ZeSAI:基于零射击混合网络和威胁情报集成的电子邮件安全AI警惕恶意软件检测

IF 1.1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS
Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil
{"title":"ZeSAI:基于零射击混合网络和威胁情报集成的电子邮件安全AI警惕恶意软件检测","authors":"Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil","doi":"10.1007/s10878-025-01306-2","DOIUrl":null,"url":null,"abstract":"<p>In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"47 1","pages":""},"PeriodicalIF":1.1000,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration\",\"authors\":\"Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil\",\"doi\":\"10.1007/s10878-025-01306-2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.</p>\",\"PeriodicalId\":50231,\"journal\":{\"name\":\"Journal of Combinatorial Optimization\",\"volume\":\"47 1\",\"pages\":\"\"},\"PeriodicalIF\":1.1000,\"publicationDate\":\"2025-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Combinatorial Optimization\",\"FirstCategoryId\":\"100\",\"ListUrlMain\":\"https://doi.org/10.1007/s10878-025-01306-2\",\"RegionNum\":4,\"RegionCategory\":\"数学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Combinatorial Optimization","FirstCategoryId":"100","ListUrlMain":"https://doi.org/10.1007/s10878-025-01306-2","RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

在这个威胁不断发展的世界里,电子邮件安全正成为最大的问题之一,因为攻击者不断寻找新的技术来绕过现有的安全措施。包含网络钓鱼、恶意软件和其他安全威胁的电子邮件已经变得越来越普遍,这就是为什么需要实施新的、更有效的自适应威胁检测框架。通常,电子邮件安全产品在这些新出现的威胁中已经过时,因此需要在检测系统中发展成更有效和更智能的东西。为此,本文提出了基于零短学习的人工智能(ZeSAI)模型,作为提高电子邮件安全背景下威胁识别的新方法。最初,为了确保泛化和鲁棒性,该模型使用三种广泛的输入数据集:基于上下文保留合成电子邮件生成(CPSEG)方法的增强数据和对抗数据,这两种数据集都是从六个数据集和提供实时更新的威胁情报馈电中生成的。提出的ZeSAI模型通过结构化工作流增强了电子邮件威胁检测:极限语言网络(XLNet)首先从电子邮件内容中生成双向上下文嵌入,捕获细微的语义关系。然后,循环GRU网络(RGN)分析电子邮件数据中的时间模式,识别复杂的关系和随时间的变化。这些rgn提取的特征与跨模态融合层中xlnet生成的语义嵌入集成在一起。最后,零射击学习(Zero-Shot Learning, ZSL)利用这些组合的语义描述和上下文洞察力,根据新威胁与已知威胁的相似性来识别新威胁,从而实现鲁棒性和自适应威胁检测。提出的方法产生了良好的准确性和其他性能指标;准确率、召回率和f1分;在五倍和十倍交叉验证下。还进行了烧蚀研究,以确定每个模块的贡献。其中,商务邮件泄露(BEC)威胁检测准确率为98.51%,垃圾邮件检测准确率为96.8%,网络钓鱼检测准确率为99.18%,恶意软件附件检测准确率为97.2%,内部威胁检测准确率为98.58%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration

In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Combinatorial Optimization
Journal of Combinatorial Optimization 数学-计算机:跨学科应用
CiteScore
2.00
自引率
10.00%
发文量
83
审稿时长
6 months
期刊介绍: The objective of Journal of Combinatorial Optimization is to advance and promote the theory and applications of combinatorial optimization, which is an area of research at the intersection of applied mathematics, computer science, and operations research and which overlaps with many other areas such as computation complexity, computational biology, VLSI design, communication networks, and management science. It includes complexity analysis and algorithm design for combinatorial optimization problems, numerical experiments and problem discovery with applications in science and engineering. The Journal of Combinatorial Optimization publishes refereed papers dealing with all theoretical, computational and applied aspects of combinatorial optimization. It also publishes reviews of appropriate books and special issues of journals.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信