BYOD Cyber Threat Detection and Protection Model

被引:4
作者
Ali, Md Iman [1 ]
Kaur, Sukhkirandeep [2 ]
机构
[1] Lovely Profess Univ, Dept Comp Applicat, Phagwara, Punjab, India
[2] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara, Punjab, India
来源
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS) | 2021年
关键词
BYOD; Cyber Security; Digital Forensic; Cyber Crime; Mobile Security;
D O I
10.1109/ICCCIS51004.2021.9397105
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Increased demand for Bring Your Own Device (BYOD) service enablement becomes an integral part of the critical infrastructure due to business agility, increase employee productivity, and employee satisfaction as an alternate method of the working environment. But unauthorized malicious access of critical infrastructure from the BYOD environment increased the cyber-attack which becomes a major cybersecurity risk for most organizations as a result business ecosystem gets fragmented. There are many methods and techniques developed in recent years to reduce cyber attacks in this area which solves multiple open issues. But due to new attack techniques and tools again development is an on-going requirement. Most of the organization is adopting secure certificate-based authentication mechanism to enable BYOD environment. But the certificate-based authentication mechanism has also many challenges that open a loophole for unauthorized access. Apart from this Cyber forensic digital investigation ecosystem development becomes an important requirement to conduct post-incident analysis, investigation, and to produce evidence of the crime. In this research, post-analysis of unauthorized malicious activities in the BYOD environment Detection Technique is proposed as a novel approach, apart from this subsequent protection algorithm also developed to build efficient secured BYOD environment. Finally, the research outcome contributes to building a Cyber-defense BYOD environment and cyber forensic BYOD ecosystem to protect the critical infrastructure of the organization adopting the BYOD services.
引用
收藏
页码:211 / 218
页数:8
相关论文
共 26 条
  • [1] AlHarthy K, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2013), P7, DOI 10.1109/ICCSCE.2013.6719923
  • [2] Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment
    Ali, Md Iman
    Kaur, Sukhkirandeep
    Khamparia, Aditya
    Gupta, Deepak
    Kumar, Sachin
    Khanna, Ashish
    Al-Turjman, Fadi
    [J]. IEEE ACCESS, 2020, 8 : 172770 - 172782
  • [3] Ali MI., 2019, Int J Eng Adv Technol, V8, P1602, DOI [10.35940/ijeat.F8202.088619, DOI 10.35940/IJEAT.F8202.088619]
  • [4] [Anonymous], 2019, GLOB RISKS 2019 INS
  • [5] [Anonymous], 2018, INFORM TECHNOLOGY NE
  • [6] [Anonymous], To Prevent a Digital Dark Age: World Economic Forum Launches Global Centre for Cybersecurity
  • [7] [Anonymous], GLOBAL RISKS REPORT
  • [8] Collie J., 2018, Athens Journal of Sciences, V5, P167, DOI DOI 10.30958/AJS.5-2-4
  • [9] Franklin O.U., 2015, International Journal of Information System and Engineering, V3, DOI DOI 10.24924/IJISE/2015.11/V3.ISS1/110.128
  • [10] Gajar P. K., 2010, BRING YOUR OWN DEVIC, P9