The Bluetooth Honeypot Project: Measuring and Managing Bluetooth Risks in the Workplace

被引:1
|
作者
Podhradsky, Ashley [1 ]
Casey, Cindy [2 ]
Ceretti, Peter [2 ]
机构
[1] Dakota State Univ, Madison, SD 57042 USA
[2] Drexel Univ, Philadelphia, PA 19104 USA
关键词
Bluetooth; Hacking; Honeypots; IT Security Policies; Malware; Security; Wireless;
D O I
10.4018/jitn.2012070101
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Bluetooth technology (BT) and the inherent security vulnerabilities it introduces into business domains are often overlooked when security policies are developed. However, the International Data Corporation (IDC) projected that global Bluetooth short-wave wire semiconductor revenue will triple from $1.7 billion in 2007, to $3.3 billion in 2012 (Reidy, 2008). After a brief history of Bluetooth technology, researchers will examine how Bluetooth works, its vulnerabilities, and how these vulnerabilities can be exploited. Bluetooth malware and its associated risks will also be explored. As a practical approach to monitor Bluetooth threats and malware, the employment of a Bluetooth honeypot will be discussed, including honeypot structure and the legalities of deploying them. Building on Andrew Smith's earlier work developing Bluepot, a functional Bluetooth honeypot (Smith, 2011), researchers will test Bluepot and discuss the feasibility of using it as a prototype for developing a functional Bluetooth honeypot to secure corporate data and analyze BT malware.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 50 条
  • [1] Managing Bluetooth Risks in the Workplace
    Podhradsky, Ashley L.
    Casey, Cindy
    Ceretti, Peter
    [J]. 2012 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2012,
  • [2] The Bluetooth Honeypot Project
    Podhradsky, Ashley L.
    Casey, Cindy
    Ceretti, Peter
    [J]. 2012 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2012,
  • [3] Securing Bluetooth-based payment system using honeypot
    Zolfaghar, Kiyana
    Mohammadi, Shahriar
    [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 236 - 240
  • [4] Studying Bluetooth malware propagation - The BlueBag project
    Carettoni, Luca
    Merloni, Claudio
    Zanero, Stefano
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (02) : 17 - 25
  • [5] A Study of Bluetooth Low Energy Performance for Human Proximity Detection in the Workplace
    Montanari, Alessandro
    Nawaz, Sarfraz
    Mascolo, Cecilia
    Sailer, Kerstin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2017,
  • [6] Measuring Noise Pollution by Utilizing Bluetooth Low Energy Beacons
    Fallis, Evan
    Spachos, Petros
    [J]. 2021 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2021,
  • [7] Measuring and managing mycotoxin risks
    Desjardins, A.
    [J]. PHYTOPATHOLOGY, 2005, 95 (06) : S146 - S146
  • [8] Managing project risks and uncertainties
    Mike Mentis
    [J]. Forest Ecosystems, 2015, 2 (01) : 31 - 44
  • [9] Managing project risks and uncertainties
    Mentis, Mike
    [J]. FOREST ECOSYSTEMS, 2015, 2
  • [10] Feasibly Measuring Sitting And Physical Activity In The Office Using Bluetooth Sensing
    Winkler, Elisabeth A.
    Hadgraft, Nyssa
    Sugiyama, Takemi
    Clark, Bronwyn
    [J]. MEDICINE AND SCIENCE IN SPORTS AND EXERCISE, 2018, 50 (05): : 848 - 848