Access control framework in a bring your own device environment
As a result of several attractive features of mobile devices (portability and access to voice and data services), people have started to take their mobile devices to their work place and connect to the company network to do their daily job. This has given rise to a policy called "Bring Your...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/69392/1/FSKTM%202016%2043%20-%20IR.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-upm-ir.69392 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Putra Malaysia |
collection |
PSAS Institutional Repository |
language |
English |
topic |
Telecommunication Computers - Access control |
spellingShingle |
Telecommunication Computers - Access control Morufu, Olalere Access control framework in a bring your own device environment |
description |
As a result of several attractive features of mobile devices (portability and access to
voice and data services), people have started to take their mobile devices to their
work place and connect to the company network to do their daily job. This has given
rise to a policy called "Bring Your Own Devices" or BYOD. However, to determine
who is allowed to access enterprise resources poses a serious security concern as
both the knowledge and ownership means of authentication in a traditional enterprise
network are insufficient in a BYOD environment. Unauthorised access to sensitive
information of an enterprise through a lost mobile device of an employee, by
shoulder surfing password attacks and password guessing attacks can all lead to data
leakage. Also, unmonitored employee mobile devices when connected to enterprise
resources can inadvertently causes malware infection into the enterprise network. In
a traditional enterprise network, Uniform Resource Locators (URLs) blacklisting is a
common approach many enterprises employ to address this problem. Apart from the
fact that the blacklisting approach is faced with different challenges (such as wrong
classification due to human error and unavailability of newly created malware
URLs), employing the blacklisting approach in a BYOD environment is not
sufficient to monitor employee mobile devices.
For proper implementation of BYOD policy, the security challenges confronting
BYOD need to be addressed. The need for addressing these challenges make this
study significant. Consequently, this study proposes access control framework for
authenticating and monitoring employee mobile devices in a BYOD environment.
The proposed framework will not only authenticate employee mobile devices at the
point of login to enterprise resources, but also monitor the interaction of the
employee mobile device when connected to the enterprise resources. Consequently,
the proposed access control framework consists of a two-factor authentication
framework and monitoring framework. The proposition of these two novel
frameworks for access control in a BYOD environment form the major contributions
of the study.
The first framework which serves as the first layer of the proposed access control
framework is a two-factor authentication framework that combines both knowledgebased
and biometric-based authentication techniques to form an unobtrusive
authentication technique for an employee’s mobile device in a BYOD environment.
This framework addresses the data leakage problem that may arise as a result of the
present authentication technique being too weak. The second novel framework
which serves as the second layer of the proposed access control framework is a realtime
employee’s mobile device monitoring framework. This framework addresses
the possibility of a malware infection that may occur as a result of unmonitored
interaction of an employee’s mobile device with third party cloud applications.
Based on the second layer, another main contribution of this study is the proposition
of a predictive trust model for computation of the trust value of a third party cloud
application. For proper monitoring of the employee’s mobile device against malware
infection on the enterprise network, this study proposes classification of third party
cloud application URLs that relies on a predictive trust model. The purpose of the
trust value computation is to determine whether a trusted cloud application in terms
of malware infection. Another major contribution under this layer is proposition of
the novel discriminative lexical features that distinguish malware URL from benign
URL.
To validate and test the performance of the model, a dataset comprising of benign
and malware URLs was built. The dataset was trained and labelled. Application of
the WEKA data mining tool on the trained dataset gave rise to computation of the
performance evaluation parameters of the predictive trust model. Prediction
performance was evaluated based on True Positive (TP), True Negative (TN), False
Positive (FP), False Negative (FN), accuracy, True Positive Rate (TPR), True
Negative Rate (TNR), False Positive Rate (FPR), False Negative Rate (FNR), and
the time to build the model. With a very short time to build the predictive trust
model, the model achieved 97.31 % accuracy with a moderate FPR of 0.04 and a
FNR of 0.018. The overall output of this study is the proposition of an
implementable access control framework for a BYOD environment thereby serving
as a potential application for authenticating and monitoring employee mobile devices
in a BYOD environment. |
format |
Thesis |
qualification_level |
Doctorate |
author |
Morufu, Olalere |
author_facet |
Morufu, Olalere |
author_sort |
Morufu, Olalere |
title |
Access control framework in a bring your own device environment |
title_short |
Access control framework in a bring your own device environment |
title_full |
Access control framework in a bring your own device environment |
title_fullStr |
Access control framework in a bring your own device environment |
title_full_unstemmed |
Access control framework in a bring your own device environment |
title_sort |
access control framework in a bring your own device environment |
granting_institution |
Universiti Putra Malaysia |
publishDate |
2016 |
url |
http://psasir.upm.edu.my/id/eprint/69392/1/FSKTM%202016%2043%20-%20IR.pdf |
_version_ |
1747812691619086336 |
spelling |
my-upm-ir.693922019-07-01T00:32:10Z Access control framework in a bring your own device environment 2016-11 Morufu, Olalere As a result of several attractive features of mobile devices (portability and access to voice and data services), people have started to take their mobile devices to their work place and connect to the company network to do their daily job. This has given rise to a policy called "Bring Your Own Devices" or BYOD. However, to determine who is allowed to access enterprise resources poses a serious security concern as both the knowledge and ownership means of authentication in a traditional enterprise network are insufficient in a BYOD environment. Unauthorised access to sensitive information of an enterprise through a lost mobile device of an employee, by shoulder surfing password attacks and password guessing attacks can all lead to data leakage. Also, unmonitored employee mobile devices when connected to enterprise resources can inadvertently causes malware infection into the enterprise network. In a traditional enterprise network, Uniform Resource Locators (URLs) blacklisting is a common approach many enterprises employ to address this problem. Apart from the fact that the blacklisting approach is faced with different challenges (such as wrong classification due to human error and unavailability of newly created malware URLs), employing the blacklisting approach in a BYOD environment is not sufficient to monitor employee mobile devices. For proper implementation of BYOD policy, the security challenges confronting BYOD need to be addressed. The need for addressing these challenges make this study significant. Consequently, this study proposes access control framework for authenticating and monitoring employee mobile devices in a BYOD environment. The proposed framework will not only authenticate employee mobile devices at the point of login to enterprise resources, but also monitor the interaction of the employee mobile device when connected to the enterprise resources. Consequently, the proposed access control framework consists of a two-factor authentication framework and monitoring framework. The proposition of these two novel frameworks for access control in a BYOD environment form the major contributions of the study. The first framework which serves as the first layer of the proposed access control framework is a two-factor authentication framework that combines both knowledgebased and biometric-based authentication techniques to form an unobtrusive authentication technique for an employee’s mobile device in a BYOD environment. This framework addresses the data leakage problem that may arise as a result of the present authentication technique being too weak. The second novel framework which serves as the second layer of the proposed access control framework is a realtime employee’s mobile device monitoring framework. This framework addresses the possibility of a malware infection that may occur as a result of unmonitored interaction of an employee’s mobile device with third party cloud applications. Based on the second layer, another main contribution of this study is the proposition of a predictive trust model for computation of the trust value of a third party cloud application. For proper monitoring of the employee’s mobile device against malware infection on the enterprise network, this study proposes classification of third party cloud application URLs that relies on a predictive trust model. The purpose of the trust value computation is to determine whether a trusted cloud application in terms of malware infection. Another major contribution under this layer is proposition of the novel discriminative lexical features that distinguish malware URL from benign URL. To validate and test the performance of the model, a dataset comprising of benign and malware URLs was built. The dataset was trained and labelled. Application of the WEKA data mining tool on the trained dataset gave rise to computation of the performance evaluation parameters of the predictive trust model. Prediction performance was evaluated based on True Positive (TP), True Negative (TN), False Positive (FP), False Negative (FN), accuracy, True Positive Rate (TPR), True Negative Rate (TNR), False Positive Rate (FPR), False Negative Rate (FNR), and the time to build the model. With a very short time to build the predictive trust model, the model achieved 97.31 % accuracy with a moderate FPR of 0.04 and a FNR of 0.018. The overall output of this study is the proposition of an implementable access control framework for a BYOD environment thereby serving as a potential application for authenticating and monitoring employee mobile devices in a BYOD environment. Telecommunication Computers - Access control 2016-11 Thesis http://psasir.upm.edu.my/id/eprint/69392/ http://psasir.upm.edu.my/id/eprint/69392/1/FSKTM%202016%2043%20-%20IR.pdf text en public doctoral Universiti Putra Malaysia Telecommunication Computers - Access control |