Hi Matt,
I will just explain by an example.
Lets say that you have "ICMP network scan" signature. A person in the internal vlan just launches an ICMP scan for some public IP addresses. Now since the ICMP scan was originated by the internal host and directed againt the external public IP, inside users will be termed as attackers and the targetted system as the victim.
Just another question, what signatures are causing your internal users as the attackers?
Regards