Title: A Behaviour Profiling Based Technique for Network Access Control Systems

Issue Number: Vol. 8, No. 1
Year of Publication: March - 2019
Page Numbers: 23-30
Authors: Musa Abubakar Muhammad, Aladdin Ayesh
Journal Name: International Journal of Cyber-Security and Digital Forensics (IJCSDF)
- Hong Kong
DOI:  http://dx.doi.org/10.17781/P002537


The emergence of the Internet of Things (IoT) has lead to a technological transformation that integrates several technologies to represent the future of computing and communications. IoT is the interconnection of internet of computing devices embedded in objects such as sensors, actuators and networks enabling them to send and receive data. Bring Your Own Device (BYOD) is an integral part of IoT, which is the practice of allowing employees to use their own smartphones, tablets and laptops in the workplace to access enterprise resources and applications. It offers several benefits like employee job satisfaction, productivity, increased job efficiency and flexibility. With all the advantages offered, BYOD environments are still less safe because of persistent security threats, attacks caused by loss, theft of personal devices and corporate data leakage. BYOD enterprise network is accessed through enterprise mobility management solutions which monitor, controls and enforce access control policies to devices accessing the network. This paper aims to close the gap of the existing Network Access Control (NAC) systems focusing on 802.1x protocols with a Novel Device type Behaviour Profiling Technique. The Behaviour Profiling Technique used a dataset proposed in [29] to develop a device type behaviour profiles of five dell netbooks, three iPads, two iPhones 3G, two iPhones 4G and two Nokia Phones using K-Means Clustering Algorithm.