ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices
نویسندگان
چکیده
In this paper, we introduce a new methodology for network access control Android devices based on app risk assessment. Named ARANAC (which stands Application Risk Assessment Network Access Control), is specially tailored scenarios using the Bring-Your-Own-Device (BYOD) policy, where adoption of some solutions can lead to problems in security and privacy both employees business organization. mainly relies analysis an aggregate permissions declared manifests installed applications users' devices. The scheme combines three operational modules: i) device monitoring tool, ii) novel permission-based model, iii) anomaly-based detection machine learning module (called MSNM, from Multivariate Statistical Monitoring) that provides diagnostic capabilities. ARANAC's novelty combination four features. Firstly, it privacy-aware, thus, does not require detailed information about but only permissions. Secondly, builds normality model by combining expert knowledge with data, capturing behavior complete population mobile Thirdly, dynamic, as are updated real time, allowing re-assess continuous basis. Finally, its capabilities allow giving recommendations final users so they capable mitigating their risks when accessing networks. We evaluated approach more than 80 at university campus obtained interesting results regarding usual deployment apps.
منابع مشابه
Dynamic User Defined Permissions for Android Devices
................................................................................................................................................................... vi
متن کاملBYOD: Bring Your Own Device
In this work, we examine the different types of user interactions and deployment issues surrounding large public displays. We then select and develop a usage paradigm in which people use personal devices to interact with large public displays. Lastly, we present a physical interface for interacting with large public displays based on camera-enabled mobile phones. Our interface uses both Visual ...
متن کاملBring your own G protein.
G protein-coupled receptor (GPCR)-Galpha fusion proteins were first characterized more than 10 years ago as a strategy for studying receptor-G protein signaling. A large number of studies have used this approach to characterize receptor coupling to members of the Gs, Gi, and Gq families of Galpha subunits, but this strategy has not been widely used to study Galpha12 and Galpha13. As described i...
متن کاملSecuring the "Bring Your Own Device" Policy
The number of devices (phones, tablets, smart TVs, ...) using Android OS is continuously and rapidly growing. Together with the devices, also the amount of applications and on-line application marketplaces is increasing. Unfortunately, security guarantees are not evolving concurrently and security flaws have been reported. Far from discouraging them, more and more users and organisations rely o...
متن کاملBring Your Own Device (byod) Adoption
Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3097152