Bluetooth Worms: Models, Dynamics, and Defense Implications
#1

sir,
i m a electronics engineering student is very much interested in doing seminar on this project so please provide me the matter.
i am waiting for your positive reply soon
Reply
#2
Music 

Recent occurrences of mobile phone worms like Cabir, Mabir and
CommWarrior have created growing concerns over the security of data
stored on mobile devices such as cell phones and PDAs. The fact that they use Bluetooth communication as their infection channel is a basic similarity between them. the nature, characteristics, and
spreading dynamics of Bluetooth worms are studied in simulation to aid protection. Some major findings sre:
1)The inherent
capacity constraints imposed by the wireless channel
,for example, interference and the Bluetooth protocol can
significantly slow down the Bluetooth worm propagation
2)Mobility may not boost the
Bluetooth worm propagation, but the page link instability brought about by it has
negative impact on the worm spreading speed
3)Dexterously designed worms can improve their propagation speed by strategically selecting worm model parameters or exploiting out-of-band propagation capabilities.

the Bluetooth protocol design and im-
plementation is large and complex. a large-scale Blue-
tooth worm outbreak is viable today. Studies shows that start-
ing a Bluetooth worm infection is easy, once a vulnerability is dis-
covered. Bluetooth worms can infect a large population of vulnerable devices relatively
quickly, in just a few days.

INTRODUCTION
Bluetooth is complex: its current Linux implementation consists
of over 25K lines of kernel code. Because Bluetoothâ„¢s codebase is
large, bugs are likely to be present in current implemen-
tations. As of now,no large-scale Bluetooth security attacks have been reported,but
a worm propagating over the Bluetooth protocol could cause mas-
sive disruptions with serious consequences. A malicious program
could launch a DoS attack and bring down a segment of the cellular
network. Cell-phone spyware could collect personal information. Cell-phone spyware could collect personal information.

BLUETOOTH WORMS ARE
DIFFERENT THAN OTHER WORMS
The Bluetooth worms infect mobile, power-constrained devices
with Bluetooth radios. A Bluetooth infection occurs only when the
infection source and the victim are located near each other, as
Unlike Internet worms, Bluetooth wormsâ„¢ propagation is driven by
how the vulnerable devices interact, move, and travel.

FEASIBILITY OF A BLUETOOTH
WORM INFECTION
If discoverable Bluetooth
devices are prevalent, a worm can ?nd and infect many devices,
once released. A heterogeneous population is more resistant to a worm exploiting a single
software vulnerability. Even if a worm outbreak occurs, short inter-device contacts could slow the
wormâ„¢s infection rate. The relative speed between
two people walking could be too high for a worm to replicate.

The following facts from studies give a good chance of propagation of bluetooth worms in present environment:
-Discoverable Bluetooth Devices are
Prevalent Today
-The Population of Devices
is Homogeneous
- Contact Durations are Long Enough for a
Worm to Replicate
-Worms can Replicate between Devices
Moving in Opposite Directions

SIMULATING BLUETOOTH WORM
PROPAGATION

In the simulation, parameters such as the number
of initial devices infected (i.e., the number of seeds), the total size
of the device population, the fraction of vulnerable devices, and the
time of the day when infections occur are monitored. To
simulate how a worm spreads worldwide, a trace needs to capture
the behavior of many devices at a global scale.

Bluetooth Worm Infection Dynamics
how quickly a worm infects vul-
nerable nodes in a population of 10,000 devices is examined.The worm starts spreading from the infected devices, i.e., seeds. We ?nd that a Bluetooth worm in-
fects half of the devices in four hours when the entire device pop-
ulation is vulnerable. When only 25% of devices are vulnerable,
half of them are infected in sixteen hours. that a worm slows-down during nighttime, but speeds up infections the following day.

For a seminar report on this topic , follow this link:
http://reality.media.mit.edu/pdfs/Su.pdf

More details available in :
ieeexplore.ieeeiel5/4041138/4041139/04041171.pdf

but you need to have an IEEE Xplore subscription for accessing it.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: nfl defense, modeling propagation dynamics of bluetooth worms extended version, diablo defense survival, dynamics, mobile defense, infection, best defense survival,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Thumbs Up online catering management system on php with report and source code and ppt 4 9,000 29-04-2017, 10:59 AM
Last Post: jaseela123d
  english grammar models exhibition 2 1,002 22-07-2016, 03:55 PM
Last Post: visalakshik
  how to hack mtn network and free airtime and data 2 1,329 16-07-2016, 04:17 PM
Last Post: jaseela123d
  images of simple working models for commerce 1 885 04-07-2016, 12:17 PM
Last Post: visalakshik
  science exhibition working models on disaster management 1 1,137 18-06-2016, 11:30 AM
Last Post: dhanabhagya
  how to hack mtn network and free airtime and data 1 1,084 07-06-2016, 04:05 PM
Last Post: dhanabhagya
  computational fluid dynamics anderson solution manual 1 584 01-06-2016, 03:26 PM
Last Post: dhanabhagya
  comparison between bluetooth and wifi and gifi 1 843 31-05-2016, 12:31 PM
Last Post: dhanabhagya
  buffer overflow attack a potential problem and its implications 1 548 31-05-2016, 11:34 AM
Last Post: dhanabhagya
  file structures and software testing vivo question and answer 1 832 28-05-2016, 10:25 AM
Last Post: dhanabhagya

Forum Jump: