Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access

Date

2017-07-19

Advisors

Journal Title

Journal ISSN

ISSN

Volume Title

Publisher

ACM

Type

Conference

Peer reviewed

Yes

Abstract

With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified computing by introducing the use of personally owned devices. These devices can be utilised in accessing business enterprise contents and networks. The effectiveness of BYOD offers several business benefits like employee job satisfaction, increased job efficiency and flexibility. However, allowing employees to bring their own devices could lead to a plethora of security issues; like data theft, unauthorised access and data leakage. This paper investigates the current security approaches and how organisations can leverage on these techniques regarding policies, risks and existing security techniques to mitigate or halt the security challenges. This research aimed to fill up the access control gap in the BYOD environment by developing an Intelligent Filtering Technique (IFT) using Artificial Intelligence (AI) Technique. Based on the behavioural patterns of device packets Inter-Arrival-Time (IAT) features through network traffic flow packet headers (Such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Internet Control Messaging Protocol (ICMP)).

Description

Keywords

Security and privacy: Information flow control, Applied computing: Enterprise computing, Access control

Citation

Muhammad, MA., Ayesh, A. and Zadeh. PB. (2017) Developing an Intelligent Filtering Technique for Bring Your Own Device Network Access Control. In: Proceedings of the International Conference on Future Networks and Distributed Systems (ICFNDS '17). ACM, New York, NY, USA, Article 46,

Rights

Research Institute

Cyber Technology Institute (CTI)
Institute of Artificial Intelligence (IAI)