|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 93 |
| Published: March 2026 |
| Authors: Avantika R., Logesh Balaji R., Thanga Revathi S. |
10.5120/ijca2026926596
|
Avantika R., Logesh Balaji R., Thanga Revathi S. . An Approach to Secure File Monitoring Using Hashing and Behavioral Analytics. International Journal of Computer Applications. 187, 93 (March 2026), 1-7. DOI=10.5120/ijca2026926596
@article{ 10.5120/ijca2026926596,
author = { Avantika R.,Logesh Balaji R.,Thanga Revathi S. },
title = { An Approach to Secure File Monitoring Using Hashing and Behavioral Analytics },
journal = { International Journal of Computer Applications },
year = { 2026 },
volume = { 187 },
number = { 93 },
pages = { 1-7 },
doi = { 10.5120/ijca2026926596 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2026
%A Avantika R.
%A Logesh Balaji R.
%A Thanga Revathi S.
%T An Approach to Secure File Monitoring Using Hashing and Behavioral Analytics%T
%J International Journal of Computer Applications
%V 187
%N 93
%P 1-7
%R 10.5120/ijca2026926596
%I Foundation of Computer Science (FCS), NY, USA
Silent exfiltration of data by authorized yet malicious or careless insiders have become a significant security issue in the contemporary cloud and mobility-based environments. In many cases, traditional perimeter-based systems are useless after an attacker has a legitimate credential or is on the inside of the trusted network, particularly when the data is slowly drained off through a series of file downloads. The SHA-256 Hash Based Real-Time Duplicate Download Monitoring System with Behavioral Anomaly Detection presented in this paper is aimed at monitoring the pattern of suspicion of retrieval and download abuse based on duplication instead of merely regulating initial access. The proposed solution has a full-stack architecture using React.js on the frontend, Flask on the backend, and SQLite as the persistent storage layer, which creates a light-weight and yet easily extendable monitoring platform. The fundamental component of the system is a hash-based tracking system that operates on the SHA-256 hash to track file content regardless of file names, and thus renaming files is not easily bypassed. Each download event is archived in a structured database structure which distorts raw logs, suspected IP watchlists and prohibited IP registries, permitting real-time reaction and after incident forensics. The multi-stage security engine checks each request by means of banned IP tests, hash integrity test, statistics-based anomalies test, and duplicate hash test, and then categorizes users under active, suspicious or banned category. The supporting visualization of the SOC-type dashboard allows visualizing the current traffic, notifications, and tendencies of behavior, which, in turn, enable the administrators to take actions as soon as some deviations are found. Simulated enterprise experiments suggest that the system is reliable in detecting high-velocity downloads and redundant downloads to reduce data theft via duplicate-based theft at low overhead on regular user behavior. Keywords Data download duplication, duplicate file detection, file hashing, anomaly detection, cybersecurity, cloud security, mobility, web monitoring.