Netinfo Security ›› 2025, Vol. 25 ›› Issue (2): 327-336.doi: 10.3969/j.issn.1671-1122.2025.02.012

Previous Articles     Next Articles

CNN-LSTM Algorithm-Based Insider Threat Detection Model

YANG Menghua, YI Junkai, ZHU Hejun()   

  1. School of Automation, Beijing Information Science and Technology University, Beijing 100085, China
  • Received:2024-12-03 Online:2025-02-10 Published:2025-03-07

Abstract:

The primary information security risks encountered by enterprises and organizations stem from internal threats, particularly malicious behaviors by internal personnel. These risks are inherently more covert and difficult to detect compared to external attacks. To improve the accuracy of detecting malicious behaviors by internal personnel, this study proposed an insider threat detection model based on the CNN-LSTM algorithm, utilizing user behavior log analysis. The model leveraged the publicly available CMU CERT R4.2 insider threat dataset to construct sequences of user behavior features. In this model, a CNN layer was first employed to extract key features from user behavior data, followed by an LSTM layer to capture temporal dependencies and predict behavior patterns. Finally, a fully connected layer is used to determine whether the behavior constitutes a threat. Comparative experiments with CNN, LSTM, and LSTM-CNN models validate the feasibility and superior performance of the proposed model in detecting insider threats, achieving an AUC score of 0.99. The experimental results further demonstrate that the CNN-LSTM algorithm significantly reduces the false positive rate and achieves a detection accuracy of 98%, effectively identifying potential internal threats within organizations.

Key words: insider threat detection, user behavior logs, CNN, LSTM

CLC Number: