Improving compliance with bluetooth device detection
Autor: | Eoghan Furey, Kevin Curran, Martin Davies |
---|---|
Rok vydání: | 2019 |
Předmět: |
Engineering
bluetooth hacking Chipset Network security 02 engineering and technology Computer security computer.software_genre law.invention Bluetooth law Payment Card Industry Data Security Standard network security 0202 electrical engineering electronic engineering information engineering Electrical and Electronic Engineering Bespoke business.industry Bring your own device 020206 networking & telecommunications wireless sniffing Wireless security NIST 020201 artificial intelligence & image processing business Telecommunications hacking computer wireless security |
Zdroj: | TELKOMNIKA (Telecommunication Computing Electronics and Control). 17:2355 |
ISSN: | 2302-9293 1693-6930 |
DOI: | 10.12928/telkomnika.v17i5.12929 |
Popis: | The number of devices containing Bluetooth chipsets is continuing to rise and there exists a need to stem the tidal wave of vulnerabilities brought by the Bring Your Own Device (BYOD) and Internet of Things (IoT) phenomena. With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth devices, or creating an accurate Bluetooth device hardware log is limited. The software tools and hardware devices to monitor WiFi networking signals have long been a part of the security auditor’s arsenal, but similar tools for Bluetooth are bespoke, expensive, and not adopted by most security pentesters. However, this has changed with the introduction of the Ubertooth One, a low-cost and open-source platform for monitoring Bluetooth Classic signals. Using a combination of the Ubertooth One, and other high-power Bluetooth devices, an auditor should now be able to actively scan for rogue devices that may otherwise have been missed. This research examines various hardware combinations that can be used to achieve this functionality, and the possible implications from a compliance point of view, with a focus on the standards used by the Payment Card Industry Data Security Standard (PCI-DSS), and the guidelines offered by the National Institute of Standards and Technology (NIST). We compare the results of scanning with traditional Bluetooth devices as opposed to an Ubertooth/Bluetooth combination. We show how the ability to monitor a larger portion of Bluetooth traffic can highlight serious implications in the compliance landscape of many organisations and companies. We demonstrate that identifying non-discoverable devices with Bluetooth enabled is a crucial element in holistic security monitoring of threats. |
Databáze: | OpenAIRE |
Externí odkaz: |