Detection and Control of Malicious activity and Digital Forensic in BYOD

  • Ali* I
  • et al.
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Enterprises are focusing greatly on Bring your own Device strategy since 2009 when Intel Adopted Bring your Own Device phenomena for the employees and later on this became more popular, Since 2012 exponential growth of BYOD services in the corporate environment also observed for providing an alternate method of working environment using employee personal device, however due to increased security threats and malicious activities occurring in BYOD environment most of the corporate are facing major challenges in enabling BYOD program. Increased Cyber-attack fragmenting the business ecosystem and cyber security becomes business survival factor. Increased amount of cyber attack in BYOD environment has created a major road block in adoption of BYOD. Existing security models of BYOD implementation, tools and techniques does not match the pace of security landscape at which cyber threats are growing. Moreover existing detection and control techniques of malicious activities in BYOD environment are not sufficient for cyber forensic investigation post an attack. By creating a secured model of BYOD environment security risk can be reduced. During this research Two different approach was followed to mitigate these risks. First approach was reverse adoption of encryption technique used to protect corporate network from BYOD environment. In 2nd approach malicious activity detection and protection mechanism explored with cyber forensic readiness in BYOD environment. Significant positive result observed to protect the corporate network infrastructure from untrusted BYOD traffic using GetVpn in cluster deployment. 2nd phase of this research has resultant to build digital forensic readiness BYOD model. Building a cyber secured model of BYOD cluster deployment ecosystem has contributed to reduce the risk of cyber threat. And detection of malicious activities has contributed in building a cyber forensic BYOD infrastructure to provide cyber confidence BYOD services.

Cite

CITATION STYLE

APA

Ali*, I., & Kaur, D. S. (2019). Detection and Control of Malicious activity and Digital Forensic in BYOD. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 11392–11398. https://doi.org/10.35940/ijrte.d8151.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free