International Journal of Advances in Computer Networks and Its Security
Author(s) : BHARATHI M A,, GURURAJ S P, MALLIKARJUN MATHAD
Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. When a user of an information system takes an action that user was not legally allowed to take, it is called intrusion. Internal intruders have legitimate access through user accounts; external intruders break into a system without benefit of a user account A server is a system which keeps running continuously and the administrator cannot monitor the system all the time .Any unauthorized user should not be able to use the server system and any event done by him should be known to the administrator. The events can be anything from simple mouse to keyboard interruptions (events). As information systems have come to be more comprehensive and a higher value asset of organizations, complex, intrusion detection subsystems have been incorporated as elements of operating systems, although not typically applications. Providing security for the admin system where he can control and monitor the server by getting alert messages both text and image or photo by using IP camera, when unauthorized person tries to access the system .He can shutdown the system or kill the process by sending the message to server.