International Journal of Cyber Threat Intelligence and Secure Networking

  1. Home
  2. Archives
  3. Vol. 2 No. 01 (2025): Volume 02 Issue 01
  4. Articles
International Journal of Cyber Threat Intelligence and Secure Networking

Article Details Page

A FEDERATED MULTI-MODAL SYSTEM FOR INSIDER THREAT DETECTION IN ENERGY INFRASTRUCTURE USING BIOMETRIC AND CYBER DATA

Authors

  • Dr. Tanvi Das School of Computer Science, National Institute of Technology Tiruchirappalli, India
  • James D. Walker Cyber-Physical Systems Laboratory, University of Texas at Austin, USA

DOI:

https://doi.org/10.55640/ijctisn-v02i01-01

Keywords:

Insider threat detection, federated learning, multi-modal system, biometric authentication

Abstract

Insider threats pose significant risks to the operational continuity and security of critical energy infrastructure. This paper presents a federated multi-modal system that integrates biometric and cyber data to detect insider threats with high accuracy while preserving data privacy. The proposed architecture combines facial recognition, keystroke dynamics, and network activity logs using a federated learning framework, enabling decentralized model training across multiple nodes. This approach reduces data exposure risks and supports compliance with privacy regulations. Experimental evaluations on synthetic and real-world datasets demonstrate the system’s effectiveness in identifying anomalous user behavior patterns, outperforming centralized baselines in both detection rate and resilience. The study offers a scalable, privacy-aware solution for securing energy systems against internal cyber-physical threats.

References

Glasser, J., & Lindauer, B. (2013). Bridging the gap: A pragmatic approach to generating insider threat data. In 2013 IEEE Security and Privacy Workshops (pp. 98–104).

Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In AAAI Workshops.

McMahan, H. B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017). Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics (pp. 1273–1282).

Das, S., & Borisov, N. (2019). Privacy-preserving image feature extraction for face recognition. In Proceedings on Privacy Enhancing Technologies, (1), 203–219.

Salem, M. B., Hershkop, S., & Stolfo, S. J. (2008). A survey of insider attack detection research. In Insider Attack and Cyber Security (pp. 69–90). Springer.

Google AI Blog. (2017). Federated Learning: Collaborative Machine Learning without Centralized Training Data. Retrieved from https://ai.googleblog.com/2017/04/federated-learning-collaborative.html

Liu, W., Yang, L., & Lu, S. (2020). Federated learning for privacy-preserving network security systems. IEEE Network, 34(6), 20–25.

Hadjeres, G., & Nielsen, F. (2021). Detecting insider threats using keystroke dynamics and deep neural networks. Journal of Cybersecurity and Privacy, 1(1), 45–64.

ISO/IEC 27001:2013. Information Security Management Systems – Requirements. International Organization for Standardization.

National Institute of Standards and Technology (NIST). (2020). Guide to Industrial Control Systems (ICS) Security (Special Publication 800-82 Rev. 2).

Downloads

Published

2025-01-15

How to Cite

A FEDERATED MULTI-MODAL SYSTEM FOR INSIDER THREAT DETECTION IN ENERGY INFRASTRUCTURE USING BIOMETRIC AND CYBER DATA. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(01), 1-8. https://doi.org/10.55640/ijctisn-v02i01-01

How to Cite

A FEDERATED MULTI-MODAL SYSTEM FOR INSIDER THREAT DETECTION IN ENERGY INFRASTRUCTURE USING BIOMETRIC AND CYBER DATA. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(01), 1-8. https://doi.org/10.55640/ijctisn-v02i01-01

Similar Articles

1-10 of 16

You may also start an advanced similarity search for this article.