Real Time Activity Logger: a User Activity Detection System
Hitesh Kumar Sharma1, Ishu Khanchi2, Nihal Agarwal3, Pawas Seth4, Prashant Ahlawat5

1Hitesh Kumar Sharma, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, India.
2Ishu Khanchi, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, India.
3Nihal Agarwal, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, India.
4Pawas Seth, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, India.
5Prashant Ahlawat, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, India.
Manuscript received on September 22, 2019. | Revised Manuscript received on October 20, 2019. | Manuscript published on October 30, 2019. | PP: 1991-1994 | Volume-9 Issue-1, October 2019 | Retrieval Number: A9529109119/2019©BEIESP | DOI: 10.35940/ijeat.A9529.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With the size of the enterprise network is growing, more and more computer terminals, internal information leakage and security threats emerging security incidents and daily management to bring a lot of pressure. Business users need a tracking system to address these security issues. A technique and framework for checking and following the exercises of a client of a PC. Affiliations are set up between the conditions of certain PC framework parameters and explicit exercises. The present movement of the client is then definite by the framework dependent on the present condition of the PC framework. As the condition of the PC framework changes, changes in the client’s action are checked and followed. The exercises are followed related to time in order to record the time spent on every movement. Through this project we are developing the understanding of the working and the basics of the Linux operating system. We are analysing the need of monitoring the system and solving the issues related to security, unauthorised access and other threats. Through this tool we are trying to address these issues.
Keywords: Tracing, Monitoring, Log files, Database, Server.