DocumentCode :
257281
Title :
Feedback-based smartphone strategic sampling for BYOD security
Author :
Feng Li ; Chin-Tser Huang ; Jie Huang ; Wei Peng
Author_Institution :
Dept. of Comput. Inf. & Graphics Technol., Indiana Univ.-Purdue Univ. Indianapolis, Indianapolis, IN, USA
fYear :
2014
fDate :
4-7 Aug. 2014
Firstpage :
1
Lastpage :
8
Abstract :
Bring Your Own Device (BYOD) is an information technology (IT) policy that allows employees to use their own wireless devices to access internal network at work. Mobile malware is a major security concern that impedes BYOD´s further adoption in enterprises. Existing works identify the need for better BYOD security mechanisms that balance between the strength of such mechanisms and the costs of implementing such mechanisms. In this paper, based on the idea of self-reinforced feedback loop, we propose a periodic smartphone sampling mechanism that significantly improve BYOD security mechanism´s effectiveness without incurring further costs. We quantify the likelihood that “a BYOD smartphone is infected by malware” by two metrics, vulnerability and uncertainty, and base the iterative sampling process on these two metrics; the updated values of these metrics are fed back into future rounds of the mechanism to complete the feedback loop. We validate the efficiency and effectiveness of the proposed strategic sampling via simulations driven by publicly available, real-world collected traces.
Keywords :
invasive software; iterative methods; mobile computing; sampling methods; smart phones; telecommunication security; BYOD security; BYOD smartphone; Bring Your Own Device; IT policy; feedback-based smartphone strategic sampling; information technology; iterative sampling process; mobile malware; periodic smartphone sampling mechanism; self-reinforced feedback loop; wireless device; Feedback loop; Malware; Measurement; Topology; Uncertainty; Wireless communication; Enterprise network; probabilistic algorithm; smartphone security; social network; strategic sampling; uncertainty metric; vulnerability metric;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communication and Networks (ICCCN), 2014 23rd International Conference on
Conference_Location :
Shanghai
Type :
conf
DOI :
10.1109/ICCCN.2014.6911814
Filename :
6911814
Link To Document :
بازگشت