
Suspicious Login Behavior Detector
Why Choose This Project?
In today’s enterprise and SaaS platforms, securing user authentication isn't enough—monitoring behavior after login is just as critical. This project helps detect unusual or potentially malicious login behavior (e.g., new device, unknown IP, abnormal time, geo-location anomalies), allowing early mitigation of account breaches. It adds AI-assisted behavioral profiling to login systems.
What You Get in This Project
-
Full source code (frontend + backend)
-
Login system with behavior tracking
-
Alerts & reports on suspicious logins
-
Admin dashboard with detailed logs
-
Location & device tracking
-
Documentation + setup manual
-
Scalable, real-world compatible codebase
Technology Stack
Layer | Technology |
---|---|
Frontend | HTML5, CSS3, Bootstrap 5, JavaScript |
Backend | Node.js (Express) / Java (Spring Boot) / PHP |
Database | MySQL / MongoDB |
APIs | GeoIP API, User-Agent Parser |
Security | JWT or Session Tokens, Device Fingerprinting |
How It Works (Workflow)
-
User Logs In
A user logs in using their credentials. -
Behavioral Analysis Begins
The backend captures and evaluates:-
IP address and geolocation
-
Time of login
-
Device type and browser
-
Login frequency and history
-
-
Compare with Baseline Profile
The system compares the data against the user's historical login pattern. -
Flag or Allow
If the login deviates from normal behavior (e.g., new location or unusual time), the system:-
Flags the session
-
Sends an OTP/email for verification
-
Optionally denies access until reverified
-
-
Admin & User Alerts
Both the user and admin are notified of abnormal access attempts.
Key Features
-
IP & Geo-location analysis
-
Time-based login pattern learning
-
Device/browser fingerprinting
-
Behavioral deviation score for each login
-
Admin alert system (email notifications)
-
OTP re-verification for high-risk logins
-
Dashboard to view logs and threat level per user
-
Modular for adding AI-based anomaly detection later