scholarly journals Real Time Activity Logger: a User Activity Detection System

With the size of the enterprise network is growing, more and more computer terminals, internal information leakage and security threats emerging security incidents and daily management to bring a lot of pressure. Business users need a tracking system to address these security issues.A technique and framework for checking and following the exercises of a client of a PC. Affiliations are set up between the conditions of certain PC framework parameters and explicit exercises. The present movement of the client is then definite by the framework dependent on the present condition of the PC framework. As the condition of the PC framework changes, changes in the client's action are checked and followed. The exercises are followed related to time in order to record the time spent on every movement.Through this project we are developing the understanding of the working and the basics of the Linux operating system. We are analysing the need of monitoring the system and solving the issues related to security, unauthorised access and other threats. Through this tool we are trying to address these issues.

2019 ◽  
Vol 214 ◽  
pp. 07016 ◽  
Author(s):  
Tian Yan ◽  
Shan Zeng ◽  
Mengyao Qi ◽  
Qingbao Hu ◽  
Fazhi Qi

To improve hardware utilization and save manpower in system maintenance, most of the web services in IHEP have been migrated to a private cloud build upon OpenStack. However, cyber security attacks becomes a serious threats to the cloud progressively. Therefore, a cyber security detection and monitoring system is deployed for this cloud platform. This system collects various security related logs as data sources, and processes them in a framework composed of open source data store, analysis and visualization tools. With this system, security incidents and events can be handled in time and rapid response can be taken to protect cloud platform against cyber security threats.


1992 ◽  
Vol 45 (2) ◽  
pp. 157-165 ◽  
Author(s):  
Peter J. Duffett-Smith ◽  
Graham Woan

We describe a new type of radio navigation and tracking system which, unlike conventional systems, does not depend on a costly infrastructure of coherent radio transmitters. This new system measures positions using spatial, rather than temporal, coherence and can therefore use any existing radio transmitters set up for any purpose. We describe the principles of operation, applications and present results obtained with a demonstration unit (in Cambridge) which can measure the position of a motor vehicle to a precision of about 5 m using local medium-wave public broadcast transmitters.


2020 ◽  
Vol 8 (6) ◽  
pp. 3949-3953

Nowadays there is a significant study effort due to the popularity of CCTV to enhance analysis methods for surveillance videos and video-based images in conjunction with machine learning techniques for the purpose of independent assessment of such information sources. Although recognition of human intervention in computer vision is extremely attained subject, abnormal behavior detection is lately attracting more research attention. In this paper, we are interested in the studying the two main steps that compose abnormal human activity detection system which are the behavior representation and modelling. And we use different techniques, related to feature extraction and description for behavior representation as well as unsupervised classification methods for behavior modelling. In addition, available datasets and metrics for performance evaluation will be presented. Finally, this paper will be aimed to detect abnormal behaved object in crowd, such as fast motion in a crowd of walking people


2021 ◽  
Vol 6 (1) ◽  
pp. 72-82
Author(s):  
Faiz Iman Djufri ◽  
Charles Lim

Cyber Security is an interchange between attackers and defenders, a non-static balancing force. The increasing trend of novel security threats and security incidents, which does not seem to be stopping, prompts the need to add another line of security defences. This is because the risk management and risk detection has become virtually impossible due to the limited access towards user data and the variations of modern threat taxonomies. The traditional strategy of self-discovery and signature detection which has a static nature is now obsolete in facing threats of the new generation with a dynamic nature; threats which are resilient, complex, and evasive. Therefore, this thesis discusses the use of MISP and The Triad Investigation approach to share the Indicator of Compromise on Cyber Intelligence Sharing Platform to be able to address the newt threats.


Sign in / Sign up

Export Citation Format

Share Document