{"id":"https://openalex.org/W7117896615","doi":"https://doi.org/10.1109/milcom64451.2025.11310333","title":"SSPNet: Semi-Supervised Prototypical Networks for Few-Shot Network Intrusion Detection","display_name":"SSPNet: Semi-Supervised Prototypical Networks for Few-Shot Network Intrusion Detection","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W7117896615","doi":"https://doi.org/10.1109/milcom64451.2025.11310333"},"language":null,"primary_location":{"id":"doi:10.1109/milcom64451.2025.11310333","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11310333","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121731200","display_name":"Umid Suleymanov","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Umid Suleymanov","raw_affiliation_strings":["Virginia Tech,Department of Computer Science,Blacksburg,VA,USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech,Department of Computer Science,Blacksburg,VA,USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087192873","display_name":"Murat Kantarc\u0131o\u011flu","orcid":"https://orcid.org/0000-0001-9795-9063"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Murat Kantarcioglu","raw_affiliation_strings":["Virginia Tech,Department of Computer Science,Blacksburg,VA,USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech,Department of Computer Science,Blacksburg,VA,USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121713529","display_name":"Kevin S. Chan","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin S Chan","raw_affiliation_strings":["DEVCOM Army Research Laboratory,Adelphi,MD,USA"],"affiliations":[{"raw_affiliation_string":"DEVCOM Army Research Laboratory,Adelphi,MD,USA","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121735713","display_name":"Michael J. De Lucia","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael De Lucia","raw_affiliation_strings":["DEVCOM Army Research Laboratory,Adelphi,MD,USA"],"affiliations":[{"raw_affiliation_string":"DEVCOM Army Research Laboratory,Adelphi,MD,USA","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051312448","display_name":"Kevin W. Hamlen","orcid":"https://orcid.org/0000-0003-0479-6280"},"institutions":[{"id":"https://openalex.org/I87573096","display_name":"University of North Texas at Dallas","ror":"https://ror.org/01n51v443","country_code":"US","type":"education","lineage":["https://openalex.org/I87573096"]},{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Hamlen","raw_affiliation_strings":["University of Texas at Dallas,Department of Computer Science,Dallas,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas,Department of Computer Science,Dallas,TX,USA","institution_ids":["https://openalex.org/I87573096","https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005002693","display_name":"Latifur Khan","orcid":"https://orcid.org/0000-0002-9300-1576"},"institutions":[{"id":"https://openalex.org/I87573096","display_name":"University of North Texas at Dallas","ror":"https://ror.org/01n51v443","country_code":"US","type":"education","lineage":["https://openalex.org/I87573096"]},{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Latifur Khan","raw_affiliation_strings":["University of Texas at Dallas,Department of Computer Science,Dallas,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas,Department of Computer Science,Dallas,TX,USA","institution_ids":["https://openalex.org/I87573096","https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032150808","display_name":"Sharad Mehrotra","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sharad Mehrotra","raw_affiliation_strings":["University of California,Department of Computer Science,Irvine,CA,USA"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Computer Science,Irvine,CA,USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121715949","display_name":"Ananthram Swami","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ananthram Swami","raw_affiliation_strings":["DEVCOM Army Research Laboratory,Adelphi,MD,USA"],"affiliations":[{"raw_affiliation_string":"DEVCOM Army Research Laboratory,Adelphi,MD,USA","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032318545","display_name":"B. Thuraisingham","orcid":null},"institutions":[{"id":"https://openalex.org/I87573096","display_name":"University of North Texas at Dallas","ror":"https://ror.org/01n51v443","country_code":"US","type":"education","lineage":["https://openalex.org/I87573096"]},{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bhavani Thuraisingham","raw_affiliation_strings":["University of Texas at Dallas,Department of Computer Science,Dallas,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas,Department of Computer Science,Dallas,TX,USA","institution_ids":["https://openalex.org/I87573096","https://openalex.org/I162577319"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5121731200"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66944386,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"800","last_page":"806"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8840000033378601,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8840000033378601,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.019500000402331352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.010200000368058681,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6800000071525574},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5062999725341797},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.5056999921798706},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4519999921321869},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4345000088214874},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.37369999289512634},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.3700999915599823},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.3614000082015991},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.3490999937057495}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7166000008583069},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6800000071525574},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5647000074386597},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5357000231742859},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5062999725341797},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.5056999921798706},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4519999921321869},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4345000088214874},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.37369999289512634},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.3700999915599823},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3614000082015991},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3490999937057495},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3176000118255615},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.31290000677108765},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.30660000443458557},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.2930999994277954},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.29019999504089355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28690001368522644},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.25949999690055847},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.25529998540878296},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.25290000438690186},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom64451.2025.11310333","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11310333","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6334090232849121,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W99485931","https://openalex.org/W2031163547","https://openalex.org/W2789828921","https://openalex.org/W3021740526","https://openalex.org/W4284686675","https://openalex.org/W4297957988","https://openalex.org/W4321503132","https://openalex.org/W4327750468","https://openalex.org/W4379659755","https://openalex.org/W4382281941","https://openalex.org/W4389279038","https://openalex.org/W4394717640","https://openalex.org/W4395108879","https://openalex.org/W4402352932","https://openalex.org/W4415124086"],"related_works":[],"abstract_inverted_index":{"Network":[0,146],"Intrusion":[1],"Detection":[2],"Systems":[3],"(NIDS)":[4],"play":[5],"a":[6,50,67],"crucial":[7],"role":[8],"in":[9,62,126,168,176],"protecting":[10],"digital":[11],"infrastructures":[12],"against":[13],"evolving":[14],"cyber":[15,179],"threats.":[16,180],"However,":[17],"the":[18,28,111,155,162,170],"increasing":[19,169],"sophistication":[20],"and":[21,80,121,149,172],"frequency":[22],"of":[23,164,174],"novel":[24,51,100],"attacks,":[25],"combined":[26],"with":[27,103],"limited":[29],"access":[30],"to":[31,38,55,97,99,137],"labeled":[32,105],"training":[33,53],"data,":[34],"pose":[35],"significant":[36],"challenges":[37],"traditional":[39],"machine":[40],"learning-based":[41],"detection":[42,90],"methods.":[43],"To":[44],"address":[45],"these":[46],"challenges,":[47],"we":[48,93],"propose":[49],"semi-supervised":[52,68,113,165],"schema":[54],"enhance":[56],"Prototypical":[57,114,119,157],"Networks":[58,115,120],"for":[59],"few-shot":[60,166],"learning":[61,79,167],"NIDS.":[63],"Our":[64,159],"approach":[65],"integrates":[66],"prototypical":[69],"loss":[70],"that":[71,110],"leverages":[72],"pseudo-labels":[73],"from":[74],"high-confidence":[75],"samples,":[76],"improving":[77],"representation":[78],"model":[81],"performance.We":[82],"evaluate":[83],"our":[84],"method":[85],"on":[86,144,152],"benchmark":[87],"network":[88],"intrusion":[89],"datasets,":[91],"where":[92,128],"demonstrate":[94],"its":[95],"ability":[96],"generalize":[98],"attack":[101,132],"classes":[102],"few":[104],"samples.":[106],"Experimental":[107],"results":[108],"show":[109],"proposed":[112],"(SSPNet)":[116],"outperforms":[117],"standard":[118,156],"other":[122],"competing":[123],"models,":[124],"particularly":[125],"scenarios":[127],"newly":[129],"introduced":[130],"target":[131],"categories":[133],"are":[134],"highly":[135],"dissimilar":[136],"source":[138],"attacks:":[139],"it":[140],"performs":[141],"24%":[142],"better":[143,151],"ACI-IoT-2023":[145],"Traffic":[147],"Dataset":[148],"15%":[150],"CICIDS2017":[153],"than":[154],"Networks.":[158],"findings":[160],"highlight":[161],"potential":[163],"adaptability":[171],"reliability":[173],"NIDS":[175],"countering":[177],"emerging":[178]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-01T00:00:00"}
