A system for detection of abnormal behavior in BYOD based on web usage patterns

Many companies have recently introduced the concept of BYOD (Bring Your Own Device) for private mobile devices used at work. Accordingly, they are also introducing NAC and MDM systems to prevent the leak of business information, control access and manage users efficiently. As the access control policy of NAC and MDM is uniformly applied to the users, however, security threats remain due to the frequent loss or theft of devices and low security level. This is why BYOD has not yet been actively introduced. A flexible policy is thus needed by collecting personalized status information and detecting/controlling abnormal users. In this paper, the potential weak points of the BYOD environment are classified, and a behavior-oriented detection method for abnormal activities is proposed by patterning the information use status of various users.

[1]  Manpreet Singh,et al.  Formal Specification of Common Criteria Based Access Control Policy Model , 2010, Int. J. Netw. Secur..

[2]  Manpreet Singh,et al.  A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment , 2009 .

[3]  Jeffrey M. Voas,et al.  BYOD: Security and Privacy Considerations , 2012, IT Professional.

[4]  Dongho Won,et al.  Security Requirements of a Mobile Device Management System , 2012 .

[5]  Dimitris Gritzalis,et al.  Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.