Loading

Detection and Control of Malicious activity and Digital Forensic in BYOD
Md Iman Ali1, Sukhkirandeep Kaur2
1Iman Ali, Research scholar, Department of computer application, Lovely Professional University, Punjab, India.
2Dr Sukhkirandeep Kaur, Assistant Professor in Department of Computer Science and Engineering, Lovely Professional University, Phagwara.

Manuscript received on November 11, 2019. | Revised Manuscript received on November 20 2019. | Manuscript published on 30 November, 2019. | PP: 11392-11398 | Volume-8 Issue-4, November 2019. | Retrieval Number: D8151118419/2019©BEIESP | DOI: 10.35940/ijrte.D8151.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Enterprises are focusing greatly on Bring your own Device strategy since 2009 when Intel Adopted Bring your Own Device phenomena for the employees and later on this became more popular, Since 2012 exponential growth of BYOD services in the corporate environment also observed for providing an alternate method of working environment using employee personal device, however due to increased security threats and malicious activities occurring in BYOD environment most of the corporate are facing major challenges in enabling BYOD program. Increased Cyber-attack fragmenting the business ecosystem and cyber security becomes business survival factor. Increased amount of cyber attack in BYOD environment has created a major road block in adoption of BYOD. Existing security models of BYOD implementation, tools and techniques does not match the pace of security landscape at which cyber threats are growing. Moreover existing detection and control techniques of malicious activities in BYOD environment are not sufficient for cyber forensic investigation post an attack. By creating a secured model of BYOD environment security risk can be reduced. During this research Two different approach was followed to mitigate these risks. First approach was reverse adoption of encryption technique used to protect corporate network from BYOD environment. In 2nd approach malicious activity detection and protection mechanism explored with cyber forensic readiness in BYOD environment. Significant positive result observed to protect the corporate network infrastructure from untrusted BYOD traffic using GetVpn in cluster deployment. 2nd phase of this research has resultant to build digital forensic readiness BYOD model. Building a cyber secured model of BYOD cluster deployment ecosystem has contributed to reduce the risk of cyber threat. And detection of malicious activities has contributed in building a cyber forensic BYOD infrastructure to provide cyber confidence BYOD services.
Keywords: Cyber Security, Digital Forensic, BYOD, Encryption.
Scope of the Article: Security, Privacy and Trust in IoT & IoE.