User Profiling Behaviour and Activity of Persistent Surveillance of User Activity in Complex Networks

Jump To References Section

Authors

  • Swami Vivekananda University Kolkata, India. ,IN
  • Swami Vivekananda University Kolkata, India. ,IN

DOI:

https://doi.org/10.18311/jmmf/2023/34172

Keywords:

Router Activity, Surveillance, Machine Learning, Networks.

Abstract

The objective of this paper is to study the behaviour of multiple user activity on network traffic.

The traditional approach of using the source IP address as a tracking identifier does not work when used to identify mobile users. Insider misuse has become a significant issue for organizations. Traditional information security has focused on threats from outside rather than employees. A wide range of concepts has been undertaken to develop approaches to detecting the insider.

Recent efforts to address this problem by exclusively not relying on web browsing behaviour, collecting data from routers, and predicting human psychology (when a router receives a packet, the router checks its routing table to determine if the table lists the destination address in the header. If the table does not contain the destination address, the router forwards the packet to another router that is listed in its routing table).

This paper builds the concept of tracking behaviour-based identification of multiple user activity on a router. Here we find out the traffic of HTTP or HTTPS Protocol and the Results are promising. find out as the result we are capable of tracking human psychology.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Downloads

Published

2023-07-04

How to Cite

Dey, K., & Bera, P. (2023). User Profiling Behaviour and Activity of Persistent Surveillance of User Activity in Complex Networks. Journal of Mines, Metals and Fuels, 71(5), 695–697. https://doi.org/10.18311/jmmf/2023/34172

Issue

Section

Articles

 

References

Forouzan, Behrouz A. (2007): Data communications and networking. Huga Media.

Taglienti, Claudio, and James Cannady. (2016): “The user attribution problem and the challenge of persistent surveillance of user activity in complex networks.” Journal of Computer Security 24, no. 2, 235-288.

Ms. Sakshi Sanklecha, Mr. Darshit Deotale, Ms. Jyoti Yadav, Ms. Dipti Mishra, Prof V. P. Yadav, (2022): User Activity Monitoring System/SPYWARE, International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; Volume 10 Issue III Mar 2022, PP 1382-1389.

Karamanos, Emmanouil. (2010): “Investigation of home router security.”.

Stallings, William. (2006): “Cryptography and network security principles and practices 4th edition.”

Fan, Liyue, Luca Bonomi, Li Xiong, and Vaidy Sunderam. (2014): “Monitoring web browsing behaviour with differential privacy.” In Proceedings of the 23rd international conference on World wide web, pp. 177-188.