Identification and Monitoring of Targeted Users in Controlled Environments
AbstractIt is becoming mandatory for the machine being used to understand how to react to human behavior and it should be able to detect whether the activity going on is malicious or not malicious. Personal Security Programs available nowadays and are being used by companies in order to monitor employees’ activities and can be used to reveal malicious users in case of data/information leakage and to find out whether users are using the system for personal purposes but have disadvantages like high volume of information need to be stored and we need to manually configure the snapshot frequency for screenshots. The Main purpose behind developing such system is to identify insider threat and malicious users and passively monitor them in controlled environments like Intranet, educational campuses and IT infrastructures. By using this tool the system will be able to understand how to respond to human activities and will be able to detect whether the action going on is malicious or not. Thus we conclude that our proposed system would identify the problem before it attacks and would eliminate possible insider threats in companies.
How to Cite
DESHMUKH, Mahesh. Identification and Monitoring of Targeted Users in Controlled Environments. International Journal Of Emerging Technology and Computer Science, [S.l.], v. 1, n. 3, june 2016. ISSN 2455-9954. Available at: <https://aspirepublishers.com/index.php/ijetcs/article/view/46>. Date accessed: 31 may 2020.