About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part I

Research Article

Zero-Day Insider Threat Detection via Attention-Based Neural Networks on Synthetic Access Logs

Download9 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.28-4-2025.2357943,
        author={Deepthi  Bolukonda and Rupesh Kumar  Mishra and Indrajeet  Gupta},
        title={Zero-Day Insider Threat Detection via Attention-Based Neural Networks on Synthetic Access Logs},
        proceedings={Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part I},
        publisher={EAI},
        proceedings_a={ICITSM PART I},
        year={2025},
        month={10},
        keywords={insider threat detection zero-day attack detection synthetic data generation attention-based gru anomaly detection},
        doi={10.4108/eai.28-4-2025.2357943}
    }
    
  • Deepthi Bolukonda
    Rupesh Kumar Mishra
    Indrajeet Gupta
    Year: 2025
    Zero-Day Insider Threat Detection via Attention-Based Neural Networks on Synthetic Access Logs
    ICITSM PART I
    EAI
    DOI: 10.4108/eai.28-4-2025.2357943
Deepthi Bolukonda1,*, Rupesh Kumar Mishra1, Indrajeet Gupta1
  • 1: SR University, India
*Contact email: deepthiraya@gmail.com

Abstract

Insider threats especially zero-day threats by privileged users are hard to defend in cybersecurity because it is hard to adjust attack rules for them, the lack of signature is not disturbing and it is kind of a rare data to be marked. Current detection methods, such as rule-based systems, statistical anomaly detection, and supervised learning, struggle to detect new insider behaviors, especially closeness to genuine activities. In addition, lack of access to real insider threat data poses a challenge in the development of accurate models because of privacy and confidentiality issues. In order to tackle these challenges, we propose a hybrid solution that leverages the generation of synthetic data through GANbased models (i.e., CTGAN, TVAE, and CopulaGAN) complemented by an attentionbased GRU (Gated Recurrent Unit) neural network. GANs are utilized to enrich the training data set by synthesizing realistic malicious and benign activity logs to emulate zero-day insider behaviors. The GRU model's use of attention fosters interpretability so that network can pay attention to user actions that are contextually relevant in an activity session. The experiments over the CERT Insider Threat Dataset v6. 2 show that our approach substantially outperforms the detection ability to reach F1-score of 0.89 and Zero-Day Detection AUC of 0.92. Additionally, the model also generalizes well to new user roles, demonstrating its ability to recognize intricate and stealthy insider behaviors.

Keywords
insider threat detection, zero-day attack detection, synthetic data generation, attention-based gru, anomaly detection
Published
2025-10-13
Publisher
EAI
http://dx.doi.org/10.4108/eai.28-4-2025.2357943
Copyright © 2025–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL