Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2093
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Samarathunge, R. D. S. P | - |
dc.contributor.author | Perera, W. P. P | - |
dc.contributor.author | Ranasinghe, R. A. N. I | - |
dc.contributor.author | Kahaduwa, K. K. U. S | - |
dc.contributor.author | Senarathne, A. N | - |
dc.contributor.author | Abeywardena, K. Y | - |
dc.date.accessioned | 2022-04-29T04:43:55Z | - |
dc.date.available | 2022-04-29T04:43:55Z | - |
dc.date.issued | 2018-12-21 | - |
dc.identifier.citation | R. D. S. P. Samarathunge, W. P. P. Perera, R. A. N. I. Ranasinghe, K. K. U. S. Kahaduwa, A. N. Senarathne and K. Y. Abeywardena, "Intelligent Enterprise Security Enhanced COPE (Intelligent ESECOPE)," 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), 2018, pp. 1-6, doi: 10.1109/ICIAFS.2018.8913361. | en_US |
dc.identifier.issn | 2151-1810 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/2093 | - |
dc.description.abstract | Mobile devices have come a long way of supporting humans' day to day tasks. Companies from all over the world tend to implement Information Technology (IT) consumerization in their premises in order to attain high productivity as well as employee satisfaction. Bring Your Own Device (BYOD), Corporate Owned Personally Enabled (COPE) and Choose Your Own Device (CYOD) assist to implement IT consumerization according to the organization's requirements. This research looks at the security issues in Corporate Owned Personally Enabled concept. The purpose of this research is to identify major security concerns an organization could have and propose sophisticated yet effective countermeasures. Research components are categorized into four main parts which are web data loss prevention, email data loss prevention, malware identification and malware classification. The information leak can be occurred either deliberately or unintentionally by an individual or a group of individuals in any organization which affects financial status, customer or public security and the reputation. ESECOPE is built with a revived technique that is based on keyword-based search detection to reach the goal. Proposed Implementations consist range of features in data loss prevention such as deep content analysis, secure wiping of sensitive data, encryption of sensitive data. The combination of both machine learning techniques, signature, and behavioral based analysis will be used to craft a tool which is integrated into the system that outputs less false negative results. Apart from identification and classification generation of IT administrator alerts, Quarantine identified malware can be listed as additional features provided by the tool. The platform which supports deploying multiple vulnerability scanning tools together makes the end product unique from other existing COPE solutions provides a vast amount of advantages including mobile device scanning individually or at once, report generation and also it reduces the workload of IT administrator. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS);Pages 1-6 | - |
dc.subject | Intelligent | en_US |
dc.subject | Enterprise Security | en_US |
dc.subject | Enhanced COPE | en_US |
dc.subject | Intelligent ESECOPE | en_US |
dc.title | Intelligent Enterprise Security Enhanced COPE (Intelligent ESECOPE) | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICIAFS.2018.8913361 | en_US |
Appears in Collections: | Department of Computer Systems Engineering-Scopes Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Intelligent_Enterprise_Security_Enhanced_COPE_Intelligent_ESECOPE.pdf Until 2050-12-31 | 678.94 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.