Intelligent Risk Management Framework for BYOD

The current information security risk management systems mainly focus on networking related risks that apply to network devices and users. However, risk management landscape has changed in recent years as new smart, mobile devices have been incorporated into the business networks to enhance productivity. This new phenomenon is called Bring Your Own Devices (BYOD) environment. The traditional risk management plans suffer from emerging threats that exist in BOYD environment. It is imperative to have an effective risk management system for the BOYD environment to efficiently deal with privacy breaches loss of business data and data leakage. Therefore, this paper proposes a novel approach which utilizes MDM log file to proactively detect potential threats in BYOD environment and take preventive and mitigative measures in real time.

[1]  R. Rudman,et al.  Mobile technology risk management , 2016 .

[2]  Pat Langley,et al.  Selection of Relevant Features and Examples in Machine Learning , 1997, Artif. Intell..

[3]  Prachi Joshi,et al.  Protego: A passive intrusion detection system for Android smartphones , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).

[4]  Maumita Bhattacharya,et al.  BYOD Security: A New Business Challenge , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).

[5]  Kathleen Goeschel,et al.  Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis , 2016, SoutheastCon 2016.

[6]  Madhavi Dhingra Legal Issues in Secure Implementation of Bring Your Own Device (BYOD) , 2016 .

[7]  Manmeet Mahinderjit Singh,et al.  Advanced Persistent Threat Mitigation Using Multi Level Security - Access Control Framework , 2015, ICCSA.

[8]  Michael I. Jordan,et al.  Machine learning: Trends, perspectives, and prospects , 2015, Science.

[9]  Neal Leavitt Today's Mobile Security Requires a New Approach , 2013, Computer.

[10]  Robert Ogie,et al.  Bring Your Own Device: An overview of risk assessment , 2016, IEEE Consumer Electronics Magazine.

[11]  G. Sathya,et al.  Network activity classification schema in IDS and log audit for cloud computing , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[12]  Mrutyunjaya Panda,et al.  Performance analysis of supervised machine learning techniques for sentiment analysis , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).

[13]  Drew Conway,et al.  Machine Learning for Hackers - Case Studies and Algorithms to Get You Started , 2012 .

[14]  Dominique. Assing,et al.  Mobile Access Safety: Beyond BYOD , 2013 .

[15]  R. Manimegalai Survey on Mobile Ad Hoc Network Attacks and Mitigation Using Routing Protocols , 2012 .