Downloads: 0
Research Paper | Computer Science and Engineering | Volume 15 Issue 3, March 2026 | Pages: 230 - 235 | India
USB Intrusion Logger: Safeguarding and Protecting Enterprises System
Abstract: With the increasing reliance on portable storage devices in enterprise and academic environments, USB based attacks have become a significant vector for data breaches, malware infections, and unauthorized data exfiltration. This research presents the design and implementation of a lightweight, open-source USB Intrusion Logger tool aimed at enhancing endpoint security through real-time monitoring and control of USB device connections. The proposed solution detects every USB device connected to the system, extracts its unique identifiers (such as Vendor ID, Product ID, and Serial Number), and logs these details with timestamps. A whitelist mechanism ensures that only authorized USB devices are allowed to operate normally, while unauthorized devices are restricted from data transfer. Upon detection of an unauthorized USB connection, the tool generates immediate alerts via email and activates an audible alarm until the device is removed. This proactive approach helps mitigate the risks associated with USB-based threats in sensitive environments. The tool is built using Python and designed for cross-platform compatibility, making it suitable for educational institutions, SMEs, and security-conscious users. The project contributes to the field of endpoint security by offering a customizable, easy-to-deploy, and effective solution for USB device monitoring and control.
Keywords: Cybersecurity, USB logger, Endpoint Security, USB Intrusion logger
How to Cite?: Tejal Komal Desai, Aliya Asif Sayyed, Siddhi Waghcoude, "USB Intrusion Logger: Safeguarding and Protecting Enterprises System", Volume 15 Issue 3, March 2026, International Journal of Science and Research (IJSR), Pages: 230-235, https://www.ijsr.net/getabstract.php?paperid=SC26211105038, DOI: https://dx.dx.doi.org/10.21275/SC26211105038