Open Access iconOpen Access

ARTICLE

crossmark

Structure-Aware Malicious Behavior Detection through 2D Spatio-Temporal Modeling of Process Hierarchies

Seong-Su Yoon, Dong-Hyuk Shin, Ieck-Chae Euom*

System Security Research Center, Chonnam National University, Gwangju, 61186, Republic of Korea

* Corresponding Author: Ieck-Chae Euom. Email: email

(This article belongs to the Special Issue: Cutting-Edge Security and Privacy Solutions for Next-Generation Intelligent Mobile Internet Technologies and Applications)

Computer Modeling in Engineering & Sciences 2025, 145(2), 2683-2706. https://doi.org/10.32604/cmes.2025.071577

Abstract

With the continuous expansion of digital infrastructures, malicious behaviors in host systems have become increasingly sophisticated, often spanning multiple processes and employing obfuscation techniques to evade detection. Audit logs, such as Sysmon, offer valuable insights; however, existing approaches typically flatten event sequences or rely on generic graph models, thereby discarding the natural parent-child process hierarchy that is critical for analyzing multiprocess attacks. This paper proposes a structure-aware threat detection framework that transforms audit logs into a unified two-dimensional (2D) spatio-temporal representation, where process hierarchy is modeled as the spatial axis and event chronology as the temporal axis. In addition, entropy-based features are incorporated to robustly capture obfuscated and non-linguistic strings, overcoming the limitations of semantic embeddings. The model’s performance was evaluated on publicly available datasets, achieving competitive results with an accuracy exceeding 95% and an F1-score of at least 0.94. The proposed approach provides a promising and reproducible solution for detecting attacks with unknown indicators of compromise (IoCs) by analyzing the relationships and behaviors of processes recorded in large-scale audit logs.

Keywords

System security; anomaly detection; host-based log analysis; hierarchical process structure; machine learning; deep learning; malicious behavior

Cite This Article

APA Style
Yoon, S., Shin, D., Euom, I. (2025). Structure-Aware Malicious Behavior Detection through 2D Spatio-Temporal Modeling of Process Hierarchies. Computer Modeling in Engineering & Sciences, 145(2), 2683–2706. https://doi.org/10.32604/cmes.2025.071577
Vancouver Style
Yoon S, Shin D, Euom I. Structure-Aware Malicious Behavior Detection through 2D Spatio-Temporal Modeling of Process Hierarchies. Comput Model Eng Sci. 2025;145(2):2683–2706. https://doi.org/10.32604/cmes.2025.071577
IEEE Style
S. Yoon, D. Shin, and I. Euom, “Structure-Aware Malicious Behavior Detection through 2D Spatio-Temporal Modeling of Process Hierarchies,” Comput. Model. Eng. Sci., vol. 145, no. 2, pp. 2683–2706, 2025. https://doi.org/10.32604/cmes.2025.071577



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 318

    View

  • 128

    Download

  • 0

    Like

Share Link