• DocumentCode
    1944294
  • Title

    Bluetooth Network-Based Misuse Detection

  • Author

    OConnor, MAJ Terrence ; Reeves, Douglas

  • Author_Institution
    NC State Univ., Raleigh, NC
  • fYear
    2008
  • fDate
    8-12 Dec. 2008
  • Firstpage
    377
  • Lastpage
    391
  • Abstract
    Bluetooth, a protocol designed to replace peripheral cables, has grown steadily over the last five years and includes a variety of applications. The Bluetooth protocol operates on a wide variety of mobile and wireless devices and is nearly ubiquitous. Several attacks exist that successfully target and exploit Bluetooth enabled devices. This paper describes the implementation of a network intrusion detection system for discovering malicious Bluetooth traffic. The work improves upon existing techniques, which only detect a limited set of attacks (based on measuring anomalies in the power levels of the Bluetooth device). The new method identifies reconnaissance, denial of service, and information theft attacks on Bluetooth enabled devices, using signatures of the attacks. Furthermore, this system includes an intrusion response component to detect attacks in progress, based on the attack classification. This paper presents the implementation of the Bluetooth intrusion detection system and demonstrates its detection, analysis, and response capabilities. The tool includes a visualization interface to facilitate the understanding of Bluetooth enabled attacks. The experimental results show that the system can significantly improve the overall security of an organization by identifying and responding to threats posed to the Bluetooth protocol.
  • Keywords
    Bluetooth; data visualisation; graphical user interfaces; pattern classification; protocols; telecommunication security; telecommunication traffic; Bluetooth network-based misuse detection; Bluetooth protocol; attack classification; denial of service attack; information theft attack; intrusion response component; malicious Bluetooth traffic discovery; mobile device; network intrusion detection system; peripheral cable; reconnaissance attack; visualization interface; wireless device; Bluetooth; Cables; Computer crime; Intrusion detection; Power measurement; Reconnaissance; Security; Telecommunication traffic; Visualization; Wireless application protocol; bluetooth; computer security; intrusion detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Applications Conference, 2008. ACSAC 2008. Annual
  • Conference_Location
    Anaheim, CA
  • ISSN
    1063-9527
  • Print_ISBN
    978-0-7695-3447-3
  • Type

    conf

  • DOI
    10.1109/ACSAC.2008.39
  • Filename
    4721574