SlideShare a Scribd company logo
1 of 3
Download to read offline
Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 2 Issue 4 ǁ April 2018 ǁ PP 56-58
|Volume 2| Issue 4 | www.ijrtem.com | 56 |
Requirement Based Intrusion Detection in Addition to Prevention
Via Advanced Metering Infrastructure
Jonisha S/Ap
Department of Computer Science and Engineering, Assistant Professor, Saec, Chennai, Tamilnadu, India
ABSTRACT: An intrusion detection system (IDS) is designed to monitor all inbound and outbound network
activity and identify any suspicious patterns that may indicate a network or system attack from someone
attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the
main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS
essentially reviews your network traffic and data and will identify probes, attacks, exploits and other
vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an
alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure
the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing
Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for
legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack
detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis.
Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also
capable of localizing the positions of the attackers.
KEY TERMS: Intrusion detection system (IDS), Advanced metering infrastructure (AMI), separation of duty
(SOD).
I. INTRODUCTION:
An intrusion detection system (IDS) is a device or software application that monitors network or system activities
for malicious activities or policy violations and produces electronic reports to a management station. IDS is a
monitoring system to detect any unwanted entity into a system (like AMI in our context). IDS can be signature-
based, specification-based, and anomaly-based. It is important to understand the specific properties and constraints
of this unique infrastructure in order to develop a relevant intrusion detection system (IDS). A signature-based
IDS builds a back list of attacks. It is not suitable for AMI because new types of attacks are growing frequently
since AMI is an emerging system.AMI can be conceived as an attachment for providing bidirectional
communication between user domain to utility domain. This sophisticated infrastructure forms a high speed media
to exchange information flow between these domains. The principle functionalities of AMI encompass
bidirectional communication and power measurement facilities, assisting adaptive power pricing and demand side
management, self-healing ability, and providing interfaces for other systems. Intrusion prevention is a preemptive
approach to network security used to identify potential threats. Like an intrusion detection system (IDS) an
intrusion prevention system monitors network traffic. Because an exploit may be carried out very quickly after
the attacker gain access. The intrusion prevention system also has the ability to take immediate action based on
the set of rule established by the administrator.
II. ARCHITECTURE DIAGRAM:
Requirement Based Intrusion Detection in Addition…
|Volume 2| Issue 4 | www.ijrtem.com | 57 |
Rsa Algorithm: RSA stand for Ron Rivest, Adi Shamir, and Leonard Adleman. It is used to encrypt and decrypt
message. It is an asymmetric cryptographic algorithm .There are two different keys.Private key must be kept
seceret. Public key is known to everyone.RSA algorithm used for securing sensitive data, particularly when being
sent to over an insecure network such as internet. It assure the confidentiality, integrity, authenticity, and non-
reputability of electronic communication and data storage.
Operation: RSA make use of public key and private key. Public key is used to encrypt the message. The encrypted
message can be decrypted by using only private key. Four steps involved in RSA Algorithm.
Key distribution: To enable A to send his encrypted message, B transmit his public key (n,e)
Encryption: Suppose B would like to send message M to A. First turn M into an integer m, such that 0<m<n
and gcd(m,n=1). This can be effectively done for 500 bit numbers using exponentiation. B then transmit c to A.
C=me
mod n
Decryption:
A can recover m from c by using private key.
m=(me
)d
=m mod n
Given m, we can recover the original message M by reversing the padding method.
III. DESCRIPTION:
Intrusion Detection System : It consists of two main elements, specially tailored to a DBMS, an anomaly
detection (AD) system and anomaly response system. The first element is based on the construction of database
access profiles of roles and users, and on the use of such profiles for the attacks. A user- request that does not
conform to normal access profiles is characterized as anomalous. Profiles can record information of different level
of details. After that we taking some action once an anomaly is detected.
Seperation Of Duty: This module consists of duty separation, where the duty is separated to k-administrators.
Our main goal is to detect the inside hackers who is having the DBA roles in an organization, so the separation of
duty process is based on preventing those malicious activity held by inside hackers.
Anomaly Detection: The main goal of our project is to detect anomaly to prevent database hacking. So, in this
module, we are going to establish the planning for finding those anomaly exactly using separation of duty.
Database Query: In this module, we are going to create a search engine for accessing database. If a user wants
to access the database, they should give their query in this search engine. This search engine is made for secure
access of database. For accessing database, the user has to give query as the format of SQL query. After giving
query, the user has to redirect to the respective database which they want to access. The user has to provide
database password for accessing. If the user doesn’t have password, then they will be redirected to password
generation process.
Database Authentication: After giving query, the user has to give password for accessing those databases. This
module is developed mainly for preventing insider intruder.
Policy Matching: Policy matching is the problem of searching for policies applicable to an anomalous request.
When an anomaly is detected, the response system must search through the policy database and find policies that
match the anomaly.
We present two efficient algorithms that take as input the anomalous request details, and search through the policy
database to find the matching policies. The issues that we address is that of administrator of response policies.
Privileges, such as create policy and drop policy that are specific to a policy object type can be defined to
administer policies. However a response policy object presents a different set of challenges than other database
object types.
Requirement Based Intrusion Detection in Addition…
|Volume 2| Issue 4 | www.ijrtem.com | 58 |
Policy Administrator: In this we are going to use administrator model as the joint Threshold Administration
Model (JTAM) for managing response policy objects.
The advantage of JTAM are it requires no changes to the existing acces control mechanisms of a database for
achieving separation of duty. It also allows an organization to utilize existing man power resources to address the
problem of insider threats since it no longer required to employ additional users as policy administrators.
Security Attributes: The authentication is performed based on the security attributes. The security attributes is
in the form of question pattern. The first set of question pattern having basic type of questions like user personal
information, and system personal information.
Database Attribute: The database attribute is another set of question pattern where, the user has to provide
answer for database attributes like database schema, data relation.
Accessing Database: Finally, the user will be authenticated, and if the user is administrated as valid user, they
will be allowed to accessing the database.
IV. CONCLUSION:
In this paper we have introduced new approach for detecting malicious activities in AMI. Securing information is
become a legitimate concern for organization and computer user. Many different techniques are used to secure
the information of an organization against inner threats and attacks. So, in this paper we have exploited inner
threats attacks, and database hacking. We have achieved confidentiality and avoiding from corruption of
information. We identify that specification-based intrusion detection technology has potential to meet the hackers
and constraints of an AMI.
REFERENCE:
[1] A. Conry-Murray, “The Threat from within. Network Computing (Aug. 2005),”
http://www.networkcomputing.com/showArticle.jhtml?articleID=166400792, July 2009.
[2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),”
http://www.gartner.com, 2010.
[3] M. Nicolett and J. Whatman, “Dam Technology Provides Monitoring and Analytics with Less Overhead.
Gartner Research (Nov. 2007),” http://www.gartner.com, 2010.
[4] R.B. Natan, Implementing Database Security and Auditing. Digital Press, 2005
[5] J.-C. Laprie, K. Kanoun, and M. Kaaniche, “Modellinginterdependen- cies between the electricity and
information infrastructures,” in Proc. 26th Int. Conf. Comput. Safety Rel. Security
(SAFECOMP), Nuremberg, Germany, 2007, pp. 54–67.
[6] V. Calderaro, C. N. Hadjicostis, A. Piccolo, and P. Siano, “Failure iden- tification in smart grids based
on petri net modeling,” IEEE Trans. Ind. Electron., vol. 58, no. 10, pp. 4613–4623, Sep. 2011.
[7] T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, “Petri net modeling of cyber-physical attacks on
smart rid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 741–749, Apr. 2011.
[8] R. Berthier and W. H. Sanders, “Specification-based intrusion detection for advanced metering
infrastructures,” in Proc. Pac. Rim Int. Symp. Depend. Comput. (PRDC), Pasadena, CA, USA, 2011,
pp. 184–193.
[9] M. LeMay, G. Gross, C. A. Gunter, and S. Garg, “Unified architecture for large-scale attested metering,”
in Proc. 40th Annu. Huawei Int. Conf. Syst. Sci. (HICCS), Waikoloa, HI, USA, 2007, pp. 126–135.
[10] F. M. Tabrizi and K. Peterman, “A model-based intrusion detection system for smart meters,” in Proc.
IEEE 15th Int. Symp. High-Assur. Syst. Eng. (HASE), Miami Beach, FL, USA, 2014, pp. 17–24.
[11] M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Securing advanced metering infrastructure using
intrusion detection system with data stream mining,” in Proc. Pac. Asia Workshop Intell. Security
Informat., Kuala Lumpur, Malaysia, 2012, pp. 96–111.
[12] Y. Chengyu, Principles and Applications of Petri Net, Beijing, China: Electron. Ind. Press, 2005, p. 16.
[13] J. Peterson, “Petri nets,” ACM Comput. Surv., vol. 9, pp.223–252, Sep. 1977.
[20] M. Diaz, Petri Nets: Fundamental Models, Verification and Applications.
Hoboken, NJ, USA: Wiley, 2009.
[14] V. Kordic, Petri Net Theory and Applications. Vienna, Austria: I-Tech Educ., 2008.

More Related Content

What's hot

Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
ijtsrd
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
ijcsbi
 

What's hot (19)

Ld3420072014
Ld3420072014Ld3420072014
Ld3420072014
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
E1802052327
E1802052327E1802052327
E1802052327
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
J1802056063
J1802056063J1802056063
J1802056063
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 

Similar to Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure

Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
healdkathaleen
 

Similar to Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure (20)

Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
46 102-112
46 102-11246 102-112
46 102-112
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
Is4560
Is4560Is4560
Is4560
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 

More from IJRTEMJOURNAL

A study on financial aspect of supply chain management
A study on financial aspect of supply chain managementA study on financial aspect of supply chain management
A study on financial aspect of supply chain management
IJRTEMJOURNAL
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
IJRTEMJOURNAL
 
Resource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economyResource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economy
IJRTEMJOURNAL
 
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
IJRTEMJOURNAL
 
Security and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaSecurity and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in Nigeria
IJRTEMJOURNAL
 
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster MushroomInfluence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
IJRTEMJOURNAL
 
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloReserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
IJRTEMJOURNAL
 

More from IJRTEMJOURNAL (20)

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomness
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain managementA study on financial aspect of supply chain management
A study on financial aspect of supply chain management
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMER
 
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A Primer
 
Resource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economyResource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economy
 
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
 
Security and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaSecurity and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in Nigeria
 
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster MushroomInfluence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
 
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisOptimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
 
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
 
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloReserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
 
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
 
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
 
What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...
 
Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...
 

Recently uploaded

Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 

Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure

  • 1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689 www.ijrtem.com Volume 2 Issue 4 ǁ April 2018 ǁ PP 56-58 |Volume 2| Issue 4 | www.ijrtem.com | 56 | Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure Jonisha S/Ap Department of Computer Science and Engineering, Assistant Professor, Saec, Chennai, Tamilnadu, India ABSTRACT: An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis. Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also capable of localizing the positions of the attackers. KEY TERMS: Intrusion detection system (IDS), Advanced metering infrastructure (AMI), separation of duty (SOD). I. INTRODUCTION: An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS is a monitoring system to detect any unwanted entity into a system (like AMI in our context). IDS can be signature- based, specification-based, and anomaly-based. It is important to understand the specific properties and constraints of this unique infrastructure in order to develop a relevant intrusion detection system (IDS). A signature-based IDS builds a back list of attacks. It is not suitable for AMI because new types of attacks are growing frequently since AMI is an emerging system.AMI can be conceived as an attachment for providing bidirectional communication between user domain to utility domain. This sophisticated infrastructure forms a high speed media to exchange information flow between these domains. The principle functionalities of AMI encompass bidirectional communication and power measurement facilities, assisting adaptive power pricing and demand side management, self-healing ability, and providing interfaces for other systems. Intrusion prevention is a preemptive approach to network security used to identify potential threats. Like an intrusion detection system (IDS) an intrusion prevention system monitors network traffic. Because an exploit may be carried out very quickly after the attacker gain access. The intrusion prevention system also has the ability to take immediate action based on the set of rule established by the administrator. II. ARCHITECTURE DIAGRAM:
  • 2. Requirement Based Intrusion Detection in Addition… |Volume 2| Issue 4 | www.ijrtem.com | 57 | Rsa Algorithm: RSA stand for Ron Rivest, Adi Shamir, and Leonard Adleman. It is used to encrypt and decrypt message. It is an asymmetric cryptographic algorithm .There are two different keys.Private key must be kept seceret. Public key is known to everyone.RSA algorithm used for securing sensitive data, particularly when being sent to over an insecure network such as internet. It assure the confidentiality, integrity, authenticity, and non- reputability of electronic communication and data storage. Operation: RSA make use of public key and private key. Public key is used to encrypt the message. The encrypted message can be decrypted by using only private key. Four steps involved in RSA Algorithm. Key distribution: To enable A to send his encrypted message, B transmit his public key (n,e) Encryption: Suppose B would like to send message M to A. First turn M into an integer m, such that 0<m<n and gcd(m,n=1). This can be effectively done for 500 bit numbers using exponentiation. B then transmit c to A. C=me mod n Decryption: A can recover m from c by using private key. m=(me )d =m mod n Given m, we can recover the original message M by reversing the padding method. III. DESCRIPTION: Intrusion Detection System : It consists of two main elements, specially tailored to a DBMS, an anomaly detection (AD) system and anomaly response system. The first element is based on the construction of database access profiles of roles and users, and on the use of such profiles for the attacks. A user- request that does not conform to normal access profiles is characterized as anomalous. Profiles can record information of different level of details. After that we taking some action once an anomaly is detected. Seperation Of Duty: This module consists of duty separation, where the duty is separated to k-administrators. Our main goal is to detect the inside hackers who is having the DBA roles in an organization, so the separation of duty process is based on preventing those malicious activity held by inside hackers. Anomaly Detection: The main goal of our project is to detect anomaly to prevent database hacking. So, in this module, we are going to establish the planning for finding those anomaly exactly using separation of duty. Database Query: In this module, we are going to create a search engine for accessing database. If a user wants to access the database, they should give their query in this search engine. This search engine is made for secure access of database. For accessing database, the user has to give query as the format of SQL query. After giving query, the user has to redirect to the respective database which they want to access. The user has to provide database password for accessing. If the user doesn’t have password, then they will be redirected to password generation process. Database Authentication: After giving query, the user has to give password for accessing those databases. This module is developed mainly for preventing insider intruder. Policy Matching: Policy matching is the problem of searching for policies applicable to an anomalous request. When an anomaly is detected, the response system must search through the policy database and find policies that match the anomaly. We present two efficient algorithms that take as input the anomalous request details, and search through the policy database to find the matching policies. The issues that we address is that of administrator of response policies. Privileges, such as create policy and drop policy that are specific to a policy object type can be defined to administer policies. However a response policy object presents a different set of challenges than other database object types.
  • 3. Requirement Based Intrusion Detection in Addition… |Volume 2| Issue 4 | www.ijrtem.com | 58 | Policy Administrator: In this we are going to use administrator model as the joint Threshold Administration Model (JTAM) for managing response policy objects. The advantage of JTAM are it requires no changes to the existing acces control mechanisms of a database for achieving separation of duty. It also allows an organization to utilize existing man power resources to address the problem of insider threats since it no longer required to employ additional users as policy administrators. Security Attributes: The authentication is performed based on the security attributes. The security attributes is in the form of question pattern. The first set of question pattern having basic type of questions like user personal information, and system personal information. Database Attribute: The database attribute is another set of question pattern where, the user has to provide answer for database attributes like database schema, data relation. Accessing Database: Finally, the user will be authenticated, and if the user is administrated as valid user, they will be allowed to accessing the database. IV. CONCLUSION: In this paper we have introduced new approach for detecting malicious activities in AMI. Securing information is become a legitimate concern for organization and computer user. Many different techniques are used to secure the information of an organization against inner threats and attacks. So, in this paper we have exploited inner threats attacks, and database hacking. We have achieved confidentiality and avoiding from corruption of information. We identify that specification-based intrusion detection technology has potential to meet the hackers and constraints of an AMI. REFERENCE: [1] A. Conry-Murray, “The Threat from within. Network Computing (Aug. 2005),” http://www.networkcomputing.com/showArticle.jhtml?articleID=166400792, July 2009. [2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” http://www.gartner.com, 2010. [3] M. Nicolett and J. Whatman, “Dam Technology Provides Monitoring and Analytics with Less Overhead. Gartner Research (Nov. 2007),” http://www.gartner.com, 2010. [4] R.B. Natan, Implementing Database Security and Auditing. Digital Press, 2005 [5] J.-C. Laprie, K. Kanoun, and M. Kaaniche, “Modellinginterdependen- cies between the electricity and information infrastructures,” in Proc. 26th Int. Conf. Comput. Safety Rel. Security (SAFECOMP), Nuremberg, Germany, 2007, pp. 54–67. [6] V. Calderaro, C. N. Hadjicostis, A. Piccolo, and P. Siano, “Failure iden- tification in smart grids based on petri net modeling,” IEEE Trans. Ind. Electron., vol. 58, no. 10, pp. 4613–4623, Sep. 2011. [7] T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, “Petri net modeling of cyber-physical attacks on smart rid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 741–749, Apr. 2011. [8] R. Berthier and W. H. Sanders, “Specification-based intrusion detection for advanced metering infrastructures,” in Proc. Pac. Rim Int. Symp. Depend. Comput. (PRDC), Pasadena, CA, USA, 2011, pp. 184–193. [9] M. LeMay, G. Gross, C. A. Gunter, and S. Garg, “Unified architecture for large-scale attested metering,” in Proc. 40th Annu. Huawei Int. Conf. Syst. Sci. (HICCS), Waikoloa, HI, USA, 2007, pp. 126–135. [10] F. M. Tabrizi and K. Peterman, “A model-based intrusion detection system for smart meters,” in Proc. IEEE 15th Int. Symp. High-Assur. Syst. Eng. (HASE), Miami Beach, FL, USA, 2014, pp. 17–24. [11] M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Securing advanced metering infrastructure using intrusion detection system with data stream mining,” in Proc. Pac. Asia Workshop Intell. Security Informat., Kuala Lumpur, Malaysia, 2012, pp. 96–111. [12] Y. Chengyu, Principles and Applications of Petri Net, Beijing, China: Electron. Ind. Press, 2005, p. 16. [13] J. Peterson, “Petri nets,” ACM Comput. Surv., vol. 9, pp.223–252, Sep. 1977. [20] M. Diaz, Petri Nets: Fundamental Models, Verification and Applications. Hoboken, NJ, USA: Wiley, 2009. [14] V. Kordic, Petri Net Theory and Applications. Vienna, Austria: I-Tech Educ., 2008.