• DocumentCode
    653761
  • Title

    T-dominance: Prioritized defense deployment for BYOD security

  • Author

    Wei Peng ; Feng Li ; Han, Ki Jin ; Xukai Zou ; Jie Wu

  • Author_Institution
    Dept. of Comput. & Inf. Sci., Indiana Univ.-Purdue Univ., Indianapolis, IN, USA
  • fYear
    2013
  • fDate
    14-16 Oct. 2013
  • Firstpage
    37
  • Lastpage
    45
  • Abstract
    Bring Your Own Device (BYOD) is an enterprise information technology (IT) policy that encourages employees to use their own devices to access sensitive corporate data at work through the enterprise IT infrastructure. Many current BYOD security practices are costly to implement and intrusive to employees, which, to some degree, negate BYOD´s perceived benefits. To address such tension, we propose prioritized defense deployment: Instead of employing the same costly and intrusive security measures on each BYOD smartphone, more stringent threat detection/mitigation mechanisms are deployed on those representative smartphones, each of which represents, security-wise, a group of smartphones in the whole BYOD device pool. To this end, we propose a concept and a distributed algorithm, both named T-dominance, to capture the temporal-spatial pattern in an enterprise environment. We identify a few desirable properties of prioritized defense deployment, and analytically show that T-dominance satisfies such properties. We complement our analysis with simulations on real Wi-Fi association traces.
  • Keywords
    business communication; distributed algorithms; smart phones; telecommunication security; BYOD security; T dominance; bring your own device; distributed algorithm; enterprise IT infrastructure; enterprise information technology policy; prioritized defense deployment; sensitive corporate data; smartphones; temporal spatial pattern; Algorithm design and analysis; Delays; Equations; IEEE 802.11 Standards; Malware; Robustness; BYOD; prioritized defense deployment; security representativeness; temporal-spatial pattern;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2013 IEEE Conference on
  • Conference_Location
    National Harbor, MD
  • Type

    conf

  • DOI
    10.1109/CNS.2013.6682690
  • Filename
    6682690