SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
BLITHE: BEHAVIOR RULE BASED INSIDER THREAT DETECTION
FOR SMART GRID
ABSTRACT
A Behavior ruLe based methodology is proposed for Insider THrEat detection
(BLITHE) of data monitor devices in smart grid, where the continuity and accuracy of
operations are of vital importance. Based on the DC power flow model and state estimation
model, three behavior rules are extracted to depict the behavior norms of each device,
such that a device (trustee) that is being monitored on its behavior can be easily checked
on the deviation from the behavior specification. Specifically, a rule-weight and
compliance-distance based grading strategy is designed, which greatly improves the
effectiveness of the traditional grading strategy for evaluation of trustees. The statistical
property, i.e., the mathematical expectation of compliance degree of each trustee, is
particularly analyzed from both theoretical and practical perspectives, which
achieves satisfactory trade-off between detection accuracy and false alarms to detect
more sophisticated and hidden attackers.
INTRODUCTION
Smart grid, as widely considered to be the next generation of the power grid, has
attracted considerable attention. As a typical cyber-physical system (CPS), smart grid
incorporates information and communications technology (ICT) into the traditional
power system and is characterized by sophisticated reliability, efficiency, economy,
and sustainability. To ensure that smart grid can operate continuously even when some
components fail, power research communities use meters or phasor measurement units
(PMUs), placed at important locations of the power system, to monitor system components
and report their measurements to the control centre (CC), and the latter can estimate the
state variables based on the meter measurements. The estimation utilizes state estimation
model, which heavily relies on the accuracy of the reported measurements that CC
receives. Recently, smart grid researchers have realized the threat of bad
measurements (or information corruption) and developed techniques to address this
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
challenge. Information corruption threats in smart grid are very complex, as they can
come from both outsider and insider. Particularly, due to the openness brought by
integrating ICT into the power system, some devices could be compromised and
become insider attackers. While great efforts have been made to resist the outsider attacks,
much less attention has been paid to the insider ones because of the difficulties
stemmed from their concealment and potentiality. Today, even though the insider threat
detection for CPS has attracted considerable concern due to the dire consequence of CPS
failure, the effective and accurate detection techniques for CPS, especially for smart
grid, are still in their infancy with very few studies conducted.
PROBLEM STATEMENT
 Generally, insider threat detection techniques can be classified into three types:
signature-based, anomaly-based and specification-based techniques.
 Signature-based detection technique is exceedingly capable of identifying known
attacks; it cannot effectively cope with unknown attacker patterns.
 The proposed anomaly-based schemes utilize resource constrained sensors and/or
actuators for outlining anomaly patterns, which suffers from high computational
overhead in detecting insider threats and generally has high rates of false alarms.
 Specification-based techniques have been proposed only for insider threat detection of
misbehaving patterns in communication protocols.
 Because all electrical devices are connected as a whole system and each state
variable should manifest specific compliance to make smart grid to be equilibrious,
the topology restriction and data correlation indeed exist in smart grid.
Therefore, behavior rule specifications can be taken good advantage of to depict
the behavior criteria and norms of all devices in the system. However, due to
the complexity of smart grid and the potentiality and concealment of insider
threats, to design an efficient and effective behavior rule specification based
insider threat detection methodology for smart grid still faces many challenges.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
EXISTING SYSTEM
False positive probability method
 There were no numerical data studies regarding the false positive probability pfp and
the false negative probability pfn. Even though three of them had miniature
numerical data, one or two data points characterizing pfn=pfp, instead of a data
set that could be transformed into a receiver operating characteristic (ROC)
figure, i.e., a pfn versus pfp curve, are studied merely.
 One of them proposed an insider threat detection technique which can
effectively balance small false positives pfp for a high detection probability 1pfn to
deal with more sophisticated and hidden threats to support secure applications in
smart grid.
 Two of them tried to exploit the topology restriction and data correlation of smart grid
to detect insider threats.
Disadvantages
 Since it only addressed very high-level requirements in smart grid, it is too coarse-
grained to be applied in practical scenarios.
 Because both of them only consider the very specific scenarios of smart grid, they are
not universal and effective solutions.
Flocking-based method
 Flocking-based modeling paradigm is designed to identify insider threats for the
transient stability process of smart grid. Observing the characteristics of smart
grid from a hierarchical cyber-physical perspective, natural physical
couplings amongst power systems are leveraged as telltale signs to identify
insider cyber threats.
Disadvantages
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
 Threat model is limited to narrow scenarios of the transient stability process,
which is urgent to be extended to generalized circumstances covering the stability
process of smart grid. State estimation model
 Liu et al. proposed one adaptive partitioning state estimation (APSE) method to
detect bad data injections in smart grid. APSE divides the large system into
several subsystems, and the detection procedures are continuously performed
in yielded subsystems until the place of the insider threat is located.
PROPOSED SYSTEM
 To propose behavior rule based insider threat detection (BLITHE)
methodology for smart grid, which can improve the accuracy of detection with
very low false alarms.
 With comprehensive and accurate behavior rule definitions, proposed
methodology can also be easily generalized to other CPSs.
 Considering the fact that each rule usually has different effect and
prominence on evaluation of the compliance degree of trustee, the rule-weight
and compliance distance based grading strategy is designed to improve the
traditional evaluation strategy.
Advantages
 Trade-off between detection accuracy and false alarms of insider threat detection
HARDWARE REQUIREMENTS
Processor : Any Processor above 500 MHz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System : Windows Family.
Techniques : JDK 1.5 or higher
Database : MySQL 5.0

More Related Content

PDF
sdReport
PDF
Green Lights Forever: Analyzing the Security of Traffic Infrastructure
PPTX
Wireless Communication - GSM Security
DOC
Iisi tv6p887 894-khiyal592
PDF
A Review of Machine Learning based Anomaly Detection Techniques
PDF
Sms based wireless appliances control
PDF
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
PDF
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
sdReport
Green Lights Forever: Analyzing the Security of Traffic Infrastructure
Wireless Communication - GSM Security
Iisi tv6p887 894-khiyal592
A Review of Machine Learning based Anomaly Detection Techniques
Sms based wireless appliances control
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
A Survey of Fault Tolerance Methods in Wireless Sensor Networks

Viewers also liked (20)

PPTX
PDF
Afternoon wedding charter_2012
DOCX
Portada
PDF
Law of supply seema
PDF
PPTX
Cuadro etica
PPT
Proyectos transversales m.e.n.
PPTX
Three phase appliance protector.
PDF
Tercera guia
PPTX
Portfólio: Bárbara Silveira
PDF
PSL Profile
PPTX
Tx periodontal px hp
PDF
Calendari escolar curs 2012 2013
DOCX
Diagrama de arbol gauss
DOCX
Cecidhu pihds
PDF
Reunión senderismo
DOCX
Sopa d letras vanesa 11 1
Afternoon wedding charter_2012
Portada
Law of supply seema
Cuadro etica
Proyectos transversales m.e.n.
Three phase appliance protector.
Tercera guia
Portfólio: Bárbara Silveira
PSL Profile
Tx periodontal px hp
Calendari escolar curs 2012 2013
Diagrama de arbol gauss
Cecidhu pihds
Reunión senderismo
Sopa d letras vanesa 11 1
Ad

Similar to Blithe behavior rule based insider threat detection for smart grid (20)

PDF
journal about operation management
PDF
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
PDF
Life and science journal.pdf
DOCX
Behavior rule specification based intrusion detection for safety critical med...
DOCX
Behavior rule specification based ntrusion detection for safety critical medi...
PDF
Safeguard the Automatic Generation Control using Game Theory Technique
PDF
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
PDF
An intrusion detection algorithm for ami
PPTX
presentationggjjfdfbbjhggvnnjjgvvbbnn.pptx
PDF
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
DOCX
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
PPT
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
DOC
On false data injection attacks against power system
DOCX
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PDF
A Survey On Intrusion Detection Systems
DOCX
on false data-injection attacks against power system state estimation modelin...
PDF
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
PPTX
WOMEN SCIENTIST SCHEME ENGINEERING AND TECHNOLOGY
journal about operation management
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Life and science journal.pdf
Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based ntrusion detection for safety critical medi...
Safeguard the Automatic Generation Control using Game Theory Technique
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
An intrusion detection algorithm for ami
presentationggjjfdfbbjhggvnnjjgvvbbnn.pptx
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
On false data injection attacks against power system
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A Survey On Intrusion Detection Systems
on false data-injection attacks against power system state estimation modelin...
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
WOMEN SCIENTIST SCHEME ENGINEERING AND TECHNOLOGY
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
01-Introduction-to-Information-Management.pdf
PDF
Trump Administration's workforce development strategy
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Lesson notes of climatology university.
VCE English Exam - Section C Student Revision Booklet
Complications of Minimal Access Surgery at WLH
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Microbial diseases, their pathogenesis and prophylaxis
O7-L3 Supply Chain Operations - ICLT Program
Orientation - ARALprogram of Deped to the Parents.pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chinmaya Tiranga quiz Grand Finale.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
01-Introduction-to-Information-Management.pdf
Trump Administration's workforce development strategy
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
A systematic review of self-coping strategies used by university students to ...
Microbial disease of the cardiovascular and lymphatic systems
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3

Blithe behavior rule based insider threat detection for smart grid

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com BLITHE: BEHAVIOR RULE BASED INSIDER THREAT DETECTION FOR SMART GRID ABSTRACT A Behavior ruLe based methodology is proposed for Insider THrEat detection (BLITHE) of data monitor devices in smart grid, where the continuity and accuracy of operations are of vital importance. Based on the DC power flow model and state estimation model, three behavior rules are extracted to depict the behavior norms of each device, such that a device (trustee) that is being monitored on its behavior can be easily checked on the deviation from the behavior specification. Specifically, a rule-weight and compliance-distance based grading strategy is designed, which greatly improves the effectiveness of the traditional grading strategy for evaluation of trustees. The statistical property, i.e., the mathematical expectation of compliance degree of each trustee, is particularly analyzed from both theoretical and practical perspectives, which achieves satisfactory trade-off between detection accuracy and false alarms to detect more sophisticated and hidden attackers. INTRODUCTION Smart grid, as widely considered to be the next generation of the power grid, has attracted considerable attention. As a typical cyber-physical system (CPS), smart grid incorporates information and communications technology (ICT) into the traditional power system and is characterized by sophisticated reliability, efficiency, economy, and sustainability. To ensure that smart grid can operate continuously even when some components fail, power research communities use meters or phasor measurement units (PMUs), placed at important locations of the power system, to monitor system components and report their measurements to the control centre (CC), and the latter can estimate the state variables based on the meter measurements. The estimation utilizes state estimation model, which heavily relies on the accuracy of the reported measurements that CC receives. Recently, smart grid researchers have realized the threat of bad measurements (or information corruption) and developed techniques to address this
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com challenge. Information corruption threats in smart grid are very complex, as they can come from both outsider and insider. Particularly, due to the openness brought by integrating ICT into the power system, some devices could be compromised and become insider attackers. While great efforts have been made to resist the outsider attacks, much less attention has been paid to the insider ones because of the difficulties stemmed from their concealment and potentiality. Today, even though the insider threat detection for CPS has attracted considerable concern due to the dire consequence of CPS failure, the effective and accurate detection techniques for CPS, especially for smart grid, are still in their infancy with very few studies conducted. PROBLEM STATEMENT  Generally, insider threat detection techniques can be classified into three types: signature-based, anomaly-based and specification-based techniques.  Signature-based detection technique is exceedingly capable of identifying known attacks; it cannot effectively cope with unknown attacker patterns.  The proposed anomaly-based schemes utilize resource constrained sensors and/or actuators for outlining anomaly patterns, which suffers from high computational overhead in detecting insider threats and generally has high rates of false alarms.  Specification-based techniques have been proposed only for insider threat detection of misbehaving patterns in communication protocols.  Because all electrical devices are connected as a whole system and each state variable should manifest specific compliance to make smart grid to be equilibrious, the topology restriction and data correlation indeed exist in smart grid. Therefore, behavior rule specifications can be taken good advantage of to depict the behavior criteria and norms of all devices in the system. However, due to the complexity of smart grid and the potentiality and concealment of insider threats, to design an efficient and effective behavior rule specification based insider threat detection methodology for smart grid still faces many challenges.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM False positive probability method  There were no numerical data studies regarding the false positive probability pfp and the false negative probability pfn. Even though three of them had miniature numerical data, one or two data points characterizing pfn=pfp, instead of a data set that could be transformed into a receiver operating characteristic (ROC) figure, i.e., a pfn versus pfp curve, are studied merely.  One of them proposed an insider threat detection technique which can effectively balance small false positives pfp for a high detection probability 1pfn to deal with more sophisticated and hidden threats to support secure applications in smart grid.  Two of them tried to exploit the topology restriction and data correlation of smart grid to detect insider threats. Disadvantages  Since it only addressed very high-level requirements in smart grid, it is too coarse- grained to be applied in practical scenarios.  Because both of them only consider the very specific scenarios of smart grid, they are not universal and effective solutions. Flocking-based method  Flocking-based modeling paradigm is designed to identify insider threats for the transient stability process of smart grid. Observing the characteristics of smart grid from a hierarchical cyber-physical perspective, natural physical couplings amongst power systems are leveraged as telltale signs to identify insider cyber threats. Disadvantages
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Threat model is limited to narrow scenarios of the transient stability process, which is urgent to be extended to generalized circumstances covering the stability process of smart grid. State estimation model  Liu et al. proposed one adaptive partitioning state estimation (APSE) method to detect bad data injections in smart grid. APSE divides the large system into several subsystems, and the detection procedures are continuously performed in yielded subsystems until the place of the insider threat is located. PROPOSED SYSTEM  To propose behavior rule based insider threat detection (BLITHE) methodology for smart grid, which can improve the accuracy of detection with very low false alarms.  With comprehensive and accurate behavior rule definitions, proposed methodology can also be easily generalized to other CPSs.  Considering the fact that each rule usually has different effect and prominence on evaluation of the compliance degree of trustee, the rule-weight and compliance distance based grading strategy is designed to improve the traditional evaluation strategy. Advantages  Trade-off between detection accuracy and false alarms of insider threat detection HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb.
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION Operating System : Windows Family. Techniques : JDK 1.5 or higher Database : MySQL 5.0