2008 Annual Computer Security Applications Conference (ACSAC) 2008
DOI: 10.1109/acsac.2008.39
|View full text |Cite
|
Sign up to set email alerts
|

Bluetooth Network-Based Misuse Detection

Abstract: Bluetooth, a protocol designed to replace peripheral cables, has grown steadily over the last five years and includes a variety of applications. The Bluetooth protocol operates on a wide variety of mobile and wireless devices and is nearly ubiquitous. Several attacks exist that successfully target and exploit Bluetooth enabled devices. This paper describes the implementation of a network intrusion detection system for discovering malicious Bluetooth traffic. The work improves upon existing techniques, which on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…Such defense mechanisms cannot be applied to proximity malware as observations tend to be local and in the proximity of the infected devices. Recent research direction for recognizing local effects involve deployment of sensors in locations where device densities are expected to be high [43,77]. In other, more recent schemes the potential victim serves as a detector.…”
Section: Passive Self Detectionmentioning
confidence: 99%
“…Such defense mechanisms cannot be applied to proximity malware as observations tend to be local and in the proximity of the infected devices. Recent research direction for recognizing local effects involve deployment of sensors in locations where device densities are expected to be high [43,77]. In other, more recent schemes the potential victim serves as a detector.…”
Section: Passive Self Detectionmentioning
confidence: 99%
“…Some examples of mobile device attacks include attacks against the Bluetooth, WiFi, infrared, or GPS protocols [9,11,14,4]. More intelligent attacks even combine multiple weaknesses of different protocols to circumvent the overall security of the mobile device.…”
Section: Overview Of Mobile Device Attacksmentioning
confidence: 99%
“…However, individual protocol intrusion detections for Bluetooth, and GPS are considered open academic problems. OConnor and Reeves created a signature-based Bluetooth Intrusion Detection system but no production level systems exist [9]. Further, we are unaware of any GPS IDSs.…”
Section: Towards Integration Into Idsmentioning
confidence: 99%
“…So if a malicious user wants to intrude the system with certain already known attacks, it will be caught due to its attack activity matching some records in the database. Although the ability of detecting intrusions is constrained by the knowledge of currently found attacks, the misuse detection is still an efficient and effective way to help detect attacks, for example, a framework of intrusion detection system based on misuse detection in ad hoc network [29], misuse detection technologies based malicious user discovering scheme in Bluetooth networks [30], and the efficiency evaluation of misuse detection and optimizing strategies [31].…”
Section: Detection-based Security Systemmentioning
confidence: 99%