Machine Login Monitoring and Tracking Security System
Aiswarya Raj1 , Meenu Manoharan2 , Melbin Alex3 , Pravya Prasad4 , Majo John5
Section:Research Paper, Product Type: Journal Paper
Volume-2 ,
Issue-12 , Page no. 50-52, Dec-2014
Online published on Dec 31, 2014
Copyright © Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John, “Machine Login Monitoring and Tracking Security System,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.50-52, 2014.
MLA Style Citation: Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John "Machine Login Monitoring and Tracking Security System." International Journal of Computer Sciences and Engineering 2.12 (2014): 50-52.
APA Style Citation: Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John, (2014). Machine Login Monitoring and Tracking Security System. International Journal of Computer Sciences and Engineering, 2(12), 50-52.
BibTex Style Citation:
@article{Raj_2014,
author = {Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John},
title = {Machine Login Monitoring and Tracking Security System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {50-52},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=331},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=331
TI - Machine Login Monitoring and Tracking Security System
T2 - International Journal of Computer Sciences and Engineering
AU - Aiswarya Raj, Meenu Manoharan, Melbin Alex, Pravya Prasad, Majo John
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 50-52
IS - 12
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3656 | 3353 downloads | 3615 downloads |
Abstract
Machine Login Monitoring and Tracking Security System (MLMTSS) were used to monitor all illegal and malicious attempts of the system user. The system should be able to provide a complete log of text entered such as passwords, emails send, websites visited. The user's login time was send by SMS to the admin. This system tracks all the keystrokes, processes opened and all operations performed by the user and send it through e-mail. The system takes screenshots within the specified interval of time and sends it with the tracked information to the administrator's mail. It also runs invisibly so that the person who is using the computer doesn't even have to be aware that it is running.
Key-Words / Index Term
Machine Login Monitoring , Tracking Security System, Emails Send, Website Visited, Keystrokes, Password
References
[1] Preeti Tuli and Priyanka Sahu, “System Monitoring and Security Using Keylogger”, IJCSMC, Vol.2, Issue.3, March 2013, pg.106-111.
[2] Kenneth Revett,Sergio Tenreiro de Magalhaes and Henrique M.D. Santos, “Enhancing Login Security Through the Use of Keystroke Input Dynamics”, © Springer, Part of Springer Science+Business Media.
[3] Masaya Sato and Toshihiro Yamauchi, “Virtual Machine Based logging Scheme for Prevention of Tampering and Loss”, © Springer, Part of Springer Science+Business Media.
[4] S. Sagiroglu and G. Canbek, “Keyloggers”, IEEE Technology and Society Magazine, Vol.28, no.3, pp.10-17, fall 2009.
[5] T. Olzak, “Keystroke logging (keylogging)”, Adventures in Security, April 2008 (accessed May 8, 2010), http://adventuresinsecurity.com/images/Keystroke_Logging.pdf.
[6] Preeti Tuli, Priyanka Sahu and Mahesh Sahu, “System Monitoring and Logging of Information and Crime” IJARCSSE, Vol.2, Issue 9, September 2012, pg.375-379.