{"id":"https://openalex.org/W4403445983","doi":"https://doi.org/10.1109/ojcoms.2024.3481895","title":"Few-Shot Class-Incremental Learning for Network Intrusion Detection Systems","display_name":"Few-Shot Class-Incremental Learning for Network Intrusion Detection Systems","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4403445983","doi":"https://doi.org/10.1109/ojcoms.2024.3481895"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2024.3481895","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3481895","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2024.3481895","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090871840","display_name":"Davide Di Monda","orcid":"https://orcid.org/0009-0000-3370-2226"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Davide Di Monda","raw_affiliation_strings":["Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000897225","display_name":"Antonio Montieri","orcid":"https://orcid.org/0000-0003-4340-442X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antonio Montieri","raw_affiliation_strings":["Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056577356","display_name":"Valerio Persico","orcid":"https://orcid.org/0000-0002-7477-1452"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Valerio Persico","raw_affiliation_strings":["Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114285909","display_name":"Pasquale Voria","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pasquale Voria","raw_affiliation_strings":["Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114285910","display_name":"Matteo De Ieso","orcid":"https://orcid.org/0009-0005-1401-1776"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Matteo De Ieso","raw_affiliation_strings":["Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064292700","display_name":"Antonio Pescap\u00e8","orcid":"https://orcid.org/0000-0002-0221-7444"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antonio Pescap\u00e8","raw_affiliation_strings":["Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e delle Tecnologie dell&#x2019;Informazione, University of Napoli Federico II, Naples, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5090871840"],"corresponding_institution_ids":[],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":4.07,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94567157,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"5","issue":null,"first_page":"6736","last_page":"6757"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9190999865531921,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12676","display_name":"Machine Learning and ELM","score":0.9182000160217285,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7310087084770203},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6375840902328491},{"id":"https://openalex.org/keywords/shot","display_name":"Shot (pellet)","score":0.6333128213882446},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5676164627075195},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49290943145751953},{"id":"https://openalex.org/keywords/incremental-learning","display_name":"Incremental learning","score":0.4910891056060791},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.46053197979927063},{"id":"https://openalex.org/keywords/one-shot","display_name":"One shot","score":0.41496044397354126},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3965544104576111},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1282636821269989},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.060605138540267944}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7310087084770203},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6375840902328491},{"id":"https://openalex.org/C2778344882","wikidata":"https://www.wikidata.org/wiki/Q278938","display_name":"Shot (pellet)","level":2,"score":0.6333128213882446},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5676164627075195},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49290943145751953},{"id":"https://openalex.org/C2780735816","wikidata":"https://www.wikidata.org/wiki/Q28324931","display_name":"Incremental learning","level":2,"score":0.4910891056060791},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.46053197979927063},{"id":"https://openalex.org/C2992734406","wikidata":"https://www.wikidata.org/wiki/Q413267","display_name":"One shot","level":2,"score":0.41496044397354126},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3965544104576111},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1282636821269989},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.060605138540267944},{"id":"https://openalex.org/C191897082","wikidata":"https://www.wikidata.org/wiki/Q11467","display_name":"Metallurgy","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcoms.2024.3481895","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3481895","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bd4edb29be314e6ea238dd0743948967","is_oa":true,"landing_page_url":"https://doaj.org/article/bd4edb29be314e6ea238dd0743948967","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 5, Pp 6736-6757 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2024.3481895","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3481895","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1975415766","https://openalex.org/W2473930607","https://openalex.org/W2560647685","https://openalex.org/W2743678626","https://openalex.org/W2750674396","https://openalex.org/W2789828921","https://openalex.org/W2954929116","https://openalex.org/W2959717179","https://openalex.org/W2963070905","https://openalex.org/W2963741406","https://openalex.org/W2963748489","https://openalex.org/W2964105864","https://openalex.org/W2995049146","https://openalex.org/W3007603430","https://openalex.org/W3009498435","https://openalex.org/W3034942609","https://openalex.org/W3040389479","https://openalex.org/W3080795476","https://openalex.org/W3080894165","https://openalex.org/W3096805028","https://openalex.org/W3108975329","https://openalex.org/W3112006757","https://openalex.org/W3119160111","https://openalex.org/W3179699704","https://openalex.org/W3188650517","https://openalex.org/W3197914403","https://openalex.org/W3199625283","https://openalex.org/W3204162860","https://openalex.org/W3213142719","https://openalex.org/W4283205402","https://openalex.org/W4285058242","https://openalex.org/W4293057055","https://openalex.org/W4322588479","https://openalex.org/W4322706638","https://openalex.org/W4379659755","https://openalex.org/W4385488530","https://openalex.org/W4386453433","https://openalex.org/W4389633720","https://openalex.org/W4391093278","https://openalex.org/W4391093786","https://openalex.org/W4391582490","https://openalex.org/W4395108879","https://openalex.org/W4399515631","https://openalex.org/W6717697761","https://openalex.org/W6736057607","https://openalex.org/W6758126075","https://openalex.org/W6768532476","https://openalex.org/W6781991486","https://openalex.org/W6798427651"],"related_works":["https://openalex.org/W2497720472","https://openalex.org/W4292659306","https://openalex.org/W3044321615","https://openalex.org/W2806221744","https://openalex.org/W2392603527","https://openalex.org/W2326937258","https://openalex.org/W394267150","https://openalex.org/W2773965352","https://openalex.org/W4294892107","https://openalex.org/W2390009783"],"abstract_inverted_index":{"In":[0],"today\u2019s":[1],"digital":[2],"landscape,":[3],"critical":[4],"services":[5],"are":[6],"increasingly":[7],"dependent":[8],"on":[9,111,132],"network":[10],"connectivity,":[11],"thus":[12],"cybersecurity":[13],"has":[14],"become":[15],"paramount.":[16],"Indeed,":[17],"the":[18,52,112,140,185,193,196,201,205,209,250,279],"constant":[19],"escalation":[20],"of":[21,57,85,147,187,195,249,254],"cyberattacks,":[22],"including":[23,166],"zero-day":[24],"exploits,":[25],"poses":[26],"a":[27,81,144],"significant":[28],"threat.":[29],"While":[30],"Network":[31],"Intrusion":[32],"Detection":[33],"Systems":[34],"(NIDSs)":[35],"leveraging":[36],"machine-learning":[37],"and":[38,60,92,108,173,204,257,292],"deep-learning":[39],"models":[40],"have":[41],"proven":[42],"effective":[43],"in":[44,72,153,169,252,288],"recent":[45,154],"studies,":[46],"they":[47],"encounter":[48],"limitations":[49,68,285],"such":[50],"as":[51,182],"need":[53],"for":[54,98],"abundant":[55],"samples":[56,189,236],"malicious":[58,167],"traffic":[59,150,188,202,268],"full":[61],"retraining":[62],"upon":[63],"encountering":[64],"new":[65,90,231],"attacks.":[66],"These":[67],"hinder":[69],"their":[70],"adaptability":[71],"real-world":[73],"scenarios.":[74],"To":[75],"address":[76],"these":[77],"challenges,":[78],"we":[79,120,282],"design":[80,180],"novel":[82],"NIDS":[83,142,218,262],"capable":[84],"promptly":[86],"adapting":[87,229],"to":[88,123,158,199,207,230,297],"classify":[89],"attacks":[91,232],"provide":[93],"timely":[94],"predictions.":[95],"Our":[96],"proposal":[97],"attack-traffic":[99],"classification":[100,210,255],"adopts":[101],"Few-Shot":[102,114],"Class-Incremental":[103],"Learning":[104],"(<monospace":[105,115],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[106,116,127,246],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">FSCIL</monospace>)":[107],"is":[109,151],"based":[110,131],"Rethinking":[113],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">RFS</monospace>)":[117],"approach,":[118],"which":[119],"experimentally":[121],"prove":[122],"overcome":[124],"other":[125],"<monospace":[126],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">FSCIL</monospace>":[128,247],"state-of-the-art":[129],"alternatives":[130],"either":[133],"meta-learning":[134],"or":[135],"transfer":[136],"learning.":[137],"We":[138,177],"evaluate":[139],"proposed":[141,217],"across":[143,162],"wide":[145],"array":[146],"cyberattacks":[148,174],"whose":[149],"collected":[152,269],"publicly":[155],"available":[156,237],"datasets":[157],"demonstrate":[159],"its":[160],"robustness":[161],"diverse":[163],"network-attack":[164],"scenarios,":[165],"activities":[168],"an":[170],"Internet-of-Things":[171],"context":[172],"targeting":[175],"servers.":[176],"validate":[178],"various":[179],"choices":[181],"well,":[183],"involving":[184],"number":[186],"per":[190],"attack":[191],"available,":[192],"impact":[194],"features":[197],"used":[198],"represent":[200],"objects,":[203],"time":[206,272],"deliver":[208],"verdict.":[211],"Experimental":[212],"results":[213],"witness":[214],"that":[215],"our":[216,261],"effectively":[219],"retains":[220],"previously":[221],"acquired":[222],"knowledge":[223],"(with":[224,238],"over":[225,239],"94%":[226],"F1-score)":[227],"while":[228,277],"with":[233,267],"only":[234],"few":[235],"98%":[240],"F1-score).":[241],"Thus,":[242],"it":[243],"outperforms":[244],"non-<monospace":[245],"state":[248],"art":[251],"terms":[253],"effectiveness":[256],"adaptation":[258],"time.":[259],"Moreover,":[260],"exhibits":[263],"high":[264],"performance":[265],"even":[266],"within":[270],"short":[271],"frames,":[273],"achieving":[274],"95%":[275],"F1-score":[276],"reducing":[278],"time-to-insight.":[280],"Finally,":[281],"identify":[283],"possible":[284],"likely":[286],"arising":[287],"specific":[289],"application":[290],"contexts":[291],"envision":[293],"promising":[294],"research":[295],"avenues":[296],"mitigate":[298],"them.":[299]},"counts_by_year":[{"year":2025,"cited_by_count":12}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
