Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 2 Issue 4 ǁ April 2018 ǁ PP 56-58
|Volume 2| Issue 4 | www.ijrtem.com | 56 |
Requirement Based Intrusion Detection in Addition to Prevention
Via Advanced Metering Infrastructure
Jonisha S/Ap
Department of Computer Science and Engineering, Assistant Professor, Saec, Chennai, Tamilnadu, India
ABSTRACT: An intrusion detection system (IDS) is designed to monitor all inbound and outbound network
activity and identify any suspicious patterns that may indicate a network or system attack from someone
attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the
main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS
essentially reviews your network traffic and data and will identify probes, attacks, exploits and other
vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an
alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure
the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing
Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for
legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack
detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis.
Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also
capable of localizing the positions of the attackers.
KEY TERMS: Intrusion detection system (IDS), Advanced metering infrastructure (AMI), separation of duty
(SOD).
I. INTRODUCTION:
An intrusion detection system (IDS) is a device or software application that monitors network or system activities
for malicious activities or policy violations and produces electronic reports to a management station. IDS is a
monitoring system to detect any unwanted entity into a system (like AMI in our context). IDS can be signature-
based, specification-based, and anomaly-based. It is important to understand the specific properties and constraints
of this unique infrastructure in order to develop a relevant intrusion detection system (IDS). A signature-based
IDS builds a back list of attacks. It is not suitable for AMI because new types of attacks are growing frequently
since AMI is an emerging system.AMI can be conceived as an attachment for providing bidirectional
communication between user domain to utility domain. This sophisticated infrastructure forms a high speed media
to exchange information flow between these domains. The principle functionalities of AMI encompass
bidirectional communication and power measurement facilities, assisting adaptive power pricing and demand side
management, self-healing ability, and providing interfaces for other systems. Intrusion prevention is a preemptive
approach to network security used to identify potential threats. Like an intrusion detection system (IDS) an
intrusion prevention system monitors network traffic. Because an exploit may be carried out very quickly after
the attacker gain access. The intrusion prevention system also has the ability to take immediate action based on
the set of rule established by the administrator.
II. ARCHITECTURE DIAGRAM:
Requirement Based Intrusion Detection in Addition…
|Volume 2| Issue 4 | www.ijrtem.com | 57 |
Rsa Algorithm: RSA stand for Ron Rivest, Adi Shamir, and Leonard Adleman. It is used to encrypt and decrypt
message. It is an asymmetric cryptographic algorithm .There are two different keys.Private key must be kept
seceret. Public key is known to everyone.RSA algorithm used for securing sensitive data, particularly when being
sent to over an insecure network such as internet. It assure the confidentiality, integrity, authenticity, and non-
reputability of electronic communication and data storage.
Operation: RSA make use of public key and private key. Public key is used to encrypt the message. The encrypted
message can be decrypted by using only private key. Four steps involved in RSA Algorithm.
Key distribution: To enable A to send his encrypted message, B transmit his public key (n,e)
Encryption: Suppose B would like to send message M to A. First turn M into an integer m, such that 0<m<n
and gcd(m,n=1). This can be effectively done for 500 bit numbers using exponentiation. B then transmit c to A.
C=me
mod n
Decryption:
A can recover m from c by using private key.
m=(me
)d
=m mod n
Given m, we can recover the original message M by reversing the padding method.
III. DESCRIPTION:
Intrusion Detection System : It consists of two main elements, specially tailored to a DBMS, an anomaly
detection (AD) system and anomaly response system. The first element is based on the construction of database
access profiles of roles and users, and on the use of such profiles for the attacks. A user- request that does not
conform to normal access profiles is characterized as anomalous. Profiles can record information of different level
of details. After that we taking some action once an anomaly is detected.
Seperation Of Duty: This module consists of duty separation, where the duty is separated to k-administrators.
Our main goal is to detect the inside hackers who is having the DBA roles in an organization, so the separation of
duty process is based on preventing those malicious activity held by inside hackers.
Anomaly Detection: The main goal of our project is to detect anomaly to prevent database hacking. So, in this
module, we are going to establish the planning for finding those anomaly exactly using separation of duty.
Database Query: In this module, we are going to create a search engine for accessing database. If a user wants
to access the database, they should give their query in this search engine. This search engine is made for secure
access of database. For accessing database, the user has to give query as the format of SQL query. After giving
query, the user has to redirect to the respective database which they want to access. The user has to provide
database password for accessing. If the user doesn’t have password, then they will be redirected to password
generation process.
Database Authentication: After giving query, the user has to give password for accessing those databases. This
module is developed mainly for preventing insider intruder.
Policy Matching: Policy matching is the problem of searching for policies applicable to an anomalous request.
When an anomaly is detected, the response system must search through the policy database and find policies that
match the anomaly.
We present two efficient algorithms that take as input the anomalous request details, and search through the policy
database to find the matching policies. The issues that we address is that of administrator of response policies.
Privileges, such as create policy and drop policy that are specific to a policy object type can be defined to
administer policies. However a response policy object presents a different set of challenges than other database
object types.
Requirement Based Intrusion Detection in Addition…
|Volume 2| Issue 4 | www.ijrtem.com | 58 |
Policy Administrator: In this we are going to use administrator model as the joint Threshold Administration
Model (JTAM) for managing response policy objects.
The advantage of JTAM are it requires no changes to the existing acces control mechanisms of a database for
achieving separation of duty. It also allows an organization to utilize existing man power resources to address the
problem of insider threats since it no longer required to employ additional users as policy administrators.
Security Attributes: The authentication is performed based on the security attributes. The security attributes is
in the form of question pattern. The first set of question pattern having basic type of questions like user personal
information, and system personal information.
Database Attribute: The database attribute is another set of question pattern where, the user has to provide
answer for database attributes like database schema, data relation.
Accessing Database: Finally, the user will be authenticated, and if the user is administrated as valid user, they
will be allowed to accessing the database.
IV. CONCLUSION:
In this paper we have introduced new approach for detecting malicious activities in AMI. Securing information is
become a legitimate concern for organization and computer user. Many different techniques are used to secure
the information of an organization against inner threats and attacks. So, in this paper we have exploited inner
threats attacks, and database hacking. We have achieved confidentiality and avoiding from corruption of
information. We identify that specification-based intrusion detection technology has potential to meet the hackers
and constraints of an AMI.
REFERENCE:
[1] A. Conry-Murray, “The Threat from within. Network Computing (Aug. 2005),”
http://www.networkcomputing.com/showArticle.jhtml?articleID=166400792, July 2009.
[2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),”
http://www.gartner.com, 2010.
[3] M. Nicolett and J. Whatman, “Dam Technology Provides Monitoring and Analytics with Less Overhead.
Gartner Research (Nov. 2007),” http://www.gartner.com, 2010.
[4] R.B. Natan, Implementing Database Security and Auditing. Digital Press, 2005
[5] J.-C. Laprie, K. Kanoun, and M. Kaaniche, “Modellinginterdependen- cies between the electricity and
information infrastructures,” in Proc. 26th Int. Conf. Comput. Safety Rel. Security
(SAFECOMP), Nuremberg, Germany, 2007, pp. 54–67.
[6] V. Calderaro, C. N. Hadjicostis, A. Piccolo, and P. Siano, “Failure iden- tification in smart grids based
on petri net modeling,” IEEE Trans. Ind. Electron., vol. 58, no. 10, pp. 4613–4623, Sep. 2011.
[7] T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, “Petri net modeling of cyber-physical attacks on
smart rid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 741–749, Apr. 2011.
[8] R. Berthier and W. H. Sanders, “Specification-based intrusion detection for advanced metering
infrastructures,” in Proc. Pac. Rim Int. Symp. Depend. Comput. (PRDC), Pasadena, CA, USA, 2011,
pp. 184–193.
[9] M. LeMay, G. Gross, C. A. Gunter, and S. Garg, “Unified architecture for large-scale attested metering,”
in Proc. 40th Annu. Huawei Int. Conf. Syst. Sci. (HICCS), Waikoloa, HI, USA, 2007, pp. 126–135.
[10] F. M. Tabrizi and K. Peterman, “A model-based intrusion detection system for smart meters,” in Proc.
IEEE 15th Int. Symp. High-Assur. Syst. Eng. (HASE), Miami Beach, FL, USA, 2014, pp. 17–24.
[11] M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Securing advanced metering infrastructure using
intrusion detection system with data stream mining,” in Proc. Pac. Asia Workshop Intell. Security
Informat., Kuala Lumpur, Malaysia, 2012, pp. 96–111.
[12] Y. Chengyu, Principles and Applications of Petri Net, Beijing, China: Electron. Ind. Press, 2005, p. 16.
[13] J. Peterson, “Petri nets,” ACM Comput. Surv., vol. 9, pp.223–252, Sep. 1977.
[20] M. Diaz, Petri Nets: Fundamental Models, Verification and Applications.
Hoboken, NJ, USA: Wiley, 2009.
[14] V. Kordic, Petri Net Theory and Applications. Vienna, Austria: I-Tech Educ., 2008.

More Related Content

PDF
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
DOCX
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
PDF
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
PDF
Machine learning in network security using knime analytics
PDF
The Practical Data Mining Model for Efficient IDS through Relational Databases
PDF
A Survey on Various Data Mining Technique in Intrusion Detection System
PDF
Ak03402100217
PDF
Iaetsd database intrusion detection using
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
Machine learning in network security using knime analytics
The Practical Data Mining Model for Efficient IDS through Relational Databases
A Survey on Various Data Mining Technique in Intrusion Detection System
Ak03402100217
Iaetsd database intrusion detection using

What's hot (19)

PDF
Ld3420072014
PDF
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
PDF
IRJET- Data Security using Honeypot System
PDF
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
PDF
Enhanced method for intrusion detection over kdd cup 99 dataset
PDF
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
PDF
Anomaly Threat Detection System using User and Role-Based Profile Assessment
PDF
Vol 6 No 1 - October 2013
PDF
Employment Feedback by Securing Data using Anonymous Authentication
PDF
IRJET - A Secure Approach for Intruder Detection using Backtracking
PDF
E1802052327
PDF
A Study on Recent Trends and Developments in Intrusion Detection System
PDF
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
PDF
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
PDF
IRJET- Crypto-Currencies How Secure are they?
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
PDF
J1802056063
PDF
Gp3112671275
PDF
A Study on Data Mining Based Intrusion Detection System
Ld3420072014
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET- Data Security using Honeypot System
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Enhanced method for intrusion detection over kdd cup 99 dataset
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Vol 6 No 1 - October 2013
Employment Feedback by Securing Data using Anonymous Authentication
IRJET - A Secure Approach for Intruder Detection using Backtracking
E1802052327
A Study on Recent Trends and Developments in Intrusion Detection System
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
IRJET- Crypto-Currencies How Secure are they?
Secure intrusion detection and countermeasure selection in virtual system usi...
J1802056063
Gp3112671275
A Study on Data Mining Based Intrusion Detection System
Ad

Similar to Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure (20)

PDF
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
PDF
50320130403001 2-3
PDF
50320130403001 2-3
PDF
Intrusion Detection System: Security Monitoring System
PDF
Intrusion Detection System using AI and Machine Learning Algorithm
PPTX
Machine-Learning-Techniques-Applied-to-Detect-Cyber-Attacks-on-Web-Applicatio...
PDF
Bt33430435
PDF
Bt33430435
PDF
Articles - International Journal of Network Security & Its Applications (IJNSA)
PDF
An Extensive Survey of Intrusion Detection Systems
PDF
Self Monitoring System to Catch Unauthorized Activity
PDF
Certified Ethical Hacking
DOCX
Running head Cryptography1Cryptography16.docx
PDF
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
PDF
INTRUSION DETECTION SYSTEM
PPTX
information security (Audit mechanism, intrusion detection, password manageme...
PDF
46 102-112
PDF
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
PDF
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
PDF
Is4560
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
50320130403001 2-3
50320130403001 2-3
Intrusion Detection System: Security Monitoring System
Intrusion Detection System using AI and Machine Learning Algorithm
Machine-Learning-Techniques-Applied-to-Detect-Cyber-Attacks-on-Web-Applicatio...
Bt33430435
Bt33430435
Articles - International Journal of Network Security & Its Applications (IJNSA)
An Extensive Survey of Intrusion Detection Systems
Self Monitoring System to Catch Unauthorized Activity
Certified Ethical Hacking
Running head Cryptography1Cryptography16.docx
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
INTRUSION DETECTION SYSTEM
information security (Audit mechanism, intrusion detection, password manageme...
46 102-112
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
Is4560
Ad

More from IJRTEMJOURNAL (20)

PDF
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
PDF
Study of desalination processes of seawater from the desalination plant of La...
PDF
Multi products storage using randomness
PDF
Existence results for fractional q-differential equations with integral and m...
PDF
A study on financial aspect of supply chain management
PDF
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
PDF
GREEN CHEMISTRY: A PRIMER
PDF
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
PDF
Data Warehouse: A Primer
PDF
Resource recycling and waste-to-energy: The cornerstones of circular economy
PDF
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
PDF
Security and Crime Management in University Libraries in Nigeria
PDF
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
PDF
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
PDF
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
PDF
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
PDF
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
PDF
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
PDF
What are the determinants of the non-reimbursement for SMEs in Central Africa...
PDF
Multivariate regression methods with infrared spectroscopy to detect the fals...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
Study of desalination processes of seawater from the desalination plant of La...
Multi products storage using randomness
Existence results for fractional q-differential equations with integral and m...
A study on financial aspect of supply chain management
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
GREEN CHEMISTRY: A PRIMER
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Data Warehouse: A Primer
Resource recycling and waste-to-energy: The cornerstones of circular economy
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Security and Crime Management in University Libraries in Nigeria
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
What are the determinants of the non-reimbursement for SMEs in Central Africa...
Multivariate regression methods with infrared spectroscopy to detect the fals...

Recently uploaded (20)

PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PDF
Micro 4 New.ppt.pdf a servay of cells and microorganism
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PPTX
Wireless sensor networks (WSN) SRM unit 2
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PDF
Computer organization and architecuture Digital Notes....pdf
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PPTX
Micro1New.ppt.pptx the mai themes of micfrobiology
PPTX
CT Generations and Image Reconstruction methods
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PPTX
chapter 1.pptx dotnet technology introduction
Environmental studies, Moudle 3-Environmental Pollution.pptx
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Micro 4 New.ppt.pdf a servay of cells and microorganism
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Computer System Architecture 3rd Edition-M Morris Mano.pdf
Wireless sensor networks (WSN) SRM unit 2
Cryptography and Network Security-Module-I.pdf
MAD Unit - 3 User Interface and Data Management (Diploma IT)
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
Computer organization and architecuture Digital Notes....pdf
MLpara ingenieira CIVIL, meca Y AMBIENTAL
20250617 - IR - Global Guide for HR - 51 pages.pdf
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
Micro1New.ppt.pptx the mai themes of micfrobiology
CT Generations and Image Reconstruction methods
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
chapter 1.pptx dotnet technology introduction

Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure

  • 1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689 www.ijrtem.com Volume 2 Issue 4 ǁ April 2018 ǁ PP 56-58 |Volume 2| Issue 4 | www.ijrtem.com | 56 | Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure Jonisha S/Ap Department of Computer Science and Engineering, Assistant Professor, Saec, Chennai, Tamilnadu, India ABSTRACT: An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis. Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also capable of localizing the positions of the attackers. KEY TERMS: Intrusion detection system (IDS), Advanced metering infrastructure (AMI), separation of duty (SOD). I. INTRODUCTION: An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS is a monitoring system to detect any unwanted entity into a system (like AMI in our context). IDS can be signature- based, specification-based, and anomaly-based. It is important to understand the specific properties and constraints of this unique infrastructure in order to develop a relevant intrusion detection system (IDS). A signature-based IDS builds a back list of attacks. It is not suitable for AMI because new types of attacks are growing frequently since AMI is an emerging system.AMI can be conceived as an attachment for providing bidirectional communication between user domain to utility domain. This sophisticated infrastructure forms a high speed media to exchange information flow between these domains. The principle functionalities of AMI encompass bidirectional communication and power measurement facilities, assisting adaptive power pricing and demand side management, self-healing ability, and providing interfaces for other systems. Intrusion prevention is a preemptive approach to network security used to identify potential threats. Like an intrusion detection system (IDS) an intrusion prevention system monitors network traffic. Because an exploit may be carried out very quickly after the attacker gain access. The intrusion prevention system also has the ability to take immediate action based on the set of rule established by the administrator. II. ARCHITECTURE DIAGRAM:
  • 2. Requirement Based Intrusion Detection in Addition… |Volume 2| Issue 4 | www.ijrtem.com | 57 | Rsa Algorithm: RSA stand for Ron Rivest, Adi Shamir, and Leonard Adleman. It is used to encrypt and decrypt message. It is an asymmetric cryptographic algorithm .There are two different keys.Private key must be kept seceret. Public key is known to everyone.RSA algorithm used for securing sensitive data, particularly when being sent to over an insecure network such as internet. It assure the confidentiality, integrity, authenticity, and non- reputability of electronic communication and data storage. Operation: RSA make use of public key and private key. Public key is used to encrypt the message. The encrypted message can be decrypted by using only private key. Four steps involved in RSA Algorithm. Key distribution: To enable A to send his encrypted message, B transmit his public key (n,e) Encryption: Suppose B would like to send message M to A. First turn M into an integer m, such that 0<m<n and gcd(m,n=1). This can be effectively done for 500 bit numbers using exponentiation. B then transmit c to A. C=me mod n Decryption: A can recover m from c by using private key. m=(me )d =m mod n Given m, we can recover the original message M by reversing the padding method. III. DESCRIPTION: Intrusion Detection System : It consists of two main elements, specially tailored to a DBMS, an anomaly detection (AD) system and anomaly response system. The first element is based on the construction of database access profiles of roles and users, and on the use of such profiles for the attacks. A user- request that does not conform to normal access profiles is characterized as anomalous. Profiles can record information of different level of details. After that we taking some action once an anomaly is detected. Seperation Of Duty: This module consists of duty separation, where the duty is separated to k-administrators. Our main goal is to detect the inside hackers who is having the DBA roles in an organization, so the separation of duty process is based on preventing those malicious activity held by inside hackers. Anomaly Detection: The main goal of our project is to detect anomaly to prevent database hacking. So, in this module, we are going to establish the planning for finding those anomaly exactly using separation of duty. Database Query: In this module, we are going to create a search engine for accessing database. If a user wants to access the database, they should give their query in this search engine. This search engine is made for secure access of database. For accessing database, the user has to give query as the format of SQL query. After giving query, the user has to redirect to the respective database which they want to access. The user has to provide database password for accessing. If the user doesn’t have password, then they will be redirected to password generation process. Database Authentication: After giving query, the user has to give password for accessing those databases. This module is developed mainly for preventing insider intruder. Policy Matching: Policy matching is the problem of searching for policies applicable to an anomalous request. When an anomaly is detected, the response system must search through the policy database and find policies that match the anomaly. We present two efficient algorithms that take as input the anomalous request details, and search through the policy database to find the matching policies. The issues that we address is that of administrator of response policies. Privileges, such as create policy and drop policy that are specific to a policy object type can be defined to administer policies. However a response policy object presents a different set of challenges than other database object types.
  • 3. Requirement Based Intrusion Detection in Addition… |Volume 2| Issue 4 | www.ijrtem.com | 58 | Policy Administrator: In this we are going to use administrator model as the joint Threshold Administration Model (JTAM) for managing response policy objects. The advantage of JTAM are it requires no changes to the existing acces control mechanisms of a database for achieving separation of duty. It also allows an organization to utilize existing man power resources to address the problem of insider threats since it no longer required to employ additional users as policy administrators. Security Attributes: The authentication is performed based on the security attributes. The security attributes is in the form of question pattern. The first set of question pattern having basic type of questions like user personal information, and system personal information. Database Attribute: The database attribute is another set of question pattern where, the user has to provide answer for database attributes like database schema, data relation. Accessing Database: Finally, the user will be authenticated, and if the user is administrated as valid user, they will be allowed to accessing the database. IV. CONCLUSION: In this paper we have introduced new approach for detecting malicious activities in AMI. Securing information is become a legitimate concern for organization and computer user. Many different techniques are used to secure the information of an organization against inner threats and attacks. So, in this paper we have exploited inner threats attacks, and database hacking. We have achieved confidentiality and avoiding from corruption of information. We identify that specification-based intrusion detection technology has potential to meet the hackers and constraints of an AMI. REFERENCE: [1] A. Conry-Murray, “The Threat from within. Network Computing (Aug. 2005),” http://www.networkcomputing.com/showArticle.jhtml?articleID=166400792, July 2009. [2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” http://www.gartner.com, 2010. [3] M. Nicolett and J. Whatman, “Dam Technology Provides Monitoring and Analytics with Less Overhead. Gartner Research (Nov. 2007),” http://www.gartner.com, 2010. [4] R.B. Natan, Implementing Database Security and Auditing. Digital Press, 2005 [5] J.-C. Laprie, K. Kanoun, and M. Kaaniche, “Modellinginterdependen- cies between the electricity and information infrastructures,” in Proc. 26th Int. Conf. Comput. Safety Rel. Security (SAFECOMP), Nuremberg, Germany, 2007, pp. 54–67. [6] V. Calderaro, C. N. Hadjicostis, A. Piccolo, and P. Siano, “Failure iden- tification in smart grids based on petri net modeling,” IEEE Trans. Ind. Electron., vol. 58, no. 10, pp. 4613–4623, Sep. 2011. [7] T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, “Petri net modeling of cyber-physical attacks on smart rid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 741–749, Apr. 2011. [8] R. Berthier and W. H. Sanders, “Specification-based intrusion detection for advanced metering infrastructures,” in Proc. Pac. Rim Int. Symp. Depend. Comput. (PRDC), Pasadena, CA, USA, 2011, pp. 184–193. [9] M. LeMay, G. Gross, C. A. Gunter, and S. Garg, “Unified architecture for large-scale attested metering,” in Proc. 40th Annu. Huawei Int. Conf. Syst. Sci. (HICCS), Waikoloa, HI, USA, 2007, pp. 126–135. [10] F. M. Tabrizi and K. Peterman, “A model-based intrusion detection system for smart meters,” in Proc. IEEE 15th Int. Symp. High-Assur. Syst. Eng. (HASE), Miami Beach, FL, USA, 2014, pp. 17–24. [11] M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Securing advanced metering infrastructure using intrusion detection system with data stream mining,” in Proc. Pac. Asia Workshop Intell. Security Informat., Kuala Lumpur, Malaysia, 2012, pp. 96–111. [12] Y. Chengyu, Principles and Applications of Petri Net, Beijing, China: Electron. Ind. Press, 2005, p. 16. [13] J. Peterson, “Petri nets,” ACM Comput. Surv., vol. 9, pp.223–252, Sep. 1977. [20] M. Diaz, Petri Nets: Fundamental Models, Verification and Applications. Hoboken, NJ, USA: Wiley, 2009. [14] V. Kordic, Petri Net Theory and Applications. Vienna, Austria: I-Tech Educ., 2008.