A Study on Abnormal Behavior Detection in BYOD Environment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33104
A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors, such as information leaks, using the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection, and discusses applications of this method in BYOD environment.

Keywords: BYOD, Security, Anomaly Behavior Detection.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1089569

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2068

References:


[1] Miller, K.W. "BYOD: Security and Privacy Considerations,” IT Professional, Vol 14, No 5, Oct, 2012, pp. 53-55.
[2] Inverse, "PacketFence," 2013, (http://www.packetfence.org/).
[3] V Frias-Martinez, "Behavior-Based Network Access Control: A Proof-of-Concept," ISC, 2008, pp. 175-190.
[4] D'Alconzo, A. "A Distribution-Based Approach to Anomaly Detection and Application to 3G Mobile Traffic," GLOBECOM, Dec. 2009, pp. 1-8.
[5] P. Graham, "A Plan for Spam," http://www.paulgraham.com/spam.html, 2002.