A Behaviour Profiling Based Technique for Network Access Control Systems

Date

2019-03-20

Advisors

Journal Title

Journal ISSN

ISSN

2305-001

DOI

Volume Title

Publisher

The Society of Digital Information and Wireless Communications (SDIWC)

Type

Article

Peer reviewed

Yes

Abstract

The emergence of the Internet of Things (IoT) has lead to a tech- nological transformation that integrates several technologies to represent the future of computing and communications. IoT is the interconnection of internet of computing devices embedded in objects such as sensors, actuators and networks enabling them to send and receive data. Bring Your Own Device (BYOD) is an integral part of IoT, which is the practice of allowing em- ployees to use their own smartphones, tablets and laptops in the workplace to access enterprise resources and applications. It of- fers several benefits like employee job satisfaction, productivity, increased job efficiency and flexibility. With all the advantages offered, BYOD environments are still less safe because of per- sistent security threats, attacks caused by loss, theft of personal devices and corporate data leakage. BYOD enterprise network is accessed through enterprise mobility management solutions which monitor, controls and enforce access control policies to devices accessing the network. This paper aims to close the gap of the existing Network Access Control (NAC) systems focusing on 802.1x protocols with a Novel Device type Behaviour Profiling Technique. The Behaviour Profiling Technique used a dataset proposed in [29] to develop a device type behaviour profiles of five dell netbooks, three iPads, two iPhones 3G, two iPhones 4G and two Nokia Phones using K-Means Clustering Algorithm.

Description

open access journal

Keywords

BYOD security, Behaviour profiling, device fingerprinting, k-means clustering, anomaly detection

Citation

Muhammed, M.A., Ayesh, A. (2019) A Behaviour Profiling Based Technique for Network Access Control Systems. International Journal of Cyber-Security and Digital Forensics, 8(1), pp.23-30.

Rights

Research Institute