作者
Taeeun Kim, Hwankuk Kim
发表日期
2015/10/28
研讨会论文
2015 International Conference on Information and Communication Technology Convergence (ICTC)
页码范围
1288-1293
出版商
IEEE
简介
Many companies have recently introduced the concept of BYOD (Bring Your Own Device) for private mobile devices used at work. Accordingly, they are also introducing NAC and MDM systems to prevent the leak of business information, control access and manage users efficiently. As the access control policy of NAC and MDM is uniformly applied to the users, however, security threats remain due to the frequent loss or theft of devices and low security level. This is why BYOD has not yet been actively introduced. A flexible policy is thus needed by collecting personalized status information and detecting/controlling abnormal users. In this paper, the potential weak points of the BYOD environment are classified, and a behavior-oriented detection method for abnormal activities is proposed by patterning the information use status of various users.
引用总数
201620172018201920202021231322
学术搜索中的文章