Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Ms. Sakshi Sanklecha , Mr. Darshit Deotale , Ms. Jyoti Yadav, Ms. Dipti Mishra, Prof V. P. Yadav
DOI Link: https://doi.org/10.22214/ijraset.2022.42200
Certificate: View Certificate
Spyware do the task of observance and recording of user actions, within the field of knowledge security or cyber security. as well as the utilization of applications, windows opened, system commands dead, checkboxes clicked, text entered/edited, URLs visited and nearly each everything on-screen event to guard knowledge by guaranteeing that staff and contractors area unit performing arts their allotted tasks and not motion any risk to the organization area unit all captured and recorded within the system by the Spyware. Video-like playback of user activity and method the videos into user activity logs that keep gradual records of user actions which will be searched and analysed is delivered by the User Activity observance System to research any out-of-scope activities. making a visible record of probably risky user activity area unit all concerned in Visual Forensics. every user action is logged, and recorded. Once a user session is completed, Spyware creates a written account further as visual record. It may be screencaptures/screenshots or video of specifically what quite activity a user has done. This written account of our Spyware differs from that of a SIEM or work tool, as a result of it captures knowledge at a user-level not at a system level –providing plain English logs instead of System Logs (which is originally created for debugging purposes). These matter logs may be accustomed try with the corresponding screencaptures/screenshots or video summaries. Mistreatment these corresponding logs and pictures, the visual forensics element of Spyware permits for organizations to look for precise user activity just in case of a security incident. within the case of a security threat, i.e. {a knowledge|a knowledge|an information} breach or data leak, visual Forensics area unit accustomed show specifically what quite activity a user has done, and everything resulting in the incident. Visual Forensics may also be accustomed give proof to any enforcement that investigate the intrusion or leak.
I. INTRODUCTION
Tools that monitor and track user behaviour on devices, networks, and alternative company-owned IT resources area unit nothing however the Activity observation Systems. SPYWARES facilitate U.S.A. to find and stop corporate executive threats, whether or not unintentional or with malicious intent that’s why it's in use by several organizations. ways utilization and observation area unit all depends on the objectives of the corporate.
For additional pronto characteristic of suspicious behaviour and serious risks before they lead to security violations, or a minimum of in time to attenuate damages such variety of computer code area unit enforced. Generally known as user activity pursuit, user activity observation is a proactive review of user activity to work out misuse of access privileges or information protection policies either through cognitive content or malicious intent however may be a sort of police work. Protective info whereas making certain handiness and compliance with information privacy and security laws all area unit the aim of user activity observation. SPYWARE goes on the far side merely observation network activity.
Every kind of user activity, as well as all system, data, application, and network actions that users take area unit all monitored. internet browsing activity of user, whether or not users area unit accessing unauthorized or sensitive files, and additional area unit all the examples that SPYWARES will monitor.
There are various methods implemented to monitor and manage user activity such as:
A. File/screenshot Capturing
After every 0.2 sec capturing of screen goes on continuously until it has been stop by the server.
B. Log Collection and Analysis
It is the process of reviewing, interpreting and understand computer-generated records called logs. Logs are generated by a range of programmable technologies, including networking devices, operating systems, applications, and more. Log analysis involves collecting, evaluating, and managing the data reported by various components. It is the practice of managing all of the log data produced by your applications and infrastructure
C. Network Packet Inspection
It refers to the method of examining the full content of data packets as they traverse a monitored network checkpoint. With normal types of packet inspection, the device only checks the information in the packet's header, like the destination Internet Protocol (IP) address, source IP address, and port number. DPI examines a larger range of metadata and data connected with each packet the device interfaces with.
D. Keystroke Logging
The process used to view or record both the keystrokes entered by a computer user and the computer's response during an interactive session. These are used to quietly monitor your computer activity while you use your devices as normal. Companies have the legal ability to use key-logger software on business computers, deploy video surveillance cameras, monitor worker attentiveness, track physical movements through geolocation software, compile lists of visited websites and applications, monitor emails, social media posts, and collaboration tools.
E. Kernel Monitoring
Kernel probes are a set of tools to collect Linux kernel debugging and performance information. Developers and system administrators usually use them either to debug the kernel, or to find system performance bottlenecks. The reported data can then be used to tune the system for better performance. All of the information gathered must be looked at within the boundaries of company policy and the user role to figure out if inappropriate activity is in play. What constitutes “inappropriate user activity” is up to the company deploying the SPYWARE solution, and can include anything from visiting personal sites or shopping during work hours to theft of sensitive company data such as intellectual property or financial information.
Spyware is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user. For example, by violating their privacy or endangering their device's security. This behaviour may be present in malware as well as in legitimate software. Websites may engage in spyware behaviours like web tracking. Hardware devices may also be affected. Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviours are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.
II. REVIEW OF LITERATURE
Today's Lab Assist. has to take care of all the PC’s all alone. And has to keep an eye on each and every student while they are performing practical’s whether they are really doing assigned work or doing some suspicious activity. And it is extremely difficult to keep an eye on each PC at the same time.
To overcome this problem, we develop an online application for the Java programming language. Java is perfectly acceptable and workable for web development and actually better than .net and Python. Java is a general Programming language. It is an Object Oriented, static type language. From his experience if we use the right web development tool then java is definitely a great language for web development. Java is perfectly fine for small websites, you can get JSP pages working very quickly with a Java Web Server such as Tomcat. The main reason for large companies choosing Java over other solutions is because it is considered to be much more secures.
A. Features of Java
Now-a-days, in this 21st century era of computer generation, viewing in the sense of updated technology Lab assists take care of all the PC’s alone. It gets extremely difficult to keep an eye on each PC at the same time. It also gets difficult to keep an eye on users about suspicious activity the user is doing in offices on the PCs connected on the same network. To overcome this problem, we are developing this online application by using Java Programming Language. It is Object oriented and static type language. Easy to get JSP working very quickly and in a secure ways.
III. RESEARCH METHODOLOGY
In this study, each client will be given some task, they have to complete the task on time. To have the monitoring on their work, we are developing this system. If any suspicious task is given to the client and client is sending that precious data to other person it can also be caught easily. If any crime occurs during the worktime then also for catching the person who has done the crime the system will be helpful. At many places like departmental works the system can be use because the client sitting on the client-side PC will not know the system is getting monitored. All the monitored data will be stored in the server-side PC’s database where the location is provided.
There are mainly two modules:-
Spy-server and all PC’s of Spy-client should be connected in same network for monitoring. Firstly, we have to init the thread of spy-client and run the spy client code. At the same time we have to run the spy server from the server-side. Login the spyserver, after successful login it will checks Admin ID and password and display the Home page. When the thread get initiated it will show the IP address of the client PC at the server side PC. Then we have to connect client IP address at server side. And the screenshots will be started of connected client PC’s. If found any illegal activity at client-side, server can easily shutdown the client PC from server-side. All the screen captures will be recorded and saved at server-side database. After the work completed you may stop the running code of spy-client as well as spy-server.
In the above figure, A, B, C are the PC’s i.e. Client or spy-client. All the PC’s and server are connected in a same network. All the client PC’s data will be monitored by the server. And accordingly, at the same time the monitored data will be stored at server- side database. The path of the storing data at proper location will be set and saved at the server-side PC. After every 0.2sec data will be captured.
IV. FINDINGS & ANALYSIS
A. Co-correlation Between Distance and Time.
The testing of distance is also carried out to determine the effect of tapping distance on the serial number read time. Figure 2 shows the testing results of correlation between distance and time.
Based on the graph, it can be seen that the tapping distance does not affect the time required for reading the serial numbers. This is evidenced by the unstable time graph generated from the Test results. The average time taken by the card to read the serial number is less than 0.2 seconds
B. Testing Results
The test results show that the reader can read the serial number properly. This is evidenced by the successful reading of the serial number 15 times. Thus, the percentage of successful reading the Serial number is 100%.
V. RESULTS
A. Testing of System Functionality
The testing of system functionality is used to determine the success of the features on the system. The Test results of system functionality are shown in below Table.
VI. EXPERIMENTAL RESULT
After executing the code spy-client will capture image automatically. All the captured data will be monitored by the server and the data will be stored at server side.
A. Spy-client
2. Client Session Details
B. Spy- Server
2. Forget Password
3. Admin Panel After Login/ Home Page
4. Client List and Details Shown at Admin Panel
5. Screenshots Getting Stored
VII. DISCUSSION
Protecting information while ensuring availability and compliance with data privacy and security regulations are all done by this system. SPYWARE goes beyond simply monitoring network activity. Including all system, data, application, and network actions that users take – such as their web browsing activity, whether users are accessing unauthorized or sensitive files, and more are all monitored automatically.
Main features in training User Activity Monitoring System (SPYWARE) are:
A. Records user System Login Name
When a user logs in to the system (Windows, Terminal Session etc.) and enters his/her login name/password, computer monitoring software captures the login name. This information is used to identify who is using the computer. To catch the user’s system login name the software uses special system functions. Also computer monitoring software records system login and logout times to identify when the computer was used.
B. Captures Applications Used
When a user runs various applications, computer monitoring software captures and records which applications are being run (How to monitor software use). This is done with the help of special system functions. Basically, computer monitoring collects lots of data. To save disk space and minimize system resources use, computer monitoring software records used applications with a certain precision (for example, every 3 minutes).
C. Records visited URLs
With the help of special system functions computer monitoring software monitors Internet use by recording website URLs ¢ Stores captured information: All captured information is stored in a database. This is to generate reports and analyze computer use.
D. Stores Captured Information
All captured information is stored in a database. This is to generate reports and analyze computer use.
VIII. FUTURE SCOPE
Our project is easily extendable and can be improved by further for new and improved upgrades. New module can be easily added as it can be done an addition of a new package on click of a button. Our project has a big scope to do in the field of cyber security and protection of the company trade secrets and for the better work output of employees. As teachers can also get access to what students are doing on computer. Though our project is matured enough but still there is still scope for betterment as it’s always an open door. In this case we can also add some features to this software to make this software more reliable and robust. The project performs its intended functions with required precision, hence is very reliable and precise. The project is very flexible and any modification can be made to the existing system to suit changes that can take place in distant or immediate future. The online processing of the project is very simple following the existing method without any changes and suitable validation are provided for easy and correct access to user.
IX. ACKNOWLEDGMENT
We would like to express our deep sense of gratitude to Prof. Mr. Virendra Yadav for sharing his expert views and continuous support as a guide. We also express our sincere thanks to Dr. S.A. Dhale, principal of Priyadarshini College of Engineering, Dr. Leena Patil, HOD of Computer Science and Engineering Department and Dr. Nilesh Shelke, Project In-charge for their kind co-operation, valuable guidance constant motivation, providing necessary infrastructure and all the facilities necessary for development of the project. We also thankful to all the faculty members and all non-teaching staff of the department & college for their co-operation throughout the project work. At last a special thanks to the researchers whose paper gave us the right direction to work.
Although user activity monitoring has its drawbacks considering the different circumstances, companies have the right to ensure that their employees are working productively, responsibly, and safely. When its implemented transparently and with sensitivity, SPYWARE/Spyware tools can achieve their objectives without creating insecurities in the workplace. In any case, SPYWARE/Spyware should be only one component of a company’s broader security efforts. As such, the data gathered from SPYWARE/Spyware tools can and should be included in an organization’s security analytics practice to help paint a full picture of its security posture. From the college point of view now a day’s Lab Assist take care of all the computers all alone. And also have to keep eye on each and every student while they are performing practical or any other college related work. Whether they are really doing assigned work or doing some suspicious activity. And it is extremely difficult to keep eye on each computer at the same time.
[1] The 1st Annual Technology, Applied Science and Engineering Conference IOP Conf. Series: Materials Science and Engineering 732 (2020) 012042 IOP Publishing doi:10.1088/1757- 899X/732/1/012042 [2] Hindawi Journal of Healthcare Engineering Volume 2019, Article ID 5674673, 13 pages https://doi.org/10.1155/2019/5674673 [3] 4th International Conference on Electronic Devices, Systems and Applications 2015 (ICEDSA) IOP Publishing IOP Conf. Series: Materials Science and Engineering 99 (2015) 012011 doi:10.1088/1757-899X/99/1/012011 [4] Research in INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING · June 2018 DOI: 10.26438/ijcse/v6i6.539542 [5] The 1st Annual Technology, Applied Science and Engineering Conference IOP Conf. Series: Materials Science and Engineering 732 (2020) 012042 IOP Publishing doi:10.1088/1757- 899X/732/1/012042
Copyright © 2022 Ms. Sakshi Sanklecha , Mr. Darshit Deotale , Ms. Jyoti Yadav, Ms. Dipti Mishra, Prof V. P. Yadav. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET42200
Publish Date : 2022-05-03
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here