A Survey of Heterogeneous Graph Neural Networks for Cybersecurity Anomaly Detection
arXiv:2510.26307v2 Announce Type: replace-cross Abstract: Anomaly detection is a critical task in cybersecurity, where identifying insider threats, access violations, and coordinated attacks is essential for ensuring system resilience. Graph-based approaches have become increasingly important for modeling entity interactions, yet most rely on homogeneous and static structures, which limits their ability to capture the heterogeneity and temporal evolution of real-world environments. Heterogeneous Graph Neural Networks (HGNNs) have emerged as a promising paradigm for anomaly detection by incorpo — Laura Jiang, Reza Ryan, Qian Li, Nasim Ferdosian
View PDF HTML (experimental)
Abstract:Anomaly detection is a critical task in cybersecurity, where identifying insider threats, access violations, and coordinated attacks is essential for ensuring system resilience. Graph-based approaches have become increasingly important for modeling entity interactions, yet most rely on homogeneous and static structures, which limits their ability to capture the heterogeneity and temporal evolution of real-world environments. Heterogeneous Graph Neural Networks (HGNNs) have emerged as a promising paradigm for anomaly detection by incorporating type-aware transformations and relation-sensitive aggregation, enabling more expressive modeling of complex cyber data. However, current research on HGNN-based anomaly detection remains fragmented, with diverse modeling strategies, limited comparative evaluation, and an absence of standardized benchmarks. To address this gap, we provide a comprehensive survey of HGNN-based anomaly detection methods in cybersecurity. We introduce a taxonomy that classifies approaches by anomaly type and graph dynamics, analyze representative models, and map them to key cybersecurity applications. We also review commonly used benchmark datasets and evaluation metrics, highlighting their strengths and limitations. Finally, we identify key open challenges related to modeling, data, and deployment, and outline promising directions for future research. This survey aims to establish a structured foundation for advancing HGNN-based anomaly detection toward scalable, interpretable, and practically deployable solutions.
Comments: 23 pages, 7 figures, 97 references. Submitted to Journal of Computer Security (under review)
Subjects:
Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Cite as: arXiv:2510.26307 [cs.CR]
(or arXiv:2510.26307v2 [cs.CR] for this version)
https://doi.org/10.48550/arXiv.2510.26307
arXiv-issued DOI via DataCite
Submission history
From: Shan Jiang [view email] [v1] Thu, 30 Oct 2025 09:49:59 UTC (1,357 KB) [v2] Sat, 28 Mar 2026 07:00:06 UTC (3,897 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
researchpaperarxivExclusive | Caltech Researchers Claim Radical Compression of High-Fidelity AI Models - WSJ
<a href="https://news.google.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?oc=5" target="_blank">Exclusive | Caltech Researchers Claim Radical Compression of High-Fidelity AI Models</a> <font color="#6f6f6f">WSJ</font>
Exclusive | Caltech Researchers Claim Radical Compression of High-Fidelity AI Models - WSJ
<a href="https://news.google.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?oc=5" target="_blank">Exclusive | Caltech Researchers Claim Radical Compression of High-Fidelity AI Models</a> <font color="#6f6f6f">WSJ</font>
Exclusive | Caltech Researchers Claim Radical Compression of High-Fidelity AI Models - WSJ
<a href="https://news.google.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?oc=5" target="_blank">Exclusive | Caltech Researchers Claim Radical Compression of High-Fidelity AI Models</a> <font color="#6f6f6f">WSJ</font>
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Research Papers

Hidden Helpers: Pittsburgh’s Industrial Past Might Hold the Key to a Cleaner Future
<p> <img loading="lazy" src="https://www.cmu.edu/news/sites/default/files/styles/listings_desktop_1x_/public/2026-03/260305B_WTM_Armbruster038.jpg.webp?itok=8RGXrI_N" width="900" height="508" alt="Researchers examine soil"> </p> Pittsburgh has reinvented itself from a steel powerhouse to a hub for health care and education. But the city’s industrial past left a hidden legacy: toxic compounds like benzene and toluene in the soil. While most life can’t survive such a contamination, some microbes adapted to use the pollutants as food.
XR is XR: Rethinking MR and XR as Neutral Umbrella Terms
arXiv:2603.29939v1 Announce Type: new Abstract: The term XR is currently widely used as an expression encompassing Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR). However, there is no clear consensus regarding its origin or meaning. XR is sometimes explained as an abbreviation for Extended Reality, but multiple interpretations exist regarding its etymology and formation process. This paper organizes the historical formation of terminology related to VR, AR, MR, and XR, and reexamines the context in which the term XR emerged and how it has spread. In particular, by presenting a timeline that distinguishes between the coinage of terms and the drivers of their adoption, we suggest that XR, as an umbrella term, functions not as an abbreviation of Extended Reality, but rat
Interview-Informed Generative Agents for Product Discovery: A Validation Study
arXiv:2603.29890v1 Announce Type: new Abstract: Large language models (LLMs) have shown strong performance on standardized social science instruments, but their value for product discovery remains unclear. We investigate whether interview-informed generative agents can simulate user responses in concept testing scenarios. Using in-depth workflow interviews with knowledge workers, we created personalized agents and compared their evaluations of novel AI concepts against the same participants' responses. Our results show that agents are distribution-calibrated but identity-imprecise: they fail to replicate the specific individual they are grounded in, yet approximate population-level response distributions. These findings highlight both the potential and the limits of LLM simulation in desig
Beyond Legacy OFDM: A Mobility-Adaptive Multi-Gear Framework for 6G
arXiv:2603.29721v1 Announce Type: new Abstract: While Third Generation Partnership Project (3GPP) has confirmed orthogonal frequency division multiplexing (OFDM) as the baseline waveform for sixth-generation (6G), its performance is severely compromised in the high-mobility scenarios envisioned for 6G. Building upon the GEARBOX-PHY vision, we present gear-switching OFDM (GS-OFDM): a unified framework in which the base station (BS) adaptively selects among three gears, ranging from legacy OFDM to delay-Doppler domain processing based on the channel mobility conditions experienced by the user equipments (UEs). We illustrate the benefit of adaptive gear switching for communication throughput and, finally, we conclude with an outlook on research challenges and opportunities.

Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!