{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:12:45Z","timestamp":1770153165374,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_21","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:10Z","timestamp":1770109090000},"page":"366-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HF-IDS: A Hybrid Method for\u00a0Fine-Grained Known\/Unknown Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Tianming","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Yixin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Feiyang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wenqian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","volume":"6","author":"I Ahmad","year":"2018","unstructured":"Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789\u201333795 (2018)","journal-title":"IEEE Access"},{"key":"21_CR2","unstructured":"Akamai: Akamai Internet Observatory. https:\/\/www.akamai.com\/zh\/internet-station"},{"issue":"3","key":"21_CR3","doi-asserted-by":"publisher","first-page":"311","DOI":"10.26599\/BDMA.2022.9020038","volume":"6","author":"H Attou","year":"2023","unstructured":"Attou, H., Guezzaz, A., Benkirane, S., Azrour, M., Farhaoui, Y.: Cloud-based intrusion detection approach using machine learning techniques. Big Data Min. Anal. 6(3), 311\u2013320 (2023)","journal-title":"Big Data Min. Anal."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LoF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"21_CR5","unstructured":"Cyberdefense, O.: Security Navigator 2024. https:\/\/www.orangecyberdefense.com\/global\/security-navigator"},{"key":"21_CR6","unstructured":"Canadian Institute for Cybersecurity: NSL-KDD dataset. https:\/\/www.unb.ca\/cic\/datasets\/nsl.html"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Fu, C., Li, Q., Shen, M., Xu, K.: Realtime robust malicious traffic detection via frequency domain analysis. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3431\u20133446 (2021)","DOI":"10.1145\/3460120.3484585"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Fuhr, J., Hanna, I., Wang, F., Tang, Y.: The diminished importance of connection-based features in intrusion detection. In: 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/IPCCC51483.2021.9679417"},{"key":"21_CR9","unstructured":"Han, D., et\u00a0al.: Anomaly detection in the open world: normality shift detection, explanation, and adaptation"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhao, Y., Hu, X., Botta, N., Ionescu, C., Chen, G.: Ecod: unsupervised outlier detection using empirical cumulative distribution functions. IEEE Trans. Knowl. Data Eng. (2022)","DOI":"10.2139\/ssrn.4313179"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"9","key":"21_CR12","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.3390\/s17091967","volume":"17","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17(9), 1967 (2017)","journal-title":"Sensors"},{"key":"21_CR13","unstructured":"Van\u00a0der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(11) (2008)"},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"2157","DOI":"10.1109\/TIFS.2021.3050605","volume":"16","author":"PF Marteau","year":"2021","unstructured":"Marteau, P.F.: Random partitioning forest for point-wise and collective anomaly detection-application to network intrusion detection. IEEE Trans. Inf. Forensics Secur. 16, 2157\u20132172 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089 (2018)","DOI":"10.14722\/ndss.2018.23204"},{"issue":"3","key":"21_CR16","doi-asserted-by":"publisher","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","volume":"6","author":"M Mohy-Eddine","year":"2023","unstructured":"Mohy-Eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Farhaoui, Y.: An ensemble learning based intrusion detection model for industrial IoT security. Big Data Min. Anal. 6(3), 273\u2013287 (2023)","journal-title":"Big Data Min. Anal."},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, Q.P., Lim, K.W., Divakaran, D.M., Low, K.H., Chan, M.C.: Gee: a gradient-based explainable variational autoencoder for network anomaly detection. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp. 91\u201399. IEEE (2019)","DOI":"10.1109\/CNS.2019.8802833"},{"issue":"8","key":"21_CR18","first-page":"3074","volume":"49","author":"M Nicolau","year":"2018","unstructured":"Nicolau, M., McDermott, J., et al.: Learning neural representations for network anomaly detection. IEEE Trans. Cybern. 49(8), 3074\u20133087 (2018)","journal-title":"IEEE Trans. Cybern."},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Patgiri, R., Varshney, U., Akutota, T., Kunde, R.: An investigation on intrusion detection system using machine learning. In: 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1684\u20131691. IEEE (2018)","DOI":"10.1109\/SSCI.2018.8628676"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Roopak, M., Tian, G.Y., Chambers, J.: Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0452\u20130457. IEEE (2019)","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"21_CR21","unstructured":"Sch\u00f6lkopf, B., Williamson, R.C., Smola, A., Shawe-Taylor, J., Platt, J.: Support vector method for novelty detection. In: Advances in Neural Information Processing Systems, vol. 12 (1999)"},{"key":"21_CR22","volume":"76","author":"M Soltani","year":"2023","unstructured":"Soltani, M., Ousat, B., Siavoshani, M.J., Jahangir, A.H.: An adaptable deep learning-based intrusion detection system to zero-day attacks. J. Inf. Secur. Appl. 76, 103516 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"21_CR23","first-page":"1","volume":"2020","author":"P Sun","year":"2020","unstructured":"Sun, P., et al.: Dl-ids: Extracting features using CNN-LSTM hybrid network for intrusion detection system. Secur. Commun. Netw. 2020, 1\u201311 (2020)","journal-title":"Secur. Commun. Netw."},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Tauscher, Z., Jiang, Y., Zhang, K., Wang, J., Song, H.: Learning to detect: a data-driven approach for network intrusion detection. In: 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/IPCCC51483.2021.9679415"},{"issue":"1","key":"21_CR25","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s10462-021-10037-9","volume":"55","author":"A Thakkar","year":"2022","unstructured":"Thakkar, A., Lohiya, R.: A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif. Intell. Rev. 55(1), 453\u2013563 (2022)","journal-title":"Artif. Intell. Rev."},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Tian, J.Y., et\u00a0al.: Few-shot learning-based network intrusion detection through an enhanced parallelized triplet network. Secur. Commun. Netw. 2022 (2022)","DOI":"10.1155\/2022\/3317048"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Wang, T., Lv, Q., Hu, B., Sun, D.: A few-shot class-incremental learning approach for intrusion detection. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/ICCCN52240.2021.9522260"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Wang, Z.M., Tian, J.Y., Qin, J., Fang, H., Chen, L.M.: A few-shot learning-based Siamese capsule network for intrusion detection with imbalanced training data. Comput. Intell. Neurosci. 2021 (2021)","DOI":"10.1155\/2021\/7126913"},{"key":"21_CR29","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"21_CR30","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1109\/TNET.2018.2819507","volume":"26","author":"K Xie","year":"2018","unstructured":"Xie, K., et al.: On-line anomaly detection with high accuracy. IEEE\/ACM Trans. Netw. 26(3), 1222\u20131235 (2018)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"21_CR31","doi-asserted-by":"publisher","first-page":"3540","DOI":"10.1109\/TIFS.2020.2991876","volume":"15","author":"C Xu","year":"2020","unstructured":"Xu, C., Shen, J., Du, X.: A method of few-shot network intrusion detection based on meta-learning framework. IEEE Trans. Inf. Forensics Secur. 15, 3540\u20133552 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"3538","DOI":"10.1109\/TIFS.2021.3083422","volume":"16","author":"J Yang","year":"2021","unstructured":"Yang, J., Chen, X., Chen, S., Jiang, X., Tan, X.: Conditional variational auto-encoder and extreme value theory aided two-stage learning approach for intelligent fine-grained known\/unknown intrusion detection. IEEE Trans. Inf. Forensics Secur. 16, 3538\u20133553 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR33","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Yousefi-Azar, M., Varadharajan, V., Hamey, L., Tupakula, U.: Autoencoder-based feature learning for cyber security applications. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 3854\u20133861. IEEE (2017)","DOI":"10.1109\/IJCNN.2017.7966342"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:17Z","timestamp":1770109097000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}