Abstract
With the trend of BYOD (Bring Your Own Device), i.e., using personal mobile devices for work, proliferating, one can easily find people doing their work anytime, anywhere. BYOD has the benefits of reducing business expense and increasing work productivity and efficiency. Nonetheless, the uncontrolled access of internal networks by the personal devices, for which enterprises have limitations in controlling, exposes the companies to security threats such as leak of confidential data and access by unauthorized users, yet there are inadequate countermeasures. Therefore, there is a need for a means of collecting the personalized context data of the user accessing the internal network and detecting and controlling abnormal user access by establishing a context-based policy. This paper presents measures for detecting abnormal access by collecting the context data according to the various devices and access environment and establishing the context data-based policy under the BYOD environment.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Miller, K.W.: BYOD: security and privacy considerations. IT Prof. 14(5), 53–55 (2012)
Kang, D.: Context based smart access control on BYOD environments. Inf. Secur. Appl. Lect. Notes Comput. Sci. 8909, 165–1762 (2015)
Singh, M., Patterh, M.S., Kim, T.-H.: A formal policy oriented access control model for secure enterprise network environment. Int. J. Secur. Appl. 3(2), 1–14 (2009)
Eckersley, P.: How unique is your web browser?. In: 10th International Symposium, PETS 2010, Berlin, Germany, 21–23 July 2010
IDG Deep Dive: Guide to BYOD strategy. IDG Korea (2012)
Johnson, K.: Mobility/BYOD security survey. SANS Institute, Bethesda (2012)
Henderson, T.: How mobile device management works. IT WORLD (2011)
Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)
Koh, E.: A study on security threats and dynamic access control technology for BYOD, smart-work environment. IMECS (2014)
Kim, T.: A study on context information collection for personal mobile device identification in BYOD and smart work environment. Mobility IoT (2014)
Acknowledgments
This work was supported by the IT R&D program of MSIP/KEIT (Ministry of Science, ICT and Future Planning/Korea Evaluation Institute Of Industrial Technology). (10045109, The Development of Context-Awareness based Dynamic Access Control Technology for BYOD, Smart work Environment.)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jo, C. (2016). Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment. In: Park, J., Chao, HC., Arabnia, H., Yen, N. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47895-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-662-47895-0_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47894-3
Online ISBN: 978-3-662-47895-0
eBook Packages: EngineeringEngineering (R0)