Font Size: a A A

Research And Implementation Of Smartphone Bluetooth Attack Monitoring System Based On Device State Identification

Posted on:2021-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:F WeiFull Text:PDF
GTID:2428330632962657Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The Internet of Things is an information technology revolution following computers,the Internet,and mobile communications,and is of great significance to a new round of industrial transformation and economic,social,and green,intelligent,and sustainable development.As a wireless communication protocol of the Internet of Things perception layer,Bluetooth has been widely used in many types of commercial and consumer devices.Today,mobile phone Bluetooth has become an indispensable part of people's lives.The Bluetooth module of a smartphone has functions such as file transfer,network sharing,and controlling other Bluetooth devices.Due to the widespread use of smartphones and the large number of Bluetooth applications,Bluetooth security has received widespread attention.In recent years,Bluetooth vulnerabilities related to smartphones have been frequently exposed,and Bluetooth attacks against smartphones have also emerged.It is increasingly important to identify and stop Bluetooth attacks to ensure that smartphones are protected from Bluetooth attacks.This paper analyzes the Bluetooth security threats,studies the Bluetooth attack technology,and gives four common methods of implementing Bluetooth attacks on smartphones.Therefore,this paper proposes a Bluetooth attack monitoring solution for smartphones.In the monitoring scenarios given in this paper,this solution has a high accuracy rate and recall rate in Bluetooth attack detection for smartphones.Then,according to the scheme,a Bluetooth attack monitoring system for smartphones is designed and implemented.The system can effectively monitor four specific Bluetooth attacks against smartphones.The specific research contents of this article are as follows:(1)Research and analysis of the Bluetooth attack technology against smartphones.First,the Bluetooth attack classification is studied.On this basis,the common Bluetooth attack tools are analyzed,and the implementation method of the Bluetooth attack is deeply explored.Finally,four implementation methods of denial-of-service attack,fuzzing attack,scanning attack,and Bluetooth vulnerability-based attack are given.These four kinds of Bluetooth attacks are more common and pose a greater threat to smartphones.(2)A smartphone Bluetooth attack monitoring scheme based on device status recognition is proposed.This solution uses the idea of side channels to identify Bluetooth attack behaviors through changes in the status of Bluetooth devices,and at the same time uses the response time of ping in Bluetooth L2CAP to reflect the Bluetooth status of the smartphone without acquiring Bluetooth communication traffic,which solves the Bluetooth communication traffic of the smartphone Problems that are difficult to catch.In addition,the machine learning algorithm LSTM is introduced into the detection model,the cross entropy loss function and gradient descent method are selected for solution,and the entire detection model is implemented using the TensorFlow platform.Then,the simulated attacker carried out these four Bluetooth attacks and obtained the training set and test set of the model.Finally,the test set is used to test the trained model.The experimental results show that in the monitoring scenario given in this paper,the detection model proposed in this paper has a high accuracy rate and recall rate in the monitoring of specific Bluetooth attacks.(3)A Bluetooth attack monitoring system for smartphones is designed and implemented.First,a detailed requirements analysis of the system is performed,and the functional and non-functional requirements of the system are given.Then the detailed design and analysis of the whole system and each module are carried out.Finally,the system is implemented and the system workflow and demonstration are given.The monitoring system implemented in this paper can scan the surrounding Bluetooth devices and collect Bluetooth device information,and can effectively monitor four specific Bluetooth attacks against smartphones,and can provide real-time alarms against the detected attacks.
Keywords/Search Tags:Bluetooth, Smartphone, Attack monitoring, L2CAP, LSTM
PDF Full Text Request
Related items