BT-IDS: An anomaly-based Intrusion Detection System for Bluetooth - - PowerPoint PPT Presentation

bt ids an anomaly based intrusion detection system for
SMART_READER_LITE
LIVE PREVIEW

BT-IDS: An anomaly-based Intrusion Detection System for Bluetooth - - PowerPoint PPT Presentation

BT-IDS: An anomaly-based Intrusion Detection System for Bluetooth Devices Shalaka Satam, Pratik Satam and Salim Hariri Cloud and Autonomic Computing Center Semi Annual IAB Meeting Tucson, Arizona Project Team Members n UA Faculty p Salim


slide-1
SLIDE 1

Cloud and Autonomic Computing Center Tucson, Arizona Semi Annual IAB Meeting

Shalaka Satam, Pratik Satam and Salim Hariri

BT-IDS: An anomaly-based Intrusion Detection System for Bluetooth Devices

slide-2
SLIDE 2

Project Team Members

n UA Faculty

p Salim Hariri

n UA Graduate Students

p Shalaka Satam p Pratik Satam

2

slide-3
SLIDE 3

Background

n IoT devices depend heavily on wireless

networks for communications.

n Bluetooth

networks have become the wireless network choice for small range communications.

n Bluetooth networks need to be secure

against cyberattacks like battery draining attack, DoS, etc.

3

slide-4
SLIDE 4

Project Overview

4

slide-5
SLIDE 5

Project Tasks: Overview

p Task 1: Develop innovative data structures

(Bluetooth Flow (BTF)) that can accurately model the Bluetooth normal operations

p Task 2: Design an architecture for the Bluetooth

Intrusion Detection System (BT-IDS)

p Task 3: Build machine learning models that

characterize the normal behavior that can be used to detect any attack against Bluetooth network

5

slide-6
SLIDE 6

Task 1: Develop BT Flow data structures that model the Bluetooth normal operations

6

  • N-gram
  • A

data structure that is used to represent an N state transitions sequence of the BT protocol state diagram into one single unit (N-gram).

  • BT

Flow (BTF)

  • A

collection

  • f

Ngrams that follow one specific flow of Bluetooth traffic.

slide-7
SLIDE 7

Task 2: Design a BT-IDS Architecture

7

  • Sniffer Module

Its main function is to collect data frames that are transmitted over the Bluetooth network

  • BT Behavior Analysis

Unit (BT-BAU) It performs data-driven analytics to detect any abnormal behavior in BT network operations that can be triggered by BT attacks

slide-8
SLIDE 8

Task 3: Develop machine learning models that characterize the BT normal operations

8

Preliminary analysis

slide-9
SLIDE 9

Activities and outcomes

p The primary goal of this project is to develop an

intrusion detection system (IDS) for Bluetooth network that uses anomaly based detection approach.

p The Bluetooth IDS (BT-IDS) can detect and

classify accurately new and modified attacks with little or no false positives and false negatives.

9

slide-10
SLIDE 10

Deliverables and benefits

10

Deliverables

  • Midterm and final reports documenting

research methods, and evaluation results

  • One or two scholarly conference and/or

journal publications Benefits

  • Capability to detect and classify attacks

against Bluetooth networks.

slide-11
SLIDE 11

LIFE Form Input

Please take a moment to fill out your L.I.F.E. forms. http://www.iucrc.com Select “Cloud and Autonomic Computing Center” then select “IAB” role. What do you like about this project? What would you change? (Please include all relevant feedback.)

11