Bluetooth Worms: Models, Dynamics, and Defense Implications
#1

sir,
i m a electronics engineering student is very much interested in doing seminar on this project so please provide me the matter.
i am waiting for your positive reply soon
Reply
#2
Music 
Recent occurrences of mobile phone worms like Cabir, Mabir and
CommWarrior have created growing concerns over the security of data
stored on mobile devices such as cell phones and PDAs. The fact that they use Bluetooth communication as their infection channel is a basic similarity between them. the nature, characteristics, and
spreading dynamics of Bluetooth worms are studied in simulation to aid protection. Some major findings sre:
1)The inherent
capacity constraints imposed by the wireless channel
,for example, interference and the Bluetooth protocol can
significantly slow down the Bluetooth worm propagation
2)Mobility may not boost the
Bluetooth worm propagation, but the page link instability brought about by it has
negative impact on the worm spreading speed
3)Dexterously designed worms can improve their propagation speed by strategically selecting worm model parameters or exploiting out-of-band propagation capabilities.

the Bluetooth protocol design and im-
plementation is large and complex. a large-scale Blue-
tooth worm outbreak is viable today. Studies shows that start-
ing a Bluetooth worm infection is easy, once a vulnerability is dis-
covered. Bluetooth worms can infect a large population of vulnerable devices relatively
quickly, in just a few days.

INTRODUCTION
Bluetooth is complex: its current Linux implementation consists
of over 25K lines of kernel code. Because Bluetoothâ„¢s codebase is
large, bugs are likely to be present in current implemen-
tations. As of now,no large-scale Bluetooth security attacks have been reported,but
a worm propagating over the Bluetooth protocol could cause mas-
sive disruptions with serious consequences. A malicious program
could launch a DoS attack and bring down a segment of the cellular
network. Cell-phone spyware could collect personal information. Cell-phone spyware could collect personal information.

BLUETOOTH WORMS ARE
DIFFERENT THAN OTHER WORMS
The Bluetooth worms infect mobile, power-constrained devices
with Bluetooth radios. A Bluetooth infection occurs only when the
infection source and the victim are located near each other, as
Unlike Internet worms, Bluetooth wormsâ„¢ propagation is driven by
how the vulnerable devices interact, move, and travel.

FEASIBILITY OF A BLUETOOTH
WORM INFECTION
If discoverable Bluetooth
devices are prevalent, a worm can ?nd and infect many devices,
once released. A heterogeneous population is more resistant to a worm exploiting a single
software vulnerability. Even if a worm outbreak occurs, short inter-device contacts could slow the
wormâ„¢s infection rate. The relative speed between
two people walking could be too high for a worm to replicate.

The following facts from studies give a good chance of propagation of bluetooth worms in present environment:
-Discoverable Bluetooth Devices are
Prevalent Today
-The Population of Devices
is Homogeneous
- Contact Durations are Long Enough for a
Worm to Replicate
-Worms can Replicate between Devices
Moving in Opposite Directions

SIMULATING BLUETOOTH WORM
PROPAGATION

In the simulation, parameters such as the number
of initial devices infected (i.e., the number of seeds), the total size
of the device population, the fraction of vulnerable devices, and the
time of the day when infections occur are monitored. To
simulate how a worm spreads worldwide, a trace needs to capture
the behavior of many devices at a global scale.

Bluetooth Worm Infection Dynamics
how quickly a worm infects vul-
nerable nodes in a population of 10,000 devices is examined.The worm starts spreading from the infected devices, i.e., seeds. We ?nd that a Bluetooth worm in-
fects half of the devices in four hours when the entire device pop-
ulation is vulnerable. When only 25% of devices are vulnerable,
half of them are infected in sixteen hours. that a worm slows-down during nighttime, but speeds up infections the following day.

For a seminar report on this topic , follow this link:
http://reality.media.mit.edu/pdfs/Su.pdf

More details available in :
ieeexplore.ieeeiel5/4041138/4041139/04041171.pdf

but you need to have an IEEE Xplore subscription for accessing it.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: 1958 national defense, best defense survival, premier defense car starter pd two 5msh, advancements in technology and their implications on entrepreneurship mechanical abstract pdf, infection, paper for virus worms and trojans ppt, 5k to 25k,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Thumbs Up online catering management system on php with report and source code and ppt 4 8,972 29-04-2017, 10:59 AM
Last Post: jaseela123d
  english grammar models exhibition 2 1,000 22-07-2016, 03:55 PM
Last Post: visalakshik
  how to hack mtn network and free airtime and data 2 1,329 16-07-2016, 04:17 PM
Last Post: jaseela123d
  images of simple working models for commerce 1 884 04-07-2016, 12:17 PM
Last Post: visalakshik
  science exhibition working models on disaster management 1 1,136 18-06-2016, 11:30 AM
Last Post: dhanabhagya
  how to hack mtn network and free airtime and data 1 1,084 07-06-2016, 04:05 PM
Last Post: dhanabhagya
  computational fluid dynamics anderson solution manual 1 584 01-06-2016, 03:26 PM
Last Post: dhanabhagya
  comparison between bluetooth and wifi and gifi 1 843 31-05-2016, 12:31 PM
Last Post: dhanabhagya
  buffer overflow attack a potential problem and its implications 1 547 31-05-2016, 11:34 AM
Last Post: dhanabhagya
  file structures and software testing vivo question and answer 1 828 28-05-2016, 10:25 AM
Last Post: dhanabhagya

Forum Jump: