Open Access   Article Go Back

Machine Login Monitoring and Tracking Security System

Aiswarya Raj1 , Meenu Manoharan2 , Melbin Alex3 , Pravya Prasad4 , Majo John5

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-12 , Page no. 50-52, Dec-2014

Online published on Dec 31, 2014

Copyright © Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John, “Machine Login Monitoring and Tracking Security System,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.50-52, 2014.

MLA Style Citation: Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John "Machine Login Monitoring and Tracking Security System." International Journal of Computer Sciences and Engineering 2.12 (2014): 50-52.

APA Style Citation: Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John, (2014). Machine Login Monitoring and Tracking Security System. International Journal of Computer Sciences and Engineering, 2(12), 50-52.

BibTex Style Citation:
@article{Raj_2014,
author = {Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John},
title = {Machine Login Monitoring and Tracking Security System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {50-52},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=331},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=331
TI - Machine Login Monitoring and Tracking Security System
T2 - International Journal of Computer Sciences and Engineering
AU - Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 50-52
IS - 12
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3656 3353 downloads 3615 downloads
  
  
           

Abstract

Machine Login Monitoring and Tracking Security System (MLMTSS) were used to monitor all illegal and malicious attempts of the system user. The system should be able to provide a complete log of text entered such as passwords, emails send, websites visited. The user's login time was send by SMS to the admin. This system tracks all the keystrokes, processes opened and all operations performed by the user and send it through e-mail. The system takes screenshots within the specified interval of time and sends it with the tracked information to the administrator's mail. It also runs invisibly so that the person who is using the computer doesn't even have to be aware that it is running.

Key-Words / Index Term

Machine Login Monitoring , Tracking Security System, Emails Send, Website Visited, Keystrokes, Password

References

[1] Preeti Tuli and Priyanka Sahu, “System Monitoring and Security Using Keylogger”, IJCSMC, Vol.2, Issue.3, March 2013, pg.106-111.
[2] Kenneth Revett,Sergio Tenreiro de Magalhaes and Henrique M.D. Santos, “Enhancing Login Security Through the Use of Keystroke Input Dynamics”, © Springer, Part of Springer Science+Business Media.
[3] Masaya Sato and Toshihiro Yamauchi, “Virtual Machine Based logging Scheme for Prevention of Tampering and Loss”, © Springer, Part of Springer Science+Business Media.
[4] S. Sagiroglu and G. Canbek, “Keyloggers”, IEEE Technology and Society Magazine, Vol.28, no.3, pp.10-17, fall 2009.
[5] T. Olzak, “Keystroke logging (keylogging)”, Adventures in Security, April 2008 (accessed May 8, 2010), http://adventuresinsecurity.com/images/Keystroke_Logging.pdf.
[6] Preeti Tuli, Priyanka Sahu and Mahesh Sahu, “System Monitoring and Logging of Information and Crime” IJARCSSE, Vol.2, Issue 9, September 2012, pg.375-379.