کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
445773 | 693246 | 2015 | 13 صفحه PDF | دانلود رایگان |

• Survey on BYOD solutions (state of the art).
• Background in corporate security.
• Novel user-centric self-adaptive system.
• Open-source, multiplatform system.
• Architecture description.
• Self-adaptation.
• Applications of Data Mining in this scope.
• Applications of Machine Learning in this scope.
• Applications of Evolutionary Algorithms in this scope.
• Beyond the state of the art.
• With respect to existing tools.
• With respect to the scientific part.
Companies and particularly their Chief Security Officers (CSOs) want to ensure that their Security Policies are followed, but this becomes a difficult goal to achieve at the point employees are able to use, or bring, their personal devices at work, in a practice that has been named “Bring Your Own Device” (BYOD). Since this BYOD philosophy is being adopted by many companies everyday, a number of solutions have appeared in the market so that it can be implemented in a secure way and comply with the Security Policies mentioned above. In this paper we propose a taxonomy to classify the features of BYOD systems. This taxonomy is used to present an overview of BYOD security solutions.Also, we describe a novel, adaptive and free software system named MUSES (Multi-platform Usable Endpoint Security), able to securely manage BYOD environments. MUSES has been developed to cope with security issues with regard to enterprise security policies, but as a user-centric tool. It considers users’ behavior in order to adapt, improve, and even increase the defined set of security rules. To do this, the system applies Machine Learning and Computational Intelligence techniques, being also able to predict future security incidences produced by these users. The MUSES framework, which has released its first prototype in early 2015, is compared with the most relevant solutions offered by other companies to deal with the same issues, remarking the advantages that our system offers with respect to them.
Journal: Computer Communications - Volume 68, 1 September 2015, Pages 83–95