Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access
Date
Advisors
Journal Title
Journal ISSN
ISSN
Volume Title
Publisher
Type
Peer reviewed
Abstract
With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified computing by introducing the use of personally owned devices. These devices can be utilised in accessing business enterprise contents and networks. The effectiveness of BYOD offers several business benefits like employee job satisfaction, increased job efficiency and flexibility. However, allowing employees to bring their own devices could lead to a plethora of security issues; like data theft, unauthorised access and data leakage. This paper investigates the current security approaches and how organisations can leverage on these techniques regarding policies, risks and existing security techniques to mitigate or halt the security challenges. This research aimed to fill up the access control gap in the BYOD environment by developing an Intelligent Filtering Technique (IFT) using Artificial Intelligence (AI) Technique. Based on the behavioural patterns of device packets Inter-Arrival-Time (IAT) features through network traffic flow packet headers (Such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Internet Control Messaging Protocol (ICMP)).