INSIDER THREAT DETECTION USING GRAPH NEURAL NETWORKS ON ENTERPRISE ACCESS LOGS

Authors

  • Anubhab Sen

Subjects/Theme:

Insider Threat Detection, Graph Neural Networks, Enterprise Security, Access Logs, Anomaly Detection, Cybersecurity Analytics, Deep Learning, Behavioral Modeling

Description

Security and Privacy in AI Systems,

Edited By: Dr. Sunita Chaudhary, Dr. Joydeb Patra

ISBN (978-81-685212-9-2)  

Insider threats represent a critical challenge in modern enterprise security, often resulting in significant financial and reputational damage. Traditional detection systems relying on rule-based or statistical methods struggle to capture complex relationships embedded within enterprise access logs. This paper proposes a novel framework leveraging Graph Neural Networks (GNNs) to model user-entity interactions and detect anomalous insider behavior. By transforming access logs into graph structures, where users, devices, and resources are represented as nodes and their interactions as edges, GNNs effectively learn relational patterns and detect deviations indicative of malicious intent. Experimental evaluation on benchmark datasets demonstrates improved detection accuracy, reduced false positives, and enhanced interpretability compared to traditional machine learning models. The study highlights the potential of GNN-based approaches in strengthening enterprise cybersecurity frameworks.

Downloads

Published

2025-01-30

How to Cite

Anubhab Sen. (2025). INSIDER THREAT DETECTION USING GRAPH NEURAL NETWORKS ON ENTERPRISE ACCESS LOGS. International Multidisciplinary Book Series, 3. Retrieved from https://ibseries.com/index.php/IMBS/article/view/42

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.

Loading...