A FEDERATED MULTI-MODAL SYSTEM FOR INSIDER THREAT DETECTION IN ENERGY INFRASTRUCTURE USING BIOMETRIC AND CYBER DATA
Abstract
Insider threats pose significant risks to the operational continuity and security of critical energy infrastructure. This paper presents a federated multi-modal system that integrates biometric and cyber data to detect insider threats with high accuracy while preserving data privacy. The proposed architecture combines facial recognition, keystroke dynamics, and network activity logs using a federated learning framework, enabling decentralized model training across multiple nodes. This approach reduces data exposure risks and supports compliance with privacy regulations. Experimental evaluations on synthetic and real-world datasets demonstrate the system’s effectiveness in identifying anomalous user behavior patterns, outperforming centralized baselines in both detection rate and resilience. The study offers a scalable, privacy-aware solution for securing energy systems against internal cyber-physical threats.
Keywords
References
Similar Articles
- Dr. Rohan Deshmukh, ARCHITECTING A ROBUST CYBER THREAT INTELLIGENCE CAPABILITY: A COMPREHENSIVE FRAMEWORK , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 02 (2025): Volume 02 Issue 02
- Prof. Dmitry V. Volkov, Dr. Kofi Agyapong, ADAPTIVE TRUST BOUNDARY ENFORCEMENT: A COMPREHENSIVE REVIEW OF ZERO TRUST ARCHITECTURE IMPLEMENTATION AND USABILITY CHALLENGES , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Marcus Fletcher, Dr. Elena Novak, ASSESSING AND ENSURING CYBERSECURITY AND RESILIENCE IN HEALTHCARE: A RISK AND CONFORMITY FRAMEWORK , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Mateo Alvarez-Ruiz, From Reactive to Predictive Security: Integrating Threat Intelligence with SIEM for Proactive Threat Hunting , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Claire Whitman, LEVERAGING CYBER THREAT INTELLIGENCE MINING FOR ENHANCED PROACTIVE CYBERSECURITY: A COMPREHENSIVE REVIEW AND FUTURE DIRECTIONS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Ahmed N. El-Tayeb, Miguel Ángel Ortega, INTEGRATING CYBER THREAT INTELLIGENCE WITHIN COMMERCIAL ENTERPRISES: A STRATEGIC FRAMEWORK FOR ENHANCED SECURITY POSTURE , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Thomas Becker, Kevin Brooks, STRENGTHENING CYBER RESILIENCE: A COMPREHENSIVE EVALUATION OF SOCIAL ENGINEERING AWARENESS PROGRAMS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Prof. Daniel M. Hughes, A HYBRID SECURE SPECTRUM ALLOCATION FRAMEWORK FOR SPACE-DIVISION MULTIPLEXING ELASTIC OPTICAL NETWORKS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 01 (2025): Volume 02 Issue 01
- Dr. Nisha Verma, Vinay Rajan, OPTIMIZING CRYPTOGRAPHIC HASH FUNCTION PERFORMANCE THROUGH AN EXTENDED SECURE HASH ALGORITHM (2080-BIT VARIANT) , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Farah Al-Mansouri, THE IMPLICIT LANGUAGE OF CYBERSECURITY: EDUCATIONAL CHALLENGES AND IMPLICATIONS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 07 (2025): Volume 02 Issue 07
You may also start an advanced similarity search for this article.