Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Graphical User Interface Application to Analyze Bluetooth Intrusion
#1

Graphical User Interface Application to Analyze Bluetooth Intrusion

Gyanesh Reddy Billakanti and Yue Chao Qin

Abstract Bluetooth technology has grown dramatically through the years. Because of the increase in this technology, security has become an issue. With more people interacting with this technology, by transferring data through devices, confidentiality and authenticity are factors to remain secure. Unfortunately, as new technology advances, so do malicious exploits on the growing technology. To address these problems, first one has to understand the technology involved. We will first introduce how the Bluetooth protocol works. A brief description of what layers are in the protocol stack and how each layer interacts with one another. Then some details on how wireless network messages are transferred through the protocol. Second part of this paper will describe different exploits and vulnerabilities that are either in the design already, or have been maliciously exploited. Some of these exploits are Bluesnarfing, Bluejacking, Bluebugging, etc. By understanding these exploits, one can gain a general idea of how vulnerable Bluetooth possibly could be. Finally, a description of the graphical user interface that was developed will be shown in the end. By gaining experience through practice, one can gain a better appreciation of the technologies and exploits being introduced.

Index of Terms Bluetooth, Bluesnarfing, Bluejacking, Bluebugging, SAFER+, MAC address, DOS attack.
INTRODUCTION
Wireless technology has evolved through the years to facilitate the public with ease, convenience and efficiency in accessing data. Due to this growing demand, Bluetooth has advanced as an ubiquitous technology found in many everyday appliances. From mobile phones, automobiles, refrigerators, and printers, the days of having a cluster of wires to interface into different devices are now the past. With the growing popularity of this technology, malicious exploits also have grown respectively. One can easily locate an exploit through the Internet, which most of them are trivial to understand and use. There are many exploits to choose from to do one s bidding. Some of them can eavesdrop on information being transferred between two parties. Others can spam a nearby mobile phone. While other software can virtually control all the processes of a mobile phone, such as editing contacts to making a call through the phone. The possibilities are astounding. Instead of searching individually for each exploit software that exists, we ve decided to conveniently bundle them into a pack. A one stop shop for popular Bluetooth exploits. Through our Graphical User Interface application, user s can intuitively interact with the application to gain practical knowledge of Bluetooth exploits. One problem for beginners, who do not understand Bluetooth security, would have to search through the Internet to understand how Bluetooth works, the exploits and practical examples. We are catering to those individuals that fit the above description. As we ve mentioned previously, our outline of the paper fit exactly into those categories.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.