01-04-2010, 08:35 PM
ABSTRACT
Bluetooth, a protocol designed to replace peripheral cables, has grown steadily over the last ve years and includes a variety of applications. The Bluetooth protocol operates on a wide variety of mobile and wireless devices and is nearly ubiquitous. Several attacks exist that successfully target and exploit Bluetooth enabled devices. This paper describes the implementation of a network intrusion detection system for discovering malicious Bluetooth trafc. The work improves upon existing techniques, which only detect a limited set of attacks (based on measuring anomalies in the power levels of the Bluetooth device). The new method identies reconnaissance, denial of service, and information theft attacks on Bluetooth enabled devices, using signatures of the attacks. Furthermore, this system includes an intrusion response component to deect attacks in progress, based on the attack classication. This paper presents the implementation of the Bluetooth Intrusion Detection System and demonstrates its detection, analysis, and response capabilities. The tool includes a visualization interface to facilitate the understanding of Bluetooth enabled attacks. The experimental results show that the system can signicantly improve the overall security of an organization by identifying and responding to threats posed to the Bluetooth protocol.
Presented By:
Terrence OConnor
Douglas Reeves
read full report
http://lib.ncsu.edu/theses/available/etd...ed/etd.pdf