Kaur, G.: Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data. Clust. Comput. 24(3), 2099\u20132114 (2021). https:\/\/doi.org\/10.1007\/s10586-021-03228-4","journal-title":"Clust. Comput."},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Jain, M., Kaur, G., Saxena, V.: A K-Means clustering and SVM based hybrid concept drift detection technique for network anomaly detection. Expert Syst. Appl. 193, 116510 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2021.116510","DOI":"10.1016\/j.eswa.2021.116510"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Jang M, Georgiadis A, Zhao Y, et al. DriftWatch: a tool that automatically detects data drift and extracts representative examples affected by drift. In: Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 6: Industry Track), pp. 335\u2013346 (2024)","DOI":"10.18653\/v1\/2024.naacl-industry.28"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Jaworski, M., Rutkowski, L., Angelov, P.: Concept drift detection using autoencoders in data streams processing. In: International Conference on Artificial Intelligence and Soft Computing, pp. 124\u2013133. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-61401-0_12"},{"issue":"1","key":"18_CR25","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1108\/IJPCC-08-2023-0212","volume":"21","author":"F Jemili","year":"2025","unstructured":"Jemili, F., Jouini, K., Korbaa, O.: Intrusion detection based on concept drift detection and online incremental learning. Int. J. Pervasive Comput. Commun. 21(1), 81\u2013115 (2025). https:\/\/doi.org\/10.1108\/IJPCC-08-2023-0212","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"18_CR26","doi-asserted-by":"publisher","unstructured":"Jin, Z., Zhou, J., Li, B., Chen, K., Zhang, H.: FL-IIDS: a novel federated learning-based incremental intrusion detection system. Future Gener. Comput. Syst. 151, 57\u201370 (2024). https:\/\/doi.org\/10.1016\/j.future.2023.09.011","DOI":"10.1016\/j.future.2023.09.011"},{"key":"18_CR27","unstructured":"Jothimurugesan, E., Hsieh, K., Wang, J., Bilen, C.: Federated learning under distributed concept drift. In: International Conference on Artificial Intelligence and Statistics, pp. 5834\u20135853. PMLR (2023)"},{"key":"18_CR28","unstructured":"Khaki S, Aditya A A, Karnin Z, et al. Uncovering drift in textual data: an unsupervised method for detecting and mitigating drift in machine learning models. arXiv preprint arXiv:2309.03831 (2023)"},{"issue":"4","key":"18_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3636247","volume":"18","author":"J Li","year":"2024","unstructured":"Li, J., Yu, H., Zhang, Z., Liu, A.: Concept drift adaptation by exploiting drift type. ACM Trans. Knowl. Discov. Data 18(4), 1\u201322 (2024). https:\/\/doi.org\/10.1145\/3636247","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"CoNEXT2","key":"18_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3609422","volume":"1","author":"S Liu","year":"2023","unstructured":"Liu, S., Bronzino, F., Schmitt, P., et al.: LEAF: navigating concept drift in cellular networks. Proc. ACM Networking 1(CoNEXT2), 1\u201324 (2023)","journal-title":"Proc. ACM Networking"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Lu P, Lu J, Liu A, et al. Early concept drift detection via prediction uncertainty. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 39, no. 18, pp. 19124\u201319132 (2025)","DOI":"10.1609\/aaai.v39i18.34105"},{"issue":"2","key":"18_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Van Den Hengel, A.: Deep learning for anomaly detection: a review. ACM Comput. Surv. (CSUR) 54(2), 1\u201338 (2021). https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Pesaranghader, A., Viktor, H.L.: Fast hoeffding drift detection method for evolving data streams. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 96\u2013111. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-46227-1_7"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Santos, S.G.T.C.: Gon\u00e7alves J\u00fanior, P.M., Silva, G.D.S.: Speeding up recovery from concept drifts. In: Machine Learning and Knowledge Discovery in Databases: European Conference. ECML PKDD 2014, pp. 179\u2013194. Springer, Berlin, Heidelberg (2014)","DOI":"10.1007\/978-3-662-44845-8_12"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Sebasti\u00e3o, R., Fernandes, J.M.: Supporting the page-hinkley test with empirical mode decomposition for change detection. In: International Symposium on Methodologies for Intelligent Systems, pp. 492\u2013498. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-60438-1_48"},{"key":"18_CR36","unstructured":"Senol, A., Agrawal, G., Liu, H.: Joint detection of fraud and concept drift in online conversations with LLM-assisted judgment. arXiv preprint arXiv:2505.07852 (2025)"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"18_CR38","doi-asserted-by":"publisher","unstructured":"Shyaa, M.A., Ibrahim, N.F., Zainol, Z., Al-Shargabi, A.A.: Evolving cybersecurity frontiers: a comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems. Eng. Appl. Artif. Intell. 137, 109143 (2024). https:\/\/doi.org\/10.1016\/j.engappai.2023.109143","DOI":"10.1016\/j.engappai.2023.109143"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Shyaa, M.A., Ibrahim, N.F., Zainol, Z., Al-Shargabi, A.A.: Reinforcement learning-based voting for feature drift-aware intrusion detection: an incremental learning framework. IEEE Access (2025), check for final publication details)","DOI":"10.1109\/ACCESS.2025.3544221"},{"issue":"CoNEXT4","key":"18_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3696400","volume":"2","author":"C Sun","year":"2024","unstructured":"Sun, C., Xu, K., Antichi, G., et al.: NetGSR: towards efficient and reliable network monitoring with generative super resolution. Proc. ACM Networking 2(CoNEXT4), 1\u201327 (2024)","journal-title":"Proc. ACM Networking"},{"key":"18_CR41","doi-asserted-by":"publisher","unstructured":"Wang, P., Jin, N., Davies, D., Krishnan, R., Lio, P.: Model-centric transfer learning framework for concept drift detection. Knowl.-Based Syst. 275, 110705 (2023). https:\/\/doi.org\/10.1016\/j.knosys.2023.110705","DOI":"10.1016\/j.knosys.2023.110705"},{"key":"18_CR42","doi-asserted-by":"publisher","unstructured":"Wang, S.T., Sun, S.S.: An incremental learning model for network intrusion detection systems. In: 2024 10th International Conference on Applied System Innovation (ICASI), pp. 362\u2013364 (2024). https:\/\/doi.org\/10.1109\/ICASI60965.2024.10549463","DOI":"10.1109\/ICASI60965.2024.10549463"},{"issue":"3","key":"18_CR43","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/TVT.2020.2971001","volume":"69","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Yang, J., Liu, M., et al.: LightAMC: lightweight automatic modulation classification via deep learning and compressive sensing. IEEE Trans. Veh. Technol. 69(3), 3491\u20133495 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"18_CR44","doi-asserted-by":"publisher","unstructured":"Widmer, G., Kubat, M.: Learning in the presence of concept drift and hidden contexts. Mach. Learn. 23, 69\u2013101 (1996). https:\/\/doi.org\/10.1007\/BF00116900","DOI":"10.1007\/BF00116900"},{"issue":"2","key":"18_CR45","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/IOTM.0001.2100012","volume":"4","author":"L Yang","year":"2021","unstructured":"Yang, L., Shami, A.: A lightweight concept drift detection and adaptation framework for IoT data streams. IEEE Internet Things Mag. 4(2), 96\u2013101 (2021)","journal-title":"IEEE Internet Things Mag."},{"key":"18_CR46","doi-asserted-by":"crossref","unstructured":"Yuan, L., Li, H., Xia, B., Chen, S., He, T., Chen, G.: Recent advances in concept drift adaptation methods for deep learning. In: Proceedings of the 31st International Joint Conference on Artificial Intelligence (IJCAI-22), pp. 5654\u20135661 (2022)","DOI":"10.24963\/ijcai.2022\/788"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:37:12Z","timestamp":1773214632000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}