UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 3
March-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2403A97


Registration ID:
535214

Page Number

k737-k741

Share This Article


Jetir RMS

Title

VIRTUAL PERSONAL ASSISTANT

Abstract

Nowadays there are many software are running in the background of our system in that some of them are vulnerable which are stealing our data so main aim of this virtual personal assistant is to provide an effortless human interaction to control and maintain the system’s security from vulnerable software. According to this approach, this a will interact with user by voice input and voice output for denoting any information about the activity, there many type of vulnerable attacks or data stealing methods in that we are mainly focused on software based attacks , wireless networks attacks, tunnel stealing, vulnerable software injunctions . This AI will able to control the system by users input and it will detect the these attacks, we will train a model with data which consist of CPU, GPU, memory , RAM , background data usage , auto boot startups , software size by these data our model will know about the basic usage of every software which are currently running on the system, Apart from this model the we will detecting what type of programs are running in the background, generally it will starts its work from the booting of the system , it will check any programing are acting vulnerably in the background it will detect by trained model also it will detect whether any program is created a tunnel for transferring details these tunnel communication detections are done by continuous analysis of secure shell activity and also by detecting that any signals are data transfers are occurred by any program continuously and apart from wireless attacks it will detect the unknown user activities make a required action to secure the data for making these secure action this AI will send a notification to owners mobile which is having APK which will help to make required action through that APK the user can do some necessary action like taking a picture of the attacker, also control their laptop through mobile.

Key Words

Virtual Personal Assistant, Vulnerable detection, tunnel stealing, wireless network data steal connection

Cite This Article

"VIRTUAL PERSONAL ASSISTANT", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 3, page no.k737-k741, March-2024, Available :http://www.jetir.org/papers/JETIR2403A97.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"VIRTUAL PERSONAL ASSISTANT", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 3, page no. ppk737-k741, March-2024, Available at : http://www.jetir.org/papers/JETIR2403A97.pdf

Publication Details

Published Paper ID: JETIR2403A97
Registration ID: 535214
Published In: Volume 11 | Issue 3 | Year March-2024
DOI (Digital Object Identifier):
Page No: k737-k741
Country: Chennai, Tamil Nadu, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00016

Print This Page

Current Call For Paper

Jetir RMS