A FEDERATED MULTI-MODAL SYSTEM FOR INSIDER THREAT DETECTION IN ENERGY INFRASTRUCTURE USING BIOMETRIC AND CYBER DATA
DOI:
https://doi.org/10.55640/ijctisn-v02i01-01Keywords:
Insider threat detection, federated learning, multi-modal system, biometric authenticationAbstract
Insider threats pose significant risks to the operational continuity and security of critical energy infrastructure. This paper presents a federated multi-modal system that integrates biometric and cyber data to detect insider threats with high accuracy while preserving data privacy. The proposed architecture combines facial recognition, keystroke dynamics, and network activity logs using a federated learning framework, enabling decentralized model training across multiple nodes. This approach reduces data exposure risks and supports compliance with privacy regulations. Experimental evaluations on synthetic and real-world datasets demonstrate the system’s effectiveness in identifying anomalous user behavior patterns, outperforming centralized baselines in both detection rate and resilience. The study offers a scalable, privacy-aware solution for securing energy systems against internal cyber-physical threats.
References
Glasser, J., & Lindauer, B. (2013). Bridging the gap: A pragmatic approach to generating insider threat data. In 2013 IEEE Security and Privacy Workshops (pp. 98–104).
Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In AAAI Workshops.
McMahan, H. B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017). Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics (pp. 1273–1282).
Das, S., & Borisov, N. (2019). Privacy-preserving image feature extraction for face recognition. In Proceedings on Privacy Enhancing Technologies, (1), 203–219.
Salem, M. B., Hershkop, S., & Stolfo, S. J. (2008). A survey of insider attack detection research. In Insider Attack and Cyber Security (pp. 69–90). Springer.
Google AI Blog. (2017). Federated Learning: Collaborative Machine Learning without Centralized Training Data. Retrieved from https://ai.googleblog.com/2017/04/federated-learning-collaborative.html
Liu, W., Yang, L., & Lu, S. (2020). Federated learning for privacy-preserving network security systems. IEEE Network, 34(6), 20–25.
Hadjeres, G., & Nielsen, F. (2021). Detecting insider threats using keystroke dynamics and deep neural networks. Journal of Cybersecurity and Privacy, 1(1), 45–64.
ISO/IEC 27001:2013. Information Security Management Systems – Requirements. International Organization for Standardization.
National Institute of Standards and Technology (NIST). (2020). Guide to Industrial Control Systems (ICS) Security (Special Publication 800-82 Rev. 2).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Dr. Tanvi Das, James D. Walker (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.