2. LITERATURE SURVEY
This literature survey compiles various books, research papers, and articles that provide foundational and advanced insights into monitoring, detection, and alert systems in computer security. It specifically focuses on clipboard monitoring, AI tool detection, keylogging, system process monitoring, and email alert systems.
2.1 System Monitoring and Process Detection
Objective: To detect anomalies or malicious behavior in running system processes.
Key Findings:
Qi Chen and Shambhu Upadhyaya in "Process Monitoring for Intrusion Detection" (IEEE SECON, 2005) proposed methods to analyze and monitor running processes to detect potential intrusions.
Utilized dynamic process monitoring to identify deviations from normal behavior.
Emphasized real-time alerts for unusual process execution patterns.
Sanjay Rawat and Kapil Ahuja in "Anomaly Detection in System Processes" (IEEE TIFS, 2021) demonstrated the use of machine learning for detecting anomalies in system processes.
Highlighted the integration of AI-based models to classify processes as benign or malicious.
This work aligns with the AI tool detection functionality in the script.
2.2 Clipboard Monitoring and Keylogging
Objective: Monitor clipboard activity and detect unauthorized access or suspicious usage.
Key Findings:
A. Sharma et al., "Detecting and Preventing Keylogging Attacks in Modern Systems" (IEEE Symposium on Security, 2019):
Introduced proactive defense mechanisms to detect clipboard and keystroke logging.
Recommended integrating logging detection with real-time alerts.
Sabelfeld and Payer, "Evaluating the Security of Copy-Paste Practices" (ACM, 2018):
Identified vulnerabilities in clipboard monitoring and highlighted risks in automated monitoring systems.
Provided recommendations for ethical monitoring practices.
2.3 AI Tool Detection
Objective: Detect usage of specific AI tools based on process and window monitoring.
Key Findings:
Sara Rodriguez et al., "Detection of AI Usage in Workplace Applications" (2020):
Examined process monitoring and window title detection to identify AI tools in corporate environments.
Discussed ethical implications of monitoring AI usage.
L. Zhang et al., "Evaluating AI Detection in Digital Systems: Challenges and Opportunities" (2022):
Explored machine learning techniques for monitoring AI-based applications in multi-user environments.
Suggested a hybrid approach combining process logs and network traffic analysis.
2.4 Email Alert Systems and Screenshots
Objective: Use automated alerts, including screenshots, to notify users or administrators of detected events.
Key Findings:
J. Doe et al., "Enhancing Email Security Through Automated Monitoring and Alert Systems" (IEEE Cybersecurity, 2020):
Emphasized the importance of securely handling screenshots and other attachments in email alerts.
Highlighted encryption and authentication as key features.
A. Bianchi et al., "Evaluating Security Implications of Screenshots in Monitoring Systems" (IEEE CVPR, 2018):
Discussed the risks of capturing and sharing screenshots, including privacy concerns and potential misuse.
2.5 Legal and Ethical Implications
Objective: Explore ethical and legal boundaries in implementing monitoring systems.
Key Findings:
D. Richards et al., "The Ethics of Monitoring Software and Keylogging in the Workplace" (IEEE Technology and Society Magazine, 2016):
Addressed privacy concerns and ethical dilemmas in monitoring employees.
Recommended transparency and consent as essential components.
K. McCarthy et al., "Legal Boundaries of Digital Surveillance in Personal Devices" (IEEE TPS, 2022):
Analyzed global legal frameworks such as GDPR and their implications for monitoring software.
Highlighted penalties for misuse or unauthorized surveillance.