About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part I

Research Article

Anomaly Detection through Behavior Analysis: A Deep Learning Approach for Identifying Unusual User Activities

Download11 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.28-4-2025.2357761,
        author={Deepthi  Bolukonda and Rupesh Kumar  Mishra and Indrajeet  Gupta},
        title={Anomaly Detection through Behavior Analysis: A Deep Learning Approach for Identifying Unusual User Activities},
        proceedings={Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part I},
        publisher={EAI},
        proceedings_a={ICITSM PART I},
        year={2025},
        month={10},
        keywords={anomaly detection residual network efficient channel attention test time training local outlier factor behavior analysis deep learning potential threats},
        doi={10.4108/eai.28-4-2025.2357761}
    }
    
  • Deepthi Bolukonda
    Rupesh Kumar Mishra
    Indrajeet Gupta
    Year: 2025
    Anomaly Detection through Behavior Analysis: A Deep Learning Approach for Identifying Unusual User Activities
    ICITSM PART I
    EAI
    DOI: 10.4108/eai.28-4-2025.2357761
Deepthi Bolukonda1,*, Rupesh Kumar Mishra1, Indrajeet Gupta1
  • 1: SR University
*Contact email: deepthiraya@gmail.com

Abstract

In the potential high-risk and threat cataloguing world of increasing cyber sophistication and behaviour, user activity anomaly detection is one tool from the protection arsenal to call upon. In this paper, we propose a multi-stage anomaly detection pipeline, which integrates unsupervised learning techniques, deep features and adaptive inference to reveal abnormal behaviour in a network environment, without relying on the raw attack labels. The method starts with the pre-processing and clustering of the data by K-means to divide similar behaviour profiles. Local Outlier Factor (LOF) is used afterwards to separate anomalies by local density differences. A ResNet-like deep learning model, enriched with Efficient Channel Attention (ECA), leverages hierarchical behavioural features, whilst Test-Time Training (TTT) supports instant model adaptation to progressive patterns at the inference time. The presented method was tested under different contamination levels, with best performance in the range of 20%-25% anomaly, yielding up to 96.8% accuracy, 97% precision, 97% recall, and with F1-score slightly over 95%, all with zero second detection delay. These findings demonstrate the capability of the system to detect insider threats and other behaviour-based anomalies in real time. The modular and transparent design of the framework enables it to be easily applied to various cybersecurity tasks.

Keywords
anomaly detection, residual network, efficient channel attention, test time training, local outlier factor, behavior analysis, deep learning, potential threats
Published
2025-10-13
Publisher
EAI
http://dx.doi.org/10.4108/eai.28-4-2025.2357761
Copyright © 2025–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL