Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini

نویسندگان

چکیده

In today’s technology world, Virtual personal assistants (VPA) have become very common and most people started making their homes smart using these VPAs. Although different companies assistants, Google Home Mini (GHM) will be our focus in this paper. The first device, Home, was released November 2016 then GHM after a year, October 2017. has many features such as playing music, setting reminders, kitchen timer controlling home devices. might reliable against cyber-attacks, devices, which are paired with GHM, could attacked cyber-attacks can lead to severe problems. Cyber-attack issues more important us, specifically if the devices controlled by vital oven, fire alarm, security camera. article, we represent Denial of Service (DOS) attacks applied GHM. study, Bluedoser, L2ping, Bluetooth Dos Script software Kali Linux platform were used order perform DoS attack some Mini, Headphone, 2 speakers victim device. Successful results observed on headphone.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS Attacks Flood Techniques

DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and secu...

متن کامل

Stealth-MITM DoS Attacks on Secure Channels

We de ne stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: 1. First amplifying DoS attack on IPsec, when deployed without anti-replay window. 2. First amplifying attack on IPsec, when deployed with a `small...

متن کامل

Stealth DoS Attacks on Secure Channels

We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a n...

متن کامل

Relay Attacks on Bluetooth Authentication and Solutions

We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to both victims in order to set up these attacks, merely to relay the information it receives from one victim to the other during the authentication protocol run. Bluetooth authentication protocol allows such a relay if th...

متن کامل

TCP Ack Storm DoS Attacks

We present Ack-storm DoS attacks, a new family of DoS attacks exploiting a subtle design flaw in the core TCP specifications. The attacks can be launched by a very weak MitM attacker, which can only eavesdrop occasionally and spoof packets (a Weakling in the Middle (WitM)). The attacks can reach theoretically unlimited amplification; we measured amplification of over 400,000 against popular web...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Celal Bayar Universitesi Fen Bilimleri Dergisi

سال: 2022

ISSN: ['1305-130X', '1305-1385']

DOI: https://doi.org/10.18466/cbayarfbe.856119