Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini
نویسندگان
چکیده
In today’s technology world, Virtual personal assistants (VPA) have become very common and most people started making their homes smart using these VPAs. Although different companies assistants, Google Home Mini (GHM) will be our focus in this paper. The first device, Home, was released November 2016 then GHM after a year, October 2017. has many features such as playing music, setting reminders, kitchen timer controlling home devices. might reliable against cyber-attacks, devices, which are paired with GHM, could attacked cyber-attacks can lead to severe problems. Cyber-attack issues more important us, specifically if the devices controlled by vital oven, fire alarm, security camera. article, we represent Denial of Service (DOS) attacks applied GHM. study, Bluedoser, L2ping, Bluetooth Dos Script software Kali Linux platform were used order perform DoS attack some Mini, Headphone, 2 speakers victim device. Successful results observed on headphone.
منابع مشابه
DoS Attacks Flood Techniques
DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and secu...
متن کاملStealth-MITM DoS Attacks on Secure Channels
We de ne stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: 1. First amplifying DoS attack on IPsec, when deployed without anti-replay window. 2. First amplifying attack on IPsec, when deployed with a `small...
متن کاملStealth DoS Attacks on Secure Channels
We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a n...
متن کاملRelay Attacks on Bluetooth Authentication and Solutions
We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to both victims in order to set up these attacks, merely to relay the information it receives from one victim to the other during the authentication protocol run. Bluetooth authentication protocol allows such a relay if th...
متن کاملTCP Ack Storm DoS Attacks
We present Ack-storm DoS attacks, a new family of DoS attacks exploiting a subtle design flaw in the core TCP specifications. The attacks can be launched by a very weak MitM attacker, which can only eavesdrop occasionally and spoof packets (a Weakling in the Middle (WitM)). The attacks can reach theoretically unlimited amplification; we measured amplification of over 400,000 against popular web...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Celal Bayar Universitesi Fen Bilimleri Dergisi
سال: 2022
ISSN: ['1305-130X', '1305-1385']
DOI: https://doi.org/10.18466/cbayarfbe.856119