MODELS AND ALGORITHMS FOR PROTECTION AGAINST THREATS THAT VIOLATE THE INTEGRITY OF VIDEO INFORMATION
16.12.2022
International Scientific Journal "Science and Innovation". Series A. Volume 1 Issue 8
A. Gafurov , A. Abdusalomov
Abstract. Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s privacy. In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples. We also identify the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Finally, we present current countermeasures and best practices and discuss the threat horizon. The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems’ security, to harden existing systems and develop improved security solutions.
Keywords: IP cameras, video surveillance, IoT, network security, physical security.
References:
1. Cabasso J. Analog vs. IP cameras. Aventura Technol. Newsl. 2019;1:1–8. [Google Scholar]
2. Statista Security & Surveillance Technology Statistics & Facts. Technical Report. [(accessed on 21 August 2020)];2019 Available online: https://www.statista.com/topics/2646/security-and-surveillance-technology/
3. Mukkamala S., Sung A.H. Detecting denial of service attacks using support vector machines; Proceedings of the 12th IEEE International Conference on Fuzzy Systems; St. Louis, MO, USA. 25–28 May 2020; pp. 1231–1236. [Google Scholar]
4. Antonakakis M., April T., Bailey M., Bernhard M., Bursztein E., Cochran J., Durumeric Z., Halderman J.A., Invernizzi L., Kallitsis M., et al. Understanding the mirai botnet; Proceedings of the USENIX Security Symposium; Vancouver, BC, Canada. 16–18 August 2017. [Google Scholar]
5. Peeping into 73,000 Unsecured Security Cameras Thanks to Default Passwords. [(accessed on 21 August 2020)]; Available online: https://www.csoonline.com/article/2844283/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html
6. Dangle a DVR Online and It’ll Be Cracked in Two Minutes. [(accessed on 21 August 2020)]; 2017 Available online: https://www.theregister.com/2017/08/29/sans_mirai_dvr_research/
7. The Internet of Things: An Overview. [(accessed on 21 August 2020)]; Available online: https://www.internetsociety.org/wp-content /uploads/2017/08/ISOC-IoT-Overview-20151221-en.pdf
8. Ling Z., Liu K., Xu Y., Jin Y., Fu X. An end-to-end view of iot security and privacy; Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference; Singapore. 4–8 December 2017; pp. 1–7. [Google Scholar]
9. Khan M.A., Salah K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018;82:395–411. doi: 10.1016/j.future.2017.11.022. [CrossRef] [Google Scholar]
10. Akhtar N., Mian A. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access. 2018;6:14410–14430. doi: 10.1109/ACCESS.2018.2807385. [CrossRef] [Google Scholar]
11. Costin A. Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations; Proceedings of the 6th International Workshop on Trustworthy Embedded Devices; Vienna, Austria. 28 October 2020; pp. 45–54. [Google Scholar]
![](images/google_scholar.png)
![](images/cyberleninka_logo.png)