SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
BLITHE: BEHAVIOR RULE BASED INSIDER THREAT DETECTION
FOR SMART GRID
ABSTRACT
A Behavior ruLe based methodology is proposed for Insider THrEat detection
(BLITHE) of data monitor devices in smart grid, where the continuity and accuracy of
operations are of vital importance. Based on the DC power flow model and state estimation
model, three behavior rules are extracted to depict the behavior norms of each device,
such that a device (trustee) that is being monitored on its behavior can be easily checked
on the deviation from the behavior specification. Specifically, a rule-weight and
compliance-distance based grading strategy is designed, which greatly improves the
effectiveness of the traditional grading strategy for evaluation of trustees. The statistical
property, i.e., the mathematical expectation of compliance degree of each trustee, is
particularly analyzed from both theoretical and practical perspectives, which
achieves satisfactory trade-off between detection accuracy and false alarms to detect
more sophisticated and hidden attackers.
INTRODUCTION
Smart grid, as widely considered to be the next generation of the power grid, has
attracted considerable attention. As a typical cyber-physical system (CPS), smart grid
incorporates information and communications technology (ICT) into the traditional
power system and is characterized by sophisticated reliability, efficiency, economy,
and sustainability. To ensure that smart grid can operate continuously even when some
components fail, power research communities use meters or phasor measurement units
(PMUs), placed at important locations of the power system, to monitor system components
and report their measurements to the control centre (CC), and the latter can estimate the
state variables based on the meter measurements. The estimation utilizes state estimation
model, which heavily relies on the accuracy of the reported measurements that CC
receives. Recently, smart grid researchers have realized the threat of bad
measurements (or information corruption) and developed techniques to address this
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
challenge. Information corruption threats in smart grid are very complex, as they can
come from both outsider and insider. Particularly, due to the openness brought by
integrating ICT into the power system, some devices could be compromised and
become insider attackers. While great efforts have been made to resist the outsider attacks,
much less attention has been paid to the insider ones because of the difficulties
stemmed from their concealment and potentiality. Today, even though the insider threat
detection for CPS has attracted considerable concern due to the dire consequence of CPS
failure, the effective and accurate detection techniques for CPS, especially for smart
grid, are still in their infancy with very few studies conducted.
PROBLEM STATEMENT
 Generally, insider threat detection techniques can be classified into three types:
signature-based, anomaly-based and specification-based techniques.
 Signature-based detection technique is exceedingly capable of identifying known
attacks; it cannot effectively cope with unknown attacker patterns.
 The proposed anomaly-based schemes utilize resource constrained sensors and/or
actuators for outlining anomaly patterns, which suffers from high computational
overhead in detecting insider threats and generally has high rates of false alarms.
 Specification-based techniques have been proposed only for insider threat detection of
misbehaving patterns in communication protocols.
 Because all electrical devices are connected as a whole system and each state
variable should manifest specific compliance to make smart grid to be equilibrious,
the topology restriction and data correlation indeed exist in smart grid.
Therefore, behavior rule specifications can be taken good advantage of to depict
the behavior criteria and norms of all devices in the system. However, due to
the complexity of smart grid and the potentiality and concealment of insider
threats, to design an efficient and effective behavior rule specification based
insider threat detection methodology for smart grid still faces many challenges.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
EXISTING SYSTEM
False positive probability method
 There were no numerical data studies regarding the false positive probability pfp and
the false negative probability pfn. Even though three of them had miniature
numerical data, one or two data points characterizing pfn=pfp, instead of a data
set that could be transformed into a receiver operating characteristic (ROC)
figure, i.e., a pfn versus pfp curve, are studied merely.
 One of them proposed an insider threat detection technique which can
effectively balance small false positives pfp for a high detection probability 1pfn to
deal with more sophisticated and hidden threats to support secure applications in
smart grid.
 Two of them tried to exploit the topology restriction and data correlation of smart grid
to detect insider threats.
Disadvantages
 Since it only addressed very high-level requirements in smart grid, it is too coarse-
grained to be applied in practical scenarios.
 Because both of them only consider the very specific scenarios of smart grid, they are
not universal and effective solutions.
Flocking-based method
 Flocking-based modeling paradigm is designed to identify insider threats for the
transient stability process of smart grid. Observing the characteristics of smart
grid from a hierarchical cyber-physical perspective, natural physical
couplings amongst power systems are leveraged as telltale signs to identify
insider cyber threats.
Disadvantages
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
 Threat model is limited to narrow scenarios of the transient stability process,
which is urgent to be extended to generalized circumstances covering the stability
process of smart grid. State estimation model
 Liu et al. proposed one adaptive partitioning state estimation (APSE) method to
detect bad data injections in smart grid. APSE divides the large system into
several subsystems, and the detection procedures are continuously performed
in yielded subsystems until the place of the insider threat is located.
PROPOSED SYSTEM
 To propose behavior rule based insider threat detection (BLITHE)
methodology for smart grid, which can improve the accuracy of detection with
very low false alarms.
 With comprehensive and accurate behavior rule definitions, proposed
methodology can also be easily generalized to other CPSs.
 Considering the fact that each rule usually has different effect and
prominence on evaluation of the compliance degree of trustee, the rule-weight
and compliance distance based grading strategy is designed to improve the
traditional evaluation strategy.
Advantages
 Trade-off between detection accuracy and false alarms of insider threat detection
HARDWARE REQUIREMENTS
Processor : Any Processor above 500 MHz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System : Windows Family.
Techniques : JDK 1.5 or higher
Database : MySQL 5.0

Mais conteúdo relacionado

Destaque

Simon Lai_Best Performance Award
Simon Lai_Best Performance AwardSimon Lai_Best Performance Award
Simon Lai_Best Performance AwardSimon Lai
 
Trabalho sobre martin luther king jr. de ADRIEL SILVEIRA XAVIER
Trabalho sobre martin luther king jr. de ADRIEL SILVEIRA XAVIERTrabalho sobre martin luther king jr. de ADRIEL SILVEIRA XAVIER
Trabalho sobre martin luther king jr. de ADRIEL SILVEIRA XAVIERAdriel Silveira
 
Scalabrini Recommendation Letter Regular
Scalabrini Recommendation Letter RegularScalabrini Recommendation Letter Regular
Scalabrini Recommendation Letter RegularMary Calkin
 
Elección presidencial de los estados unidos 2016
Elección presidencial de los estados unidos 2016Elección presidencial de los estados unidos 2016
Elección presidencial de los estados unidos 2016Gersy Milla
 
CARLOSVÁZQUEZEFFCinterview
CARLOSVÁZQUEZEFFCinterviewCARLOSVÁZQUEZEFFCinterview
CARLOSVÁZQUEZEFFCinterviewvazqueztejero
 
Why u buy garrys mod
Why u buy garrys modWhy u buy garrys mod
Why u buy garrys modAntony Scott
 
Mètodo de cientifico
Mètodo de cientificoMètodo de cientifico
Mètodo de cientificogjuoiupto
 
Grr ithm's special presentation april
Grr ithm's special presentation aprilGrr ithm's special presentation april
Grr ithm's special presentation aprilScott Cote
 

Destaque (20)

CDE Marketplace: University of South Wales
CDE Marketplace: University of South WalesCDE Marketplace: University of South Wales
CDE Marketplace: University of South Wales
 
Simon Lai_Best Performance Award
Simon Lai_Best Performance AwardSimon Lai_Best Performance Award
Simon Lai_Best Performance Award
 
Trabalho sobre martin luther king jr. de ADRIEL SILVEIRA XAVIER
Trabalho sobre martin luther king jr. de ADRIEL SILVEIRA XAVIERTrabalho sobre martin luther king jr. de ADRIEL SILVEIRA XAVIER
Trabalho sobre martin luther king jr. de ADRIEL SILVEIRA XAVIER
 
Scalabrini Recommendation Letter Regular
Scalabrini Recommendation Letter RegularScalabrini Recommendation Letter Regular
Scalabrini Recommendation Letter Regular
 
Trabajo #7
Trabajo #7Trabajo #7
Trabajo #7
 
adani ent. ltd
adani ent. ltdadani ent. ltd
adani ent. ltd
 
Bancos forrajeros
Bancos forrajeros Bancos forrajeros
Bancos forrajeros
 
Elección presidencial de los estados unidos 2016
Elección presidencial de los estados unidos 2016Elección presidencial de los estados unidos 2016
Elección presidencial de los estados unidos 2016
 
CARLOSVÁZQUEZEFFCinterview
CARLOSVÁZQUEZEFFCinterviewCARLOSVÁZQUEZEFFCinterview
CARLOSVÁZQUEZEFFCinterview
 
walls
wallswalls
walls
 
Qmine 1
Qmine 1Qmine 1
Qmine 1
 
Why u buy garrys mod
Why u buy garrys modWhy u buy garrys mod
Why u buy garrys mod
 
Mètodo de cientifico
Mètodo de cientificoMètodo de cientifico
Mètodo de cientifico
 
Grr ithm's special presentation april
Grr ithm's special presentation aprilGrr ithm's special presentation april
Grr ithm's special presentation april
 
religiao
religiaoreligiao
religiao
 
Poster1
Poster1Poster1
Poster1
 
Pillole di plugins
Pillole di pluginsPillole di plugins
Pillole di plugins
 
Dzīvnieki
DzīvniekiDzīvnieki
Dzīvnieki
 
CDE Marketplace: Two Trees Photonics
CDE Marketplace: Two Trees PhotonicsCDE Marketplace: Two Trees Photonics
CDE Marketplace: Two Trees Photonics
 
Pde. planif i trimestre 2016 2017
Pde. planif i trimestre  2016 2017Pde. planif i trimestre  2016 2017
Pde. planif i trimestre 2016 2017
 

Semelhante a Blithe behavior rule based insider threat detection for smart grid

journal about operation management
journal about operation managementjournal about operation management
journal about operation managementgraphicdesigner79
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...Radita Apriana
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdfSarita30844
 
Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...Shakas Technologies
 
Behavior rule specification based ntrusion detection for safety critical medi...
Behavior rule specification based ntrusion detection for safety critical medi...Behavior rule specification based ntrusion detection for safety critical medi...
Behavior rule specification based ntrusion detection for safety critical medi...Shakas Technologies
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueIRJET Journal
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKIRJET Journal
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for amiIJCI JOURNAL
 
presentationggjjfdfbbjhggvnnjjgvvbbnn.pptx
presentationggjjfdfbbjhggvnnjjgvvbbnn.pptxpresentationggjjfdfbbjhggvnnjjgvvbbnn.pptx
presentationggjjfdfbbjhggvnnjjgvvbbnn.pptxGeetha982072
 
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET Journal
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...chennaijp
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...University of Southern California
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power systemShakas Technologies
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...Shakas Technologies
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsMary Calkins
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...IJECEIAES
 

Semelhante a Blithe behavior rule based insider threat detection for smart grid (20)

journal about operation management
journal about operation managementjournal about operation management
journal about operation management
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...
 
Behavior rule specification based ntrusion detection for safety critical medi...
Behavior rule specification based ntrusion detection for safety critical medi...Behavior rule specification based ntrusion detection for safety critical medi...
Behavior rule specification based ntrusion detection for safety critical medi...
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
presentationggjjfdfbbjhggvnnjjgvvbbnn.pptx
presentationggjjfdfbbjhggvnnjjgvvbbnn.pptxpresentationggjjfdfbbjhggvnnjjgvvbbnn.pptx
presentationggjjfdfbbjhggvnnjjgvvbbnn.pptx
 
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power system
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection Systems
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...
 

Mais de Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

Mais de Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Último

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 

Último (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 

Blithe behavior rule based insider threat detection for smart grid

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com BLITHE: BEHAVIOR RULE BASED INSIDER THREAT DETECTION FOR SMART GRID ABSTRACT A Behavior ruLe based methodology is proposed for Insider THrEat detection (BLITHE) of data monitor devices in smart grid, where the continuity and accuracy of operations are of vital importance. Based on the DC power flow model and state estimation model, three behavior rules are extracted to depict the behavior norms of each device, such that a device (trustee) that is being monitored on its behavior can be easily checked on the deviation from the behavior specification. Specifically, a rule-weight and compliance-distance based grading strategy is designed, which greatly improves the effectiveness of the traditional grading strategy for evaluation of trustees. The statistical property, i.e., the mathematical expectation of compliance degree of each trustee, is particularly analyzed from both theoretical and practical perspectives, which achieves satisfactory trade-off between detection accuracy and false alarms to detect more sophisticated and hidden attackers. INTRODUCTION Smart grid, as widely considered to be the next generation of the power grid, has attracted considerable attention. As a typical cyber-physical system (CPS), smart grid incorporates information and communications technology (ICT) into the traditional power system and is characterized by sophisticated reliability, efficiency, economy, and sustainability. To ensure that smart grid can operate continuously even when some components fail, power research communities use meters or phasor measurement units (PMUs), placed at important locations of the power system, to monitor system components and report their measurements to the control centre (CC), and the latter can estimate the state variables based on the meter measurements. The estimation utilizes state estimation model, which heavily relies on the accuracy of the reported measurements that CC receives. Recently, smart grid researchers have realized the threat of bad measurements (or information corruption) and developed techniques to address this
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com challenge. Information corruption threats in smart grid are very complex, as they can come from both outsider and insider. Particularly, due to the openness brought by integrating ICT into the power system, some devices could be compromised and become insider attackers. While great efforts have been made to resist the outsider attacks, much less attention has been paid to the insider ones because of the difficulties stemmed from their concealment and potentiality. Today, even though the insider threat detection for CPS has attracted considerable concern due to the dire consequence of CPS failure, the effective and accurate detection techniques for CPS, especially for smart grid, are still in their infancy with very few studies conducted. PROBLEM STATEMENT  Generally, insider threat detection techniques can be classified into three types: signature-based, anomaly-based and specification-based techniques.  Signature-based detection technique is exceedingly capable of identifying known attacks; it cannot effectively cope with unknown attacker patterns.  The proposed anomaly-based schemes utilize resource constrained sensors and/or actuators for outlining anomaly patterns, which suffers from high computational overhead in detecting insider threats and generally has high rates of false alarms.  Specification-based techniques have been proposed only for insider threat detection of misbehaving patterns in communication protocols.  Because all electrical devices are connected as a whole system and each state variable should manifest specific compliance to make smart grid to be equilibrious, the topology restriction and data correlation indeed exist in smart grid. Therefore, behavior rule specifications can be taken good advantage of to depict the behavior criteria and norms of all devices in the system. However, due to the complexity of smart grid and the potentiality and concealment of insider threats, to design an efficient and effective behavior rule specification based insider threat detection methodology for smart grid still faces many challenges.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM False positive probability method  There were no numerical data studies regarding the false positive probability pfp and the false negative probability pfn. Even though three of them had miniature numerical data, one or two data points characterizing pfn=pfp, instead of a data set that could be transformed into a receiver operating characteristic (ROC) figure, i.e., a pfn versus pfp curve, are studied merely.  One of them proposed an insider threat detection technique which can effectively balance small false positives pfp for a high detection probability 1pfn to deal with more sophisticated and hidden threats to support secure applications in smart grid.  Two of them tried to exploit the topology restriction and data correlation of smart grid to detect insider threats. Disadvantages  Since it only addressed very high-level requirements in smart grid, it is too coarse- grained to be applied in practical scenarios.  Because both of them only consider the very specific scenarios of smart grid, they are not universal and effective solutions. Flocking-based method  Flocking-based modeling paradigm is designed to identify insider threats for the transient stability process of smart grid. Observing the characteristics of smart grid from a hierarchical cyber-physical perspective, natural physical couplings amongst power systems are leveraged as telltale signs to identify insider cyber threats. Disadvantages
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Threat model is limited to narrow scenarios of the transient stability process, which is urgent to be extended to generalized circumstances covering the stability process of smart grid. State estimation model  Liu et al. proposed one adaptive partitioning state estimation (APSE) method to detect bad data injections in smart grid. APSE divides the large system into several subsystems, and the detection procedures are continuously performed in yielded subsystems until the place of the insider threat is located. PROPOSED SYSTEM  To propose behavior rule based insider threat detection (BLITHE) methodology for smart grid, which can improve the accuracy of detection with very low false alarms.  With comprehensive and accurate behavior rule definitions, proposed methodology can also be easily generalized to other CPSs.  Considering the fact that each rule usually has different effect and prominence on evaluation of the compliance degree of trustee, the rule-weight and compliance distance based grading strategy is designed to improve the traditional evaluation strategy. Advantages  Trade-off between detection accuracy and false alarms of insider threat detection HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb.
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION Operating System : Windows Family. Techniques : JDK 1.5 or higher Database : MySQL 5.0