Skip to main content

Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 354))

  • 1392 Accesses

Abstract

With the trend of BYOD (Bring Your Own Device), i.e., using personal mobile devices for work, proliferating, one can easily find people doing their work anytime, anywhere. BYOD has the benefits of reducing business expense and increasing work productivity and efficiency. Nonetheless, the uncontrolled access of internal networks by the personal devices, for which enterprises have limitations in controlling, exposes the companies to security threats such as leak of confidential data and access by unauthorized users, yet there are inadequate countermeasures. Therefore, there is a need for a means of collecting the personalized context data of the user accessing the internal network and detecting and controlling abnormal user access by establishing a context-based policy. This paper presents measures for detecting abnormal access by collecting the context data according to the various devices and access environment and establishing the context data-based policy under the BYOD environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Miller, K.W.: BYOD: security and privacy considerations. IT Prof. 14(5), 53–55 (2012)

    Article  Google Scholar 

  2. Kang, D.: Context based smart access control on BYOD environments. Inf. Secur. Appl. Lect. Notes Comput. Sci. 8909, 165–1762 (2015)

    Article  Google Scholar 

  3. Singh, M., Patterh, M.S., Kim, T.-H.: A formal policy oriented access control model for secure enterprise network environment. Int. J. Secur. Appl. 3(2), 1–14 (2009)

    Google Scholar 

  4. Eckersley, P.: How unique is your web browser?. In: 10th International Symposium, PETS 2010, Berlin, Germany, 21–23 July 2010

    Google Scholar 

  5. IDG Deep Dive: Guide to BYOD strategy. IDG Korea (2012)

    Google Scholar 

  6. Johnson, K.: Mobility/BYOD security survey. SANS Institute, Bethesda (2012)

    Google Scholar 

  7. Henderson, T.: How mobile device management works. IT WORLD (2011)

    Google Scholar 

  8. Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)

    Article  Google Scholar 

  9. Koh, E.: A study on security threats and dynamic access control technology for BYOD, smart-work environment. IMECS (2014)

    Google Scholar 

  10. Kim, T.: A study on context information collection for personal mobile device identification in BYOD and smart work environment. Mobility IoT (2014)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the IT R&D program of MSIP/KEIT (Ministry of Science, ICT and Future Planning/Korea Evaluation Institute Of Industrial Technology). (10045109, The Development of Context-Awareness based Dynamic Access Control Technology for BYOD, Smart work Environment.)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changmin Jo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jo, C. (2016). Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment. In: Park, J., Chao, HC., Arabnia, H., Yen, N. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47895-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47895-0_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47894-3

  • Online ISBN: 978-3-662-47895-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics