Skip to main content

ORIGINAL RESEARCH article

Front. Phys.

Sec. Social Physics

Volume 13 - 2025 | doi: 10.3389/fphy.2025.1538605

Security Anomaly Detection for Enterprise Management Network Based on Attention Mechanism

Provisionally accepted
Zhaohan You Zhaohan You 1Yucai Zheng Yucai Zheng 2*
  • 1 Hong Kong Baptist University, Kowloon, Hong Kong, SAR China
  • 2 Hong Kong Metropolitan University, Hong Kong, China

The final, formatted version of the article will be published soon.

    With the rapid growth of data volume in enterprise management systems and the continuous complexity of network architecture, traditional network security protection methods are no longer sufficient to fully address the security challenges. In response to the problems of insufficient accuracy and high time consumption in traditional network security anomaly detection methods, this paper proposes a detection model combining attention mechanism based spatial convolutional network and gated attention transformer (AMSCN-GADetector). It is an enterprise management network security anomaly detection method based on deep learning, aiming to achieve efficient and intelligent monitoring and management of security anomaly data in enterprise management network. This method combines spatial convolutional network and gating mechanism, which are used to extract spatial features from enterprise management network security data and learn non-local interaction relationships between features. In addition, by introducing attention mechanism, AMSCN-GADetector can accurately calculate the importance weights of network security data features. This effectively reduces the loss of critical security information in the detection process. Finally, through comparative experiments, it is verified that AMSCN-GADetector exhibits superior detection performance compared to other models, providing solid technical support for the stable operation and long-term development of enterprise management.

    Keywords: Enterprise management network, attention mechanism, security, deep learning, anomaly detection

    Received: 03 Dec 2024; Accepted: 26 Feb 2025.

    Copyright: © 2025 You and Zheng. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Yucai Zheng, Hong Kong Metropolitan University, Hong Kong, China

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

    Research integrity at Frontiers

    Man ultramarathon runner in the mountains he trains at sunset

    94% of researchers rate our articles as excellent or good

    Learn more about the work of our research integrity team to safeguard the quality of each article we publish.


    Find out more