Professional Documents
Culture Documents
III. CONCLUSION
After that, the system will make an individual report for
each mac address identified person and focus on each
The behavior-based tracking scheme studied in this paper is
keyword of the packet, depending on the words system will capable of monitoring the user. Now the concept is playing an
predict the type of word by taking the help of the ML important role in the corporate sector or institutions for security
algorithm and predict the thought process of the person. For purposes. The future scope and the extension of this paper is
generating the thought process as a final report our system possible on large scale.
According to the survey, many people look for undesirable
will depend on the previously collected data which was things on search engines, which has a bad impact on global
already generated in the previous certain time period. civilization. That’s why router monitoring and user perception
identification may be viable alternative to protect society from this
A router uses a Linux-based OS(Operating System) like menace. In another hand, we can monitor the list of productive,
responsible, and safe people for an Institute or Society. If we use it
OpenWrt, DD-WRT, MikroTik, etc and there is also a on a large scale in the future then it can help National Defense
processor and ram for data processing. That is like Linux System by identifying Terrorist mindset persons and can spot their
Operating System installed PC. Our system will make a location.
copy of the data and MAC address that is passing through Our System is easily extendable and can be improved further
this router. The most copied data will be in HTTP or in for new and improved upgrades. Our System has a big scope to do
a predicted list of people depending on their browsing activity and
HTTPS protocol format. The fact that HTTP is a client- provide protection of the company trade secrets and for the better
server protocol that enables internet users to ask web servers work output of employees, analysis of members under a single
for web pages. It is a commonly used application-level environment(School, College, Digital Library, Society), and can
protocol on the Internet. A browser sends an HTTP Request upgrade it to the national level if needed in future. Though our
project is mature enough still there is still scope for betterment as
message to the web server whenever a user wants to visit a it’s always an open door.
web page. The web servers typically use TCP port 80. REFERENCES
Today, HTTP/1.1 is the version of HTTP that is most often