Ye Xiaoyun, Cui Huangrongbin, Luo Faqin, Wang Jinlong, Xiong Xiaoyun, Zhang Wencui, Yu Jiawei, Zhao Wenhao
School of Information and Control Engineering, Qingdao University of Technology, Qingdao, 266520, China.
School of Business, Qingdao Binhai University, Qingdao, 266555, China.
Sci Rep. 2025 Aug 5;15(1):28590. doi: 10.1038/s41598-025-12063-x.
Internal threats are becoming more common in today's cybersecurity landscape. This is mainly because internal personnel often have privileged access, which can be exploited for malicious purposes. Traditional detection methods frequently fail due to data imbalance and the difficulty of detecting hidden malicious activities, especially when attackers conceal their intentions over extended periods. Most existing internal threat detection systems are designed to identify malicious users after they have acted. They model the behavior of normal employees to spot anomalies. However, detection should shift from targeting users to focusing on discrete work sessions. Relying on post hoc identification is unacceptable for businesses and organizations, as it detects malicious users only after completing their activities and leaving. Detecting threats based on daily sessions has two main advantages: it enables timely intervention before damage escalates and captures context-relevant risk factors. Our research introduces a novel detection framework for single-day employee behavior detection to address these issues. This framework combines the strengths of Temporal Convolutional Networks (TCNs) and the Transformer architecture. The integrated model uses sliding window technology to segment user logs into time series for model input. The TCN component employs causal and dilated convolutions to maintain temporal order and expand the receptive field, enhancing the detection of long-term patterns. The Transformer models global dependencies in sequences, improving the detection of complex long-term behaviors. The model detects anomalies at each time step and achieves a recall rate of [Formula: see text] with a sequence length of 30 days. Experimental results show that this method can accurately detect malicious behavior daily, promptly identify such actions, and effectively mitigate internal threats in complex environments.
在当今的网络安全环境中,内部威胁正变得越来越普遍。这主要是因为内部人员通常具有特权访问权限,可能会被用于恶意目的。由于数据不平衡以及难以检测隐藏的恶意活动,传统的检测方法常常失效,尤其是当攻击者长时间隐藏其意图时。大多数现有的内部威胁检测系统旨在在恶意用户采取行动后进行识别。它们对正常员工的行为进行建模以发现异常。然而,检测应从针对用户转向关注离散的工作会话。对于企业和组织来说,依赖事后识别是不可接受的,因为它只能在恶意用户完成活动并离开后才检测到他们。基于日常会话检测威胁有两个主要优点:它能够在损害升级之前及时进行干预,并捕捉与上下文相关的风险因素。我们的研究引入了一种用于单日员工行为检测的新型检测框架来解决这些问题。该框架结合了时间卷积网络(TCN)和Transformer架构的优势。集成模型使用滑动窗口技术将用户日志分割成时间序列作为模型输入。TCN组件采用因果卷积和扩张卷积来保持时间顺序并扩大感受野,增强对长期模式的检测。Transformer对序列中的全局依赖关系进行建模,改进对复杂长期行为的检测。该模型在每个时间步检测异常,在序列长度为30天时召回率达到[公式:见原文]。实验结果表明,该方法能够每天准确检测恶意行为,及时识别此类行为,并在复杂环境中有效缓解内部威胁。