Abstract
The objective of this paper is to study the behaviour of multiple user activity on network traffic.
The traditional approach of using the source IP address as a tracking identifier does not work when used to identify mobile users. Insider misuse has become a significant issue for organizations. Traditional information security has focused on threats from outside rather than employees. A wide range of concepts has been undertaken to develop approaches to detecting the insider.
Recent efforts to address this problem by exclusively not relying on web browsing behaviour, collecting data from routers, and predicting human psychology (when a router receives a packet, the router checks its routing table to determine if the table lists the destination address in the header. If the table does not contain the destination address, the router forwards the packet to another router that is listed in its routing table).
This paper builds the concept of tracking behaviour-based identification of multiple user activity on a router. Here we find out the traffic of HTTP or HTTPS Protocol and the Results are promising. find out as the result we are capable of tracking human psychology.
Publisher
Informatics Publishing Limited
Reference7 articles.
1. Forouzan, Behrouz A. (2007): Data communications and networking. Huga Media.
2. Taglienti, Claudio, and James Cannady. (2016): “The user attribution problem and the challenge of persistent surveillance of user activity in complex networks.” Journal of Computer Security 24, no. 2, 235-288.
3. Ms. Sakshi Sanklecha, Mr. Darshit Deotale, Ms. Jyoti Yadav, Ms. Dipti Mishra, Prof V. P. Yadav, (2022): User Activity Monitoring System/SPYWARE, International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653
4. Volume 10 Issue III Mar 2022, PP 1382-1389.
5. Karamanos, Emmanouil. (2010): “Investigation of home router security.”.