IP Video Surveillance Security Review
IP Video Surveillance Security Review
Review
The Security of IP-Based Video Surveillance Systems
Naor Kalbo 1,† , Yisroel Mirsky 1,2, *,† , Asaf Shabtai 1 and Yuval Elovici 1
1 Software and Information Systems Engineering, Ben-Gurion University of the Negev,
Beer Sheva 8410501, Israel; [email protected] (N.K.); [email protected] (A.S.); [email protected] (Y.E.)
2 College of Computing, Georgia Institute of Technology (Georgia Tech), Atlanta, GA 30332, USA
* Correspondence: [email protected]
† These authors contributed equally to this work.
Received: 18 June 2020; Accepted: 20 August 2020; Published: 26 August 2020
Abstract: Over the last decade, video surveillance systems have become a part of the Internet
of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways,
gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent
security risks which can lead to significant violations of a user’s privacy. In this review, we explore
the attack surface of modern surveillance systems and enumerate the various ways they can be
compromised with real examples. We also identify the threat agents, their attack goals, attack vectors,
and the resulting consequences of successful attacks. Finally, we present current countermeasures
and best practices and discuss the threat horizon. The purpose of this review is to provide researchers
and engineers with a better understanding of a modern surveillance systems’ security, to harden
existing systems and develop improved security solutions.
1. Introduction
These days, video surveillance systems can be found everywhere. They are in the streets, at train
stations, workplaces, factories, and even at home. Intelligent applications have made large surveillance
networks practical to manage and utilize. For example, technology for facial recognition, identifying
threats, event-detection, tracking objects, and rapidly investigating incidents can be scaled to thousands
of cameras over large geographical areas.
Over the last few decades, surveillance technologies have evolved from analog systems to packet
switched systems (over IPv4 & IPv6 networks) [1]. Analog systems use cameras that transmit
analog signals (typically over a coax cables) to a recording unit. Attacks on these systems were
either denial of service by cutting wires, video injection by intercepting the cable, and record
tampering by physically interacting with the recording unit. In contrast, IP-based systems have
diverse topologies and technologies making them far more complex and which results in much
larger attack surface (e.g., VPNs, gateways, multiple servers, WiFi, access control systems, etc.).
Furthermore, these systems are often exposed to the Internet enabling attackers to continuously attack
them while new vulnerabilities are discovered everyday.
Regardless, IP-based video surveillance systems have become affordable due to the popular and
pervasive Internet of Things (IoT). As a result, the market for security devices in connected homes has
grown by a factor of 17 over the last few years [2]. Due to their convince, practicality, and affordability,
video surveillance systems have become ubiquitous in our daily lives.
However, as expected, these systems and their components have been the target of numerous
cyber attacks. For example, they have been the target of distributed denial of service (DDoS) attacks,
exploited to invade the users’ privacy, and even to mine cyrpto-currency [3]. These systems have also
been recruited into botnets to perform nefarious tasks. For example, in 2014, the infamous Mira botnet
targeted surveillance systems, and infected over 600,000 devices worldwide [4].
Through Shodan.io and Censys.io queries of well known manufacturers, we found over 1 million
surveillance cameras and over 125,000 surveillance servers exposed to the Internet. Of these devices,
90% do not have secure login portals (use HTTP and not HTTPS). Moreover, approximately 8%
have open SSH and Telnet ports, 3% have exposed MySQL databases, and at least 1.7% of these
devices are still vulnerable to the HeartBleed SSL vulnerability discovered in 2012. Even large video
surveillance manufacturers have exposed products. For example, Samsung’s CCTV Server has at
least 83,035 exposed devices, where 86% of them use HTTP login portals, and 1604 have ssh ports
open. Moreover, HikVision, the surveillance manufacturer with the largest market share of 24.7%
has at least 260,415 exposed devices where only 53 of them had HTTPS enabled, but with self-signed
certificates. In one study, it was found that approximately 73,000 security cameras in 256 countries are
accessible with default passwords [5]. These statistics emphasize the poor state of security of IP-based
surveillance systems. Moreover, these systems are highly targeted. In [6], the authors showed how
their surveillance system was hacked after two minutes of being connected to the Internet.
In this article, we will review the cyber security of modern surveillance systems. We will start
by detailing the composition and topology of modern video surveillance systems. Next, we will
understand the goals of an attacker by discussing them in terms of their effect on the confidentiality,
integrity, and availability of the system. Afterwards, we will explore how an attacker can realize
his/her goal through multiple attack steps involving different threat agents and malicious actions.
We will exemplify these attacks with current events and published common vulnerability exposures
(CVE). Finally, we will review best practices and known security solutions which can be used to help
mitigate these cyber threats.
To capture the attack surface, we conducted our review as follows: (1) we identified the relevant
elements (assets and actors) using real-world deployments, (2) we searched for relevant academic
papers and technical reports relating to attacks and countermeasures for each element and these
systems in general, (3) we searched Shodan to identify the relevant threats, (4) we executed existing
IP-camera attacks (such as video injection) to enumerate and understand the system’s limitations,
and (5) we used penetration testers to search for attack vectors and novel vulnerabilities in a real
commercial surveillance system used in seaports, airports, railways, and in other commercial zones.
Details on the testbed’s configuration can be found in Section 2.5.
We note that many other works have performed comprehensive reviews of IoT security [7–9].
Although IP-based surveillance systems use generic network elements and share technologies with
other IoT systems, their attack surface is different from a cybersecurity stand-point. This is because
they support and enforce our physical security, and, when compromised, there is a threat to our
physical safety and our privacy (at home, at work, and in a national sense). As a result, the technology,
threat actors, and attack motivations, and overall attack surface differ from other networks and IoTs.
We distinguish these differences as follows:
Threat Actors (Who) There is a set of attackers who want to exploit the functionality of surveillance
systems specifically. For example, state-actors or thieves performing reconnaissance over a
geographic area and criminals planning to blackmail a victim with video footage.
Assets (What) If compromised, these systems can provide an attacker with private imagery resulting
in a direct explicit violation of privacy. These systems are also lucrative assets to botnet owners
since they typically have high bandwidth (for DDoS attacks) and decent compute capabilities
(for cryptomining). The features of a surveillance system change the weight of attacker’s goals
and the defender’s priority on the defenses. For example, there is more emphasis on anti-DoS
and MitM attacks in surveillance systems than other systems. Overall, the privacy violation of
exposed data has much stronger implications than data from other IoTs.
Sensors 2020, 20, 4806 3 of 27
Topology (Where) Unlike other IoTs, surveillance systems are often centralized systems connected
to a single server. They are also commonly connected to both the Internet and an internal
private network—thus exposing a potential infiltration vector. It is also common for surveillance
systems to have their server physically on-site, as opposed to being in the cloud. These aspects
change attack surface by encouraging the attacker to find other ways to compromise the system
(e.g., via local attacks).
Motivation (Why) Aside from being a stepping stone into another network, surveillance systems
elicit monetary motivations such as blackmail, cryptomining, and spying for military or political
reasons. Moreover, an attacker can have a physical advantage if the system is targeted in a DoS
attack. For example, stopping video-feeds in certain geographic areas prior to an attack/theft,
or as an act of cyber terrorism. Another aspect to consider is that a DoS attack on a generic IoT
device or information system is a nuisance, whereas on a surveillance system it means that the
attacker can remotely disable video feeds at will. For example, a VPN router in the surveillance
system can be targeted remotely causing a loss of signal to all cameras.
Attack Vectors (How) Surveillance systems have unique security flaws and attacks due to their
functionality. Some examples include (1) servers which accept self-signed certificates (which can
lead to man-in-the-middle attacks) just to be compatible with many different camera models of
various vendors, (2) their unique susceptibility to side channel attacks on encrypted traffic due
to the nature of video compression algorithms, (3) video injection attacks where a clip of footage
is played back in a loop to cover up a crime, and (4) data exfiltration performed via a camera’s
infrared nigh vision sensor. Moreover, modern systems rely on machine learning algorithms to
identify and track objects and people. Unlike AI on other IoTs, these AI models can be easily
evaded/exploited due to their accessibly and flaws [10].
Although many components of IP-based surveillance systems are similar to those of other IoTs
from a technological perspective (e.g., the camera and smart fridge can both have vulnerable telnet
portals), it is much more important to identify the attacker’s motivation (target assets) and strategies
(e.g., how to infiltrate and be covert) in order to design safe architectures and effective defenses.
Thus the attack surface is not the culmination of the individual software and hardware vulnerabilities,
but rather the attacker’s intent and motivation which drive the attack goals and strategies. Knowing the
goals and strategies are key to developing a secure system and designing an effective countermeasure.
We also note that here is a good security review of CCTV and Video Surveillance Systems
in [11]. However, in [11], the authors focus on visual attacks such as data exfiltration, covert channels,
and steganography. The objective of this review is to provide the reader with a deeper understanding of
an IP-based Surveillance System’s attack surface so that he or she may better understand the attacker’s
goals and techniques in the context of these systems.
The structure of this review is as follows. In Section 2, we present a system overview with a
security oriented taxonomy, a description of the various targets (assets), and the common deployment
topologies. In Section 3, we detail the attacker’s possible motivations in the form of security violations.
In Section 4.2, we identify the elements of attack vectors against these systems (threat agents, actions,
and consequences) followed by some example attack vectors comprised of these elements. We also
ground all of these attacks and vulnerabilities with real world cases. In Section 5, we discuss
countermeasures and best practices for securing IP-based surveillance systems against each of the
various attacks. Finally, in Section 6 we provide a discussion on the threat horizon, suggest future
work, and conclude the review.
2. System Overview
Before we can discuss the security aspects, we must describe what a surveillance system is. In this
section, we first present a general overview of IP-based video surveillance systems. Afterwards, we list
some of the system’s critical assets and common deployment schemes.
Sensors 2020, 20, 4806 4 of 27
2.1. Overview
To get a better understanding of IP-based video surveillance systems, in Figure 1, we present
a taxonomy of their concepts. In general, a system can be described in terms of its purpose,
implementation, topology, and protection. We will now detail each of these aspects. To create it,
we started with a basic taxonomy which is based on common knowledge and our experience in
cyber security. We then evolved the taxonomy based on input from surveillance system engineers,
security experts, and the papers, vulnerability disclosures, and reports which we reviewed. We verified
that the information could be mapped to our taxonomy, and, if not, we updated it.
Video Surveillance System
Monitoring
Visualization Analog Centralized Open Circuit Wired Host Network
Forensics
Digital Point Access Closed Circuit Wireless Encryption
Direct
Operations Access
Both Control
Indirect
Deterrent Firewall
Interpretation
Antivirus
Manual
VPN
Automatic
Purpose The purpose of a video surveillance system depends on the user’s needs.
Enforcement The user may want to send security forces or police to an area undergoing some
violation of law or protocol. This is common in governments, transportation services, stores,
and even workplaces.
Monitoring The user may want to know what is happening in a certain location for some general
purpose, or to have a sense of security—for example, home, baby, and pet monitoring.
Forensics The user may want to be able to produce evidence or track down an individual.
Operations The user may want to improve operations by having an overview of what is going
on. For example, employees can be guided or managed more efficiently.
Deterrent The user may want to have the system visually present to simply ward off potential
offenders or trespassers. In some cases, the user will not even have a means of viewing the
video footage.
Implementation There are various ways the hardware/software of the system can be setup to collect
and interpret the video footage. We categorize the system’s implementation into two categories:
Monitoring This concept regards how the user visualizes the video streams, and how the content
is interpreted. The visualization can be provided directly to the user directly such as in
a closed circuit monitoring station, or indirectly via a digital video recorder (DVR) with
remote access or in the cloud. The interpretation of the content can be done manually by
a human user reviewing the content, or automatically via motion detection, or advanced
applications such as object tracking, image recognition, face-detection, and event-detection.
Sensors 2020, 20, 4806 5 of 27
Communication This refers to the means in which the system transports the video feeds [1].
With analog methods, the video is sent to the DVR as an analog signal (which is subsequently
connected to Internet). With digital methods, the video is processed, compressed, and then
sent as a packet stream to the DVR via IPv4 and IPv6 network protocols. A common
approach is to compress the stream with the H.264 codec and then send it over the network
with a real-time protocol such as RTP over UDP.
Host Cameras, DVRs, and other devices can be protected by using proper access control
mechanisms. However, like any computer, these devices are subject to the exploitation of
un/known vulnerabilities in the software, hardware, or simply due to user misconfiguration
(e.g., default credentials) [4]. Protecting the hosts from attacks may involve anti-virus
software or other techniques.
Network Depending on the topology, access to the system’s devices may be gained via the DVR,
an Internet gateway, or directly via the Internet. A user may protect the devices and the
system as a whole by securing the network via encryption, firewalls, and end-to-end virtual
private network connections (VPN).
2.2. Assets
An asset is a thing of value which may be targeted by an attacker. In our case, the assets are data,
devices, software, and infrastructure:
DVR—Media Server The digital video recorder, or other media server, which is responsible for
receiving, storing, managing, and viewing the recorded/archived video feeds. DVRs are typically
an application running on the user’s server, or a custom hardware Linux box. DVRs can also
be a cloud based server. In a small system, there may be cameras which do not support a DVR,
and require the user to connect to the camera directly (e.g., via web interface).
Cameras The devices which capture the video footage. There are many types, brands, and models
of IP-Cameras, and each has its own capabilities, functionalities, and vulnerabilities.
For configuration, some IP cameras provide web-based interfaces (HTTP, Telnet, etc.) while
others connect to a server in the cloud. Most cameras act as web servers which provide video
content to authorized clients (e.g., the DVR will connect to the camera as a client).
Viewing Terminal The device/application used to connect to the DVR or camera in order to view
and manage the video content. For example, an Android application running on a smartphone
or the DVR itself.
Network Infrastructure The elements which connect the cameras to the DVR, and DVR to the
user’s viewing terminal—for example, routers, switches, cables, etc. The infrastructure
also includes Virtual Private Network (VPN) equipment and links. VPNs are LANs which
tunnel Layer 2 (Ethernet) traffic across the Internet, between gateways and user devices,
Sensors 2020, 20, 4806 6 of 27
using encryption. Site-to-site VPNs can bridge two segments of a the surveillance network
over the Internet. A remote-site connection tunnels traffic directly from a user’s terminal to the
surveillance network.
Video Content The video feeds which are being recorded or that have been archived for later viewing.
User Credentials The usernames, passwords, cookies, and authentication tokens used to gain access
to the DVR, cameras, and routers. The credentials are used to authenticate users and determine
access permissions of video content, device configurations, and other assets.
Network Traffic—Data in Motion Data being transmitted over the network infrastructure. This can
be credentials, video content, system control data [12] (e.g., pan, tilt, or zoom), and other network
protocols (ARP, DNS, HTTP, SSL, TCP, UDP, etc).
2.3. Deployments
There are several ways an IP-based surveillance system can be deployed. The network topologies
can be centralized (all cameras connect to a DVR) or distributed (the user connects to each individual
camera). In terms of accessibility, the system can be directly accessible via the Internet, or not at all.
In this regard, we identify three categories of accessibility (visualized in Figure 2):
Physically Open Circuit (POC) When the network hosts in the system (cameras, DVR, etc.) have
public IP addresses. This means that anybody from the Internet can send packets to the devices.
Physically Closed Circuit (PCC) When the network hosts in the system have private IP addresses,
and there is no infrastructure which connects the network to the Internet. This means that
noone from the Internet can send packets to the devices directly. These systems are also called
air-gapped networks [13].
Virtually Closed Circuit (VCC) When the network hosts in the system have private IP addresses,
and the network is connected via the Internet using a VPN. This means that noone from the
routes traffic Tx
Internet can send packets to the devices directly, unless they send packets via the VPN.
Rx
Physically Open Circuit (POC): The Physically Closed Circuit (PCC): The
network hosts have public IP addresses network hosts have private IP addresses,
and there is a physical disconnect
DVR Monitoring Room DVR Monitoring Room
r physically intercepts traffic
Internet Internet
nce
nce : a survey of security
Virtually Closed Circuit (VCC): The network hosts have private IP addresses, and
mera video surveillance there is a virtual disconnect
DVR Monitoring Room
Internet
VPN tunnel
smartphone
Architecture. Architecture: In security, we must consider the topology and relationship between
components and not just the individual devices. Some elements only become vulnerable because
of their relationship to others. In the case of IoTs, these devices often follow the same cloud
based model, whereas surveillance systems have a variety of architectures and topologies which,
if disregarded, can lead to severe vulnerabilities. For example, a camera may be safe from remote
attacks because its traffic is sent over a VPN, but the DVR may be exposed because of its web
accessibility. Another example is that the communication channels of the cameras (wired or
wireless) are often exposed and cross over publicly accessible areas, giving the attacker more
opportunities to infiltrate the network than in the case of IoTs. In this survey, we exemplify the
architectures unique to surveillance systems compared to the IoT cloud model, and the strategies
which attackers may use to exploit them.
Artificial Intelligence. In the case of IoTs, machine learning is often performed on the back-end for
data-mining purposes. In the case of surveillance systems, there are unique attacks (e.g., all image
based attacks) which enable attacks only relevant to surveillance systems (evasion, false evidence,
DoS) that can lead to significant breaches in safety, privacy, and justice –unlike other IoTs.
For example, an attacker can use adversarial markings on their clothes to evade detection, delay
investigations (plant false triggers), and identify as a legitimate personnel. Recently researchers
have shown how attackers can craft images which incur significant overhead on a model, causing
the device to slow down in an effective DoS attack [14]. These attacks uniquely affect surveillance
systems since the AI features provide attackers with new vectors towards accomplishing their
goals and undermining the purpose of the system.
How. Consider a DoS attack. The classic way of an attacker performing this attack on IoTs would be to
overload the device with traffic. Doing so would alert the local authorities to the camera’s area
because the feed would go down. However, here the attacker is clearly motivated to be covert as
to not alert the authorities to his or her presence. Therefore, the DoS would likely be in the form
of (1) looping video content, (2) freezing the current frame, (3) targeting the DVR to manipulate
the content since the DVR may be more exposed by its web portal, or (4) using an adversarial
Sensors 2020, 20, 4806 8 of 27
machine learning attack to evade detection (e.g., hide the fact that there is a person in the scene
though use of an adversarial sticker).
Another consideration is that IP-cameras generate massive amounts of network traffic compared
to other IoTs. This makes it very easy to detect disruptions from attacks, this challenging the
attacker to compromise the devices in other ways (e.g., prefer obtaining credentials than rooting
the device).
Where. Consider a data theft attack. The classic way of performing this attack would be through
remote social engineering attacks (e.g., phishing) to access credentials or to exploit vulnerabilities
directly in the IoT device itself to gain privileged access. However, in a surveillance system that
is completely VPN-based, remotely targeting the device is not possible and the social engineering
attacks may not provide access (e.g., in the case of time-based rotating keys). Rather, it is
more likely that the attacker will perform a physical social engineering attack (e.g., plant a USB
drive) or physically tamper with the network infrastructure to plant a man in the middle device.
Distinguishing the difference is critical since it will not only indicate where emphasis in security
design must be made but also determine where countermeasures should be placed (e.g., placing
an NIDS by the cameras and not just at the web portal or DVR) and emphasized (e.g., to bury
and lock up cables, even in ‘private’ hallways inside the building).
Why. Consider how the system could be leveraged. An IoT device may be targeted for the information
or resources in which it contains. However, there is more risk for a camera to be compromised
for its capabilities (observing the video footage) or to act as a stepping stone in a grander attack.
For the latter case, consider data exfiltration: cameras may be used to exfiltrate data past an
advanced firewall since the cameras are always sending large amounts of data in real time.
Here the attacker can ride this current undetected (below the noise floor) where in contrast to
other IoTs, the traffic is typically sparse and easier to model. Another case to consider is the
fact that IP-Cameras produce far more traffic (bandwidth) than other IoTs and therefore may be
targeted for the purpose of creating massive DDoS attacks.
We note that the risk of an attack on an IP-surveillance system is higher than other categories
of IoT because (1) they are wide spread, (2) provide high payoff for the attacker (provide the
attacker with stronger processors than other IoTs for bitcoin mining etc, and direct access to
confidential information), and (3) directly impact the safety, privacy, and integrity (e.g., planting
false evidence) of the user. Therefore, understanding the ‘why’ of the attack enables the defender
to know where time and resources should be put into hardening the architecture and prevent
poor design choices in topology and access control.
In summary, knowing where the attacker will target first gives an early warning and enables the
defenders to purge the attackers from the system before significant damage is done. This can only
be accomplished by fully understanding the attack surface from an attack motivational perspective.
Therefore, we believe that this survey will contribute greatly to the researchers and engineers who
read it. The how, where and why of the potential attacks are different than other IoTs, and therefore it
is critical that this survey focuses on the narrative on these aspects.
Our observations were used to complete the following sections which enumerate and identify the
vulnerabilities, attack vectors, and countermeasures applicable to POC, PCC, and VCC surveillance
system deployments.
Attack Vector
Remote Site VPN Channel (S2S)
Ethernet
Deployment A Attacker
VPN Router
Switch (PoE)
3
1
2 WiFi Router
DVR
Client
Attacker (viewer)
Deployment B
Sony SNC-EB600
Protocol: HTTPS
Sony SNC-EB602R
Office Protocol: HTTP/TCP
Deployment
Sony SNC-EM600
Protocol: RTP
Remote Site
Sony SNC-EM602RC
Protocol: RTP
X
Various Home
Surveillance Models
Protocol: RTP
Figure 3. The two deployments do the commercial Surveillance System used for penetration testing
during our study.
Attack Type Attack Name Tool Description: The attacker... Violation Vector
. . . scans the network for hosts, and their operating systems, to
OS Scan Nmap C 1
Recon. reveal possible vulnerabilities.
. . . searches for vulnerabilities in the camera’s web servers by
Fuzzing SFuzz C 3
sending random commands to their cgis.
Video Injection Video Jack . . . injects a recorded video clip into a live video stream. C, I 1
Man in the ARP MiTM Ettercap . . . intercepts all LAN traffic via an ARP poisoning attack. C 1
Middle . . . intercepts all LAN traffic via active wiretap (network bridge)
Active Wiretap Raspberry Pi 3B C 2
covertly installed on an exposed cable.
. . . overloads the DVR by causing cameras to spam the server
SSDP Flood Saddam A 1
with UPnP advertisements.
Denial of . . . disables a camera’s video stream
SYN DoS Hping3 A 1
Service by overloading its web server.
. . . disables a camera’s video stream by sending many SSL
SSL Renegotiation THC A 1
renegotiation packets to the camera.
Malware . . . infects IoT with the Mirai malware by exploiting default
Mirai Telnet C, I X
Botnet credentials, and then scans for new vulnerable victims network.
Sensors 2020, 20, 4806 10 of 27
3. Security Violations
A security violation can be described as an attack on the system’s confidentiality, integrity and
availability (known as the CIA triad [15]). A violation of confidentiality refers to the unauthorized
access of information. A violation of integrity refers to the intentional manipulation and alteration of
information. Finally, a violation of availability refers to the act of preventing authorized users from
accessing services or resources when needed.
The goals which an attacker may have in assaulting the system can be described in terms of the
CIA triad:
3. Availability Violation—the denial of access to stored or live video feeds. In this case,
the attacker’s goal is to (1) disable one or more camera feeds (hide activity), (2) delete stored
video content (remove evidence), or (3) launch a ransomware attack (earn money)—for example,
the attack on Washington DC’s surveillance system in 2017 [17].
4. Attacks
There are many different kinds of attacks. Some scenarios involve a single step (e.g., DDoS
a VPN link), while others have numerous steps (e.g., stealing credentials by sending a phishing
email, then installing a malware, and so on). A sequence of attack steps is often referred to as an
attack vector. Each step in the vector gives the attacker access to some asset, and the final step in
the vector fulfills the attacker’s goal. As an example, Figure 4 illustrates the flow of two different
attack vectors which arrive at the same goal. Here, both Actions 1 and 2 give the attacker access to
Sensors 2020, 20, 4806 11 of 27
the surveillance system. However, Action 1 requires addtional attacks to achieve the attack goal as
opposed to Action 2 which achieves the goal directly. For example, if the goal were to disable all
cameras in the surveillance system, then Action 1 might be ‘brute-force camera credentials’ which
results in the outcome ’compromised camera’ giving the attacker control over the asset ’camera’.
However, to disable all cameras, the attacker must then attack the DVR (Action 3 or DoS the other
cameras (Action 4). On the other hand, the attacker could have achieved his goal from the outset by
launching a DDoS attack on the DVR (Action 2) if the attacker owns a botnet.
In summary, an attack vector is one possible route for the attacker to obtain his or her goal.
However, not every route is viable considering the attacker’s resources (e.g., tools, physical/remote
access, ...), experience, and knowledge of the targeted surveillance network.
To understand an attack vector, one needs to investigate the following aspects:
We will now discuss each of these aspects with regard to the surveillance system.
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
Ac
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Infected
𝑂𝑢𝑡𝑐𝑜𝑚𝑒 Enables… USB Drive D
𝐴𝑠𝑠𝑒𝑡 1
Action 2 𝑈𝑠𝑒𝑟
𝐴𝑠𝑠𝑒𝑡 2
Action 2 Recruit an
Insider
Figure 4. An example of two attack vectors which arrive at the same goal.
Send Malicious Get SSL
4.1. Threat Agents
MitM Attack Eavesdrop Packet keys
(BGP MitM) on traffic
We identify the following relevant threat (Heart Bleed)
agents/actors:
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
𝑇𝑟𝑎𝑓𝑓𝑖𝑐 𝐶𝑟𝑒𝑑𝑒𝑛𝑡𝑖𝑎𝑙𝑠
1. Hacker—AnBrute Force
individual who is experienced at exploiting computer vulnerabilities, Observe Live
Credentials Get User
whose unauthorized activities violate the system’s Exfiltrate A Hacker can
Login to security policies. be Feed
in a
Video
Credentials
remote location (i.e., the Internet) Video network.
Camera to the physical
or in close proximity
Send Content
2. Phishing computer
Network Host—A connected to𝐷𝑒𝑣𝑖𝑐𝑒
𝐶𝑟𝑒𝑑𝑒𝑛𝑡𝑖𝑎𝑙𝑠 the system’s
𝐴𝑐𝑐𝑒𝑠𝑠 network which is executing malicious
code. The computer
Email can be an IP-camera, DVR, or any programmable device in the network.
A network host can become a threat actor via local exploitation (the un/intentional instillation
of malware—social engineering and insiders), remote exploitation (e.g., exploit a web server
vulnerability or an open telnet server), or a supply chain attack [18].
Disable
3. Insider—An authorized user of the system who is the attacker orSYN
Remote colluding
Flood with theOne
attacker [19].
Plant NMAP
The insider may
Backdoor be a regular
Access to user (e.g., security officer), an IT (cam1)
support member, or even the
Camera
Scan Knowledge of Default
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
system’sDevice
administrator. An insider may directly perform the entire attack, or enable a portion of Ac
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Network Telnet
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
of 62 common credentials used by cameras, DVRs, and IoTs alike [4]. Another example is the Remaiten
and Aidra malware which compromises cameras and other IoT devices using a similar approach [12].
In addition, the FOSCAM camera was targeted in the same attack since it had no protection against
Brute-Forcing [20] while the password was limited to 12 characters only.
to an unauthenticated login disclosure and unauthenticated command injection via UART. In [37],
researchers connected to the UART and updated the firmware with code to find that the camera was
running a vulnerable OpenSSL version (i.e., heartbleed) and discovered other vulnerabilities leading
to remote code execution.
With regard to DDoS attacks: an attacker may target the surveillance network with a remote
botnet. In this case, the consequence of not filtering the traffic is a DoS to the system. We also note that,
in the case where the system itself is infected with a botnet, and is then used to launch a remote DDoS
attack, the consequence may still be a DoS to the local system since there will be congestion and the
ISP may block the system from network access. An example of surveillance systems being used to
launch a devastating DDoS attack is the Mirai botnet from 2016 [55].
𝑃𝑜𝑖𝑛𝑡
Access to Access to
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Infected Install Persistence Connectivity to
Enables… Device Malware Results in… Network…
Surveillance Plant
𝑃𝑜𝑖𝑛𝑡
USB Drive
Action 1 𝑂𝑢𝑡𝑐𝑜𝑚𝑒 Action 3 on Device
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
Access to
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Network Infected
𝐸𝑛𝑡𝑟𝑦
𝑈𝑠𝑒𝑟 𝐷𝑒𝑣𝑖𝑐𝑒 𝑂𝑢𝑡𝑐𝑜𝑚𝑒 Enables… Device
USB Drive
𝐸𝑛𝑡𝑟𝑦
𝐴𝑠𝑠𝑒𝑡 1
Sensors 2020, 20, 4806
Recruit an Action 2
18 of 27 𝑈𝑠𝑒𝑟 𝐷𝑒𝑣𝑖𝑐𝑒
𝐴𝑠𝑠𝑒𝑡 2
Insider2
Action Recruit an
Insider
(a) Unauthorized Video Monitoring: POC Deployment
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
𝑇𝑟𝑎𝑓𝑓𝑖𝑐 𝐶𝑟𝑒𝑑𝑒𝑛𝑡𝑖𝑎𝑙𝑠
Observe Live
Brute Force
Video Feed Credentials Observe Live
Get User Login to Exfiltrate Video Feed
Credentials Camera Video
Send Content
Phishing 𝐶𝑟𝑒𝑑𝑒𝑛𝑡𝑖𝑎𝑙𝑠 𝐷𝑒𝑣𝑖𝑐𝑒 𝐴𝑐𝑐𝑒𝑠𝑠
Email
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Access to Scan
Add UserKnowledge of Download Default PlantAccess to
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Telnet 1 Network
Action
Device 𝑂𝑢𝑡𝑐𝑜𝑚𝑒
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
Telnet Acces
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
𝑃𝑜𝑖𝑛𝑡
𝐴𝑠𝑠𝑒𝑡 1
𝐶𝑎𝑚𝑒𝑟𝑎 𝐶𝑎𝑚𝑒𝑟𝑎
𝐸𝑛𝑡𝑟𝑦
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
𝑃𝑜𝑖𝑛𝑡
Access to Access to
𝐸𝑛𝑡𝑟𝑦 𝑃𝑜𝑖𝑛𝑡
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Infected 𝑇𝑟𝑎𝑓𝑓𝑖𝑐 Install Persistence 𝐶𝑟𝑒𝑑𝑒𝑛𝑡𝑖𝑎𝑙𝑠 to
Connectivity
Enables… USB Drive Device Malware on Device Surveillance Network…
Brute Force
Network Observe Live
𝐸𝑛𝑡𝑟𝑦
Disable
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Acces
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
𝐴𝑡𝑡𝑎𝑐𝑘 𝐺𝑜𝑎𝑙
Disable
Set of
Cameras
Sensors 2020, 20, 4806 19 of 27
to detect anomalies. This is accomplished by training the autoencoder to recontruct feature vectors of
benign traffic, and then flagging packets whose reconstruction errors are statistically high. KitNET is
comprised of an ensemble of small autoencoders, where each one covers a different correlated subspace
(set of features), and a single autoencoder which monitors the ensembles’ recontruction errors to cover
cross-subspace anomalies. The authors evaluated Kitsune on a commercial IP-based surveillance
system and successfully detected two types of reconnaissance attacks, three types of man-in-the-middle
attacks, and three types of DoS attacks.
In [59], the authors use a similar model as Kitsune except that the anomalies are detected using the
Local Outlier Factor measure (LOF). To evaluate their model, the authors used a number of surveillance
cameras and other IoTs and then infected the network with botnet malware such as Mirai.
Another approach towards mitigating data tampering is to perform data provenance (proving the
source of the data). For example, it has been shown that every camera’s imaging sensor has a unique
noise pattern that can be used to identify the source device by its fingerprint [71]. This can be used to
identify injected video footage at the end-point. In [72], the authors used a deep convolutional neural
network to extract forensic patches from the target video and then assess if the imagery came from the
same device using a similarity network. Although the sampling of these fingerprints has been done in
the past on images, this work was performed on videos which are often highly compressed and thus
leave less evidence. Another example of data provenance was proposed in [73]. There the authors
offered a method for tracking the source of surveillance cameras in an IP-based CCTV system data end
to end using a blockchain distributed ledger. To protect against data injection attacks in surveillance
networks, the authors of [74] propose a means for increasing the robustness of the system by adding
trusted nodes. The authors show that there is a practical trade-off between the number of trusted
nodes (cost) and the system’s resilience to the attacks.
Another approach is to actively search for the presence of eavesdroppers with the ability to
manipulate traffic. In [75], the authors perform echo analysis by bouncing bursts of packets off hosts
in the network to detect additional entities along the way. This approach is analogous to how bats
chirp and listen to the impulse response to understand where objects are in the environment.
5.1.6. Education
An advanced persistent threats (APT) is a well organized attack on an organization that spans
numerous attack steps until the attack goal has been achieved [81]. In an APT, the initial intrusion
often comes in the form of a social engineering attack, where an employee is tricked into providing
credentials or installing malware. The most effective way of mitigating these initial incursions is to:
(1) educate the users of the system of the potential attack vectors, and (2) warn users to be careful of
unsolicited messages and requests made under false pretexts.
face recognition [85], and anomaly detection [86]. In parallel, there has been an increase of research on
adversarial machine learning [10] meaning that these systems are vulnerable to attacks [87]. The second
emerging threat is how these systems are being infected and recruited into botnets [88], leading to
attacks on the internal network (e.g., data exfiltration, spying or using the surveillance system for
lateral movement) or on other external networks (e.g., DDoS, SPAM).
New attacks are constantly emerging. As a result, have noted in our review that a recent
research trend has been securing surveillance systems has been the use of advanced anomaly detection.
With anomaly detection researchers are able to identify man-in-the-middle-attacks [75], video injection,
OS fingerprinting, fuzzing and ARP poisoning attacks [58], and DDoS attacks [59]. Although anomaly
detection is vulnerable to adversarial machine learning, previous works in the domain have mostly
focused on attacking classifiers. The key difference between classifiers and anomaly detectors is that
classifiers have a decision boundary built into the model (are closed-world) and anomaly detection
models only capture the normal behaviors (are open-world). Therefore, more research is needed in
understanding how an attacker can potentially craft a sample which is detected as normal while still
achieving his or her goal of something that is abnormal.
Updating the software of such systems is also a challenging task since manufactures are focused
on their next product, and in many cases do not have the capability of performing remote patching.
Therefore, we believe future research should focus on providing an external continuous protection that
can be easily updated with information on newly discovered attacks. One way to collect intelligence
on emerging threats to surveillance systems is to use an advanced honeypot system [89]. Moreover,
by identifying emerging exploits, administrators can protect their systems before they get infected.
Finally, although in most cases the communication of advanced video surveillance systems
is encrypted, the confidentially of entities can be compromised using side channel attacks [90].
A vulnerability of encrypted video streams is that the compression algorithm (video codec) generates
more data when there is motion. Researchers have shown how content can be inferred from these
encrypted streams by learning/correlating network bandwidth patterns [25]. In [91], the authors
showed how to detect what a drone’s surveillance camera is looking at by (1) monitoring the encrypted
WiFi video stream, (2) triggering a visual stimulus such as a flashing light, and (3) detecting correlated
bandwidth fluctuations in the wireless signal. Therefore, we suggest that future research should
address the detection and elimination of these side channels.
Conclusions
In this article, we have reviewed the security of modern video surveillance systems. First,
we presented a security overview of these systems along with their components and their deployments.
Using this information, we identified the system’s attack surface comprising of its attack agents,
vulnerabilities, actions, and consequences. We then used this information to exemplify several
attack vectors. Having described the attacker’s capabilities, we then discussed recent research on
countermeasures and best practices which can be implemented to better secure IP-based surveillance
systems. Finally, we concluded the review with a discussion on the threat horizon, and suggested
future work in this domain.
In summary, this article provided the reader with a greater understanding of the attack surface
and recent advances made by both the attackers and defenders over the last ten years. We hope
that this information will aid researchers and engineers in securing the surveillance systems of today
and tomorrow.
Author Contributions: Y.M. and Y.E. conceived and designed the experiments; Y.M. performed the experiments;
Y.M. and N.K. analyzed the data; A.S. and Y.E. contributed reagents/materials/analysis tools; N.K. and Y.M.
wrote the paper. All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Conflicts of Interest: The authors declare no conflict of interest.
Sensors 2020, 20, 4806 23 of 27
References
1. Cabasso, J. Analog vs. IP cameras. Aventura Technol. Newsl. 2009, 1, 1–8.
2. Statista. Security & Surveillance Technology Statistics & Facts. Technical Report. 2015. Available online: https:
//www.statista.com/topics/2646/security-and-surveillance-technology/ (accessed on 21 August 2020).
3. Mukkamala, S.; Sung, A.H. Detecting denial of service attacks using support vector machines. In Proceedings
of the 12th IEEE International Conference on Fuzzy Systems, St. Louis, MO, USA, 25–28 May 2003;
pp. 1231–1236.
4. Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.;
Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the mirai botnet. In Proceedings
of the USENIX Security Symposium, Vancouver, BC, Canada, 16–18 August 2017.
5. Peeping into 73,000 Unsecured Security Cameras Thanks to Default Passwords. Available online:
https://www.csoonline.com/article/2844283/peeping-into-73-000-unsecured-security-cameras-thanks-
to-default-passwords.html (accessed on 21 August 2020).
6. Dangle a DVR Online and It’ll Be Cracked in Two Minutes. 2017. Available online: https://www.theregister.
com/2017/08/29/sans_mirai_dvr_research/ (accessed on 21 August 2020).
7. The Internet of Things: An Overview. Available online: https://www.internetsociety.org/wp-content/
uploads/2017/08/ISOC-IoT-Overview-20151221-en.pdf (accessed on 21 August 2020).
8. Ling, Z.; Liu, K.; Xu, Y.; Jin, Y.; Fu, X. An end-to-end view of iot security and privacy. In Proceedings of the
GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–7.
9. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener.
Comput. Syst. 2018, 82, 395–411. [CrossRef]
10. Akhtar, N.; Mian, A. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access
2018, 6, 14410–14430. [CrossRef]
11. Costin, A. Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations.
In Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, Vienna, Austria,
28 October 2016; pp. 45–54.
12. Liu, Z.; Peng, D.; Zheng, Y.; Liu, J. Communication protection in IP-based video surveillance
systems. In Proceedings of the Seventh IEEE International Symposium on Multimedia, Irvine, CA, USA,
14 December 2005; p. 8.
13. Guri, M.; Elovici, Y. Bridgeware: The air-gap malware. Commun. ACM 2018, 61, 74–82. [CrossRef]
14. Sponge Examples: Energy-Latency Attacks on Neural Networks. Available online: https://arxiv.org/abs/
2006.03463 (accessed on 21 August 2020).
15. Kitayama, K.I.; Sasaki, M.; Araki, S.; Tsubokawa, M.; Tomita, A.; Inoue, K.; Harasawa, K.; Nagasako, Y.;
Takada, A. Security in photonic networks: Threats and security enhancement. J. Lightwave Technol. 2011,
29, 3210–3222. [CrossRef]
16. Bertino, E.; Islam, N. Botnets and internet of things security. Computer 2017, 50, 76–79. [CrossRef]
17. Two Romanian Suspects Charged with Hacking of Metropolitan Police Department Surveillance Cameras
in Connection with Ransomware Scheme. Available online: https://www.justice.gov/usao-dc/pr/two-
romanian-suspects-charged-hacking-metropolitan-police-department-surveillance-cameras (accessed on
21 August 2020).
18. Another Supply Chain Mystery: IP Cameras Ship with Malicious Software. Available online: https://
securityledger.com/2016/04/another-supply-chain-mystery-ip-cameras-ship-with-malicious-software/
(accessed on 21 August 2020).
19. Hunker, J.; Probst, C.W. Insiders and Insider Threats—An Overview of Definitions and Mitigation Techniques.
J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2011, 2, 4–27.
20. Widely Used Wireless IP Cameras Open to Hijacking over the Internet, Researchers Say.
Available online: https://www.networkworld.com/article/2165253/widely-used-wireless-ip-cameras-
open-to-hijacking-over-the-internet--researchers-say.html (accessed on 21 August 2020).
21. HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. Available online:
https://www.rapid7.com/globalassets/external/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-
Exposures-and-Vulnerabilities.pdf (accessed on 21 August 2020).
Sensors 2020, 20, 4806 24 of 27
22. This POODLE Bites: Exploiting the SSL 3.0 Fallback. Available online: https://www.openssl.org/~bodo/
ssl-poodle.pdf (accessed on 21 August 2020).
23. Here, Come the XOR ninjas. Available online: https://tlseminar.github.io/docs/beast.pdf (accessed on
21 August 2020).
24. Tekeoglu, A.; Tosun, A.S. Investigating security and privacy of a cloud-based wireless IP camera: NetCam.
In Proceedings of the 2015 24th International Conference on Computer Communication and Networks
(ICCCN), Las Vegas, NV, USA, 3–6 August 2015; pp. 1–6.
25. Schuster, R.; Shmatikov, V.; Tromer, E. Beauty and the burst: Remote identification of encrypted video
streams. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC,
Canada, 16–18 August 2017.
26. VideoJak. Available online: http://videojak.sourceforge.net/index.html (accessed on 21 August 2020).
27. Guri, M.; Zadov, B.; Elovici, Y. LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the
(small) Hard Drive LED. In Proceedings of the International Conference on Detection of Intrusions and
Malware, and Vulnerability Assessment, Bonn, Germany, 6–7 July 2017; pp. 161–184.
28. DoS Attack with hPing3. Available online: https://linuxhint.com/hping3/ (accessed on 21 August 2020).
29. Kührer, M.; Hupperich, T.; Rossow, C.; Holz, T. Exit from Hell? Reducing the Impact of Amplification DDoS
Attacks. In Proceedings of the USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014;
pp. 111–125.
30. Backdoor in Sony Ipela Engine IP Cameras. Available online: https://sec-consult.com/en/blog/2016/12/
backdoor-in-sony-ipela-engine-ip-cameras/ (accessed on 21 August 2020).
31. Social Engineering Attacks. Available online: http://www.jmest.org/wp-content/uploads/
JMESTN42352270.pdf (accessed on 21 August 2020).
32. Pavković, N.; Perkov, L. Social Engineering Toolkit—A systematic approach to social engineering.
In Proceedings of the MIPRO, 34th International Convention, Opatija, Croatia, 23–27 May 2011;
pp. 1485–1489.
33. Chikofsky, E.J.; Cross, J.H. Reverse engineering and design recovery: A taxonomy. IEEE Softw. 1990, 7, 13–17.
[CrossRef]
34. Exploiting Surveillance Cameras. Available online: https://media.blackhat.com/us-13/US-13-
Heffner-Exploiting-Network-Surveillance-Cameras-Like-A-Hollywood-Hacker-Slides.pdf (accessed on
21 August 2020).
35. Shwartz, O.; Mathov, Y.; Bohadana, M.; Elovici, Y.; Oren, Y. Opening Pandora’s Box: Effective Techniques for
Reverse Engineering IoT Devices. In Proceedings of the International Conference on Smart Card Research
and Advanced Applications, Lugano, Switzerland, 13–15 November 2017; pp. 1–21.
36. Swann Song-DVR Insecurity. 2013. Available online: http://console-cowboys.blogspot.com/2013/01/
swann-song-dvr-insecurity.html (accessed on 21 August 2020).
37. Optical Surgery: Implanting a Dropcam. Available online: https://www.defcon.org/images/defcon-22/dc-
22-presentations/Moore-Wardle/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.
pdf (accessed on 21 August 2020).
38. Looking Through the Eyes of China’s Surveillance State. 2018. Available online: https://www.nytimes.
com/2018/07/16/technology/china-surveillance-state.html (accessed on 21 August 2020).
39. Wang, Y.; Bao, T.; Ding, C.; Zhu, M. Face recognition in real-world surveillance videos with deep learning
method. In Proceedings of the 2017 2nd International Conference on Image, Vision and Computing (ICIVC),
Chengdu, China, 2–4 June 2017; pp. 239–243.
40. Ding, C.; Huang, K.; Patel, V.M.; Lovell, B.C. Special issue on Video Surveillance-oriented Biometrics.
Pattern Recognit. Lett. 2018, 107, 1–2. [CrossRef]
41. Li, T.; Chang, H.; Wang, M.; Ni, B.; Hong, R.; Yan, S. Crowded scene analysis: A survey. IEEE Trans. Circuits
Syst. Video Technol. 2015, 25, 367–386. [CrossRef]
42. Piciarelli, C.; Foresti, G.L. Surveillance-Oriented Event Detection in Video Streams. IEEE Intell. Syst. 2011,
26, 32–41, doi:10.1109/MIS.2010.38. [CrossRef]
43. Hampapur, A. Smart video surveillance for proactive security [in the spotlight]. IEEE Signal Process. Mag.
2008, 25, 136–134. [CrossRef]
44. Joshi, K.A.; Thakore, D.G. A survey on moving object detection and tracking in video surveillance system.
Int. J. Soft Comput. Eng. 2012, 2, 44–48.
Sensors 2020, 20, 4806 25 of 27
45. Parekh, H.S.; Thakore, D.G.; Jaliya, U.K. A survey on object detection and tracking methods. Int. J. Innov.
Res. Comput. Commun. Eng. 2014, 2, 2970–2978.
46. Ojha, S.; Sakhare, S. Image processing techniques for object tracking in video surveillance-A survey.
In Proceedings of the 2015 International Conference on Pervasive Computing (ICPC), Pune, India,
8–10 January 2015; pp. 1–6.
47. Paul, P.V.; Yogaraj, S.; Ram, H.B.; Irshath, A.M. Automated video object recognition system. In Proceedings
of the 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India,
21–22 April 2017; pp. 1–5.
48. Sharif, M.; Bhagavatula, S.; Bauer, L.; Reiter, M.K. Accessorize to a crime: Real and stealthy attacks
on state-of-the-art face recognition. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security; Association for Computing Machinery: New York, NY, USA, 2016; pp. 1528–1540.
49. The Batch: Clothes That Thwart Surveillance, DeepMind in the Hot Seat, BERT’s Revenge, Federal AI
Standards. Available online: https://blog.deeplearning.ai/blog/the-batch-clothes-that-thwart-surveillance-
deepmind-in-the-hot-seat-berts-revenge-federal-ai-standards (accessed on 21 July 2020).
50. Chung, J.; Sohn, K. Image-based learning to measure traffic density using a deep convolutional neural
network. IEEE Trans. Intell. Transp. Syst. 2017, 19, 1670–1675. [CrossRef]
51. Zhang, G.; Wang, Y. Machine Learning and Computer Vision-Enabled Traffic Sensing Data Analysis and
Quality Enhancement. In Elsevier’s Data-Driven Solutions to Transportation Problems; Elsevier: Amsterdam,
The Netherlands, 2019; pp. 51–79.
52. Kadim, Z.; Johari, K.M.; Samaon, D.F.; Li, Y.S.; Hon, H.W. Real-Time Deep-Learning Based Traffic Volume
Count for High-Traffic Urban Arterial Roads. In Proceedings of the IEEE 10th Symposium on Computer
Applications & Industrial Electronics (ISCAIE), Penang, Malaysia, 18–19 April 2020; pp. 53–78.
53. The Creation and Detection of Deepfakes: A Survey. Available online: https://arxiv.org/abs/2004.11138
(accessed on 21 August 2020).
54. Valente, J.; Koneru, K.; Cardenas, A. Privacy and security in Internet-connected cameras. In Proceedings of
the 2019 IEEE International Congress on Internet of Things (ICIOT), Milan, Italy, 8–13 July 2019; pp. 173–180.
55. Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer 2017,
50, 80–84. [CrossRef]
56. Researchers Hack Building Control System at Google Australia Office. Available online: https://www.
wired.com/2013/05/googles-control-system-hacked/ (accessed on 22 April 2019).
57. Guri, M.; Bykhovsky, D. aIR-Jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared
(IR). Comput. Secur. 2019, 82, 15–29. [CrossRef]
58. Mirsky, Y.; Doitshman, T.; Elovici, Y.; Shabtai, A. Kitsune: An Ensemble of Autoencoders for Online Network
Intrusion Detection. Netw. Distrib. Syst. Secur. Symp. (Ndss) 2018, 5, 2.
59. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y.
N-baiot—Network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput.
2018, 17, 12–22. [CrossRef]
60. Liu, F.; Koenig, H. A survey of video encryption algorithms. Comput. Secur. 2010, 29, 3–15. [CrossRef]
61. Mitmproxy—An Interactive HTTPS Proxy. Available online: https://mitmproxy.org/ (accessed on
18 June 2020).
62. Bala, R. A Brief Survey on Robust Video Watermarking Techniques. Int. J. Eng. Sci. 2015, 4, 41–45.
63. Arab, F.; Abdullah, S.M.; Hashim, S.Z.M.; Manaf, A.A.; Zamani, M. A robust video watermarking technique
for the tamper detection of surveillance systems. Multimed. Tools Appl. 2016, 75, 10855–10885. [CrossRef]
64. Kumar, P.A.R.; Selvakumar, S. Distributed denial of service attack detection using an ensemble of neural
classifier. Comput. Commun. 2011, 34, 1328–1341. [CrossRef]
65. Kumar, P.A.R.; Selvakumar, S. Detection of distributed denial of service attacks using an ensemble of
adaptive and hybrid neuro-fuzzy systems. Comput. Commun. 2013, 36, 303–319. [CrossRef]
66. Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defense mechanisms against distributed denial of service (DDoS)
flooding attacks. IEEE Commun. Surv. Tutor. 2013, 15, 2046–2069. [CrossRef]
67. Saied, A.; Overill, R.E.; Radzik, T. Detection of known and unknown DDoS attacks using Artificial Neural
Networks. Neurocomputing 2016, 172, 385–393. [CrossRef]
Sensors 2020, 20, 4806 26 of 27
68. Wu, L.; Cao, X. Geo-location estimation from two shadow trajectories. In Proceedings of the 2010 IEEE
Conference on Computer Vision and Pattern Recognition (CVPR), San Francisco, CA, USA, 13–18 June 2010;
pp. 585–590.
69. Li, X.; Xu, W.; Wang, S.; Qu, X. Are You Lying: Validating the Time-Location of Outdoor Images. In Applied
Cryptography and Network Security; Springer: Berlin/Heidelberg, Germany, 2017; pp. 103–123.
70. Garg, R.; Varna, A.L.; Wu, M. Seeing ENF: natural time stamp for digital video via optical sensing and signal
processing. In Proceedings of the 19th ACM International Conference on Multimedia; Association for Computing
Machinery: New York, NY, USA, 2011; pp. 23–32.
71. Rosenfeld, K.; Sencar, H.T. A study of the robustness of PRNU-based camera identification. Media Forensics
Secur. Int. Soc. Opt. Photonics 2009, 7254, 72540M.
72. Mayer, O.; Hosler, B.; Stamm, M.C. Open set video camera model verification. In Proceedings of the ICASSP
2020—2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona,
Spain, 4–8 May 2020; pp. 2962–2966.
73. Khan, P.W.; Byun, Y.C.; Park, N. A Data Verification System for CCTV Surveillance Cameras Using Blockchain
Technology in Smart Cities. Electronics 2020, 9, 484. [CrossRef]
74. López-Valcarce, R.; Romero, D. Defending surveillance sensor networks against data-injection attacks
via trusted nodes. In Proceedings of the 2017 25th European Signal Processing Conference (EUSIPCO),
Kos, Greece, 28 August–2 September 2017; pp. 380–384.
75. Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs. Available online: https:
//arxiv.org/abs/1803.02560 (accessed on 21 August 2020).
76. Pitropakis, N.; Panaousis, E.; Giannetsos, T.; Anastasiadis, E.; Loukas, G. A taxonomy and survey of attacks
against machine learning. Comput. Sci. Rev. 2019, 34, 100199. [CrossRef]
77. Pan, J. Physical Integrity Attack Detection of Surveillance Camera with Deep Learning based Video Frame
Interpolation. In Proceedings of the 2019 IEEE International Conference on Internet of Things and Intelligence
System (IoTaIS), Bali, Indonesia, 5–7 November 2019; pp. 79–85.
78. Using Depth for Pixel-Wise Detection of Adversarial Attacks in Crowd Counting. Available online: https:
//arxiv.org/abs/1911.11484 (accessed on 21 August 2020).
79. Xiao, C.; Deng, R.; Li, B.; Lee, T.; Edwards, B.; Yi, J.; Song, D.; Liu, M.; Molloy, I. Advit: Adversarial frames
identifier based on temporal consistency in videos. In Proceedings of the 2019 IEEE/CVF International
Conference on Computer Vision (ICCV), Seoul, Korea, 27 October–2 November 2019; pp. 3968–3977.
80. Mundra, K.; Modpur, R.; Chattopadhyay, A.; Kar, I.N. Adversarial Image Detection in Cyber-Physical
Systems. In Proceedings of the 1st ACM Workshop on Autonomous and Intelligent Mobile Systems; Association for
Computing Machinery: New York, NY, USA, 2020; pp. 1–5.
81. Tankard, C. Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011, 2011, 16–19.
[CrossRef]
82. Castillo, A.; Tabik, S.; Pérez, F.; Olmos, R.; Herrera, F. Brightness guided preprocessing for automatic
cold steel weapon detection in surveillance videos with deep learning. Neurocomputing 2019, 330, 151–161.
[CrossRef]
83. Muhammad, K.; Ahmad, J.; Mehmood, I.; Rho, S.; Baik, S.W. Convolutional neural networks based fire
detection in surveillance videos. IEEE Access 2018, 6, 18174–18183. [CrossRef]
84. Amazon’s Automated Grocery Store of the Future Opens Monday. 2018. Available online:
https://www.reuters.com/article/us-amazon-com-store/amazons-automated-grocery-store-of-the-
future-opens-monday-idUSKBN1FA0RL (accessed on 21 August 2020).
85. Ding, C.; Tao, D. Trunk-branch ensemble convolutional neural networks for video-based face recognition.
IEEE Trans. Pattern Anal. Mach. Intell. 2018, 40, 1002–1014. [CrossRef] [PubMed]
86. Ribeiro, M.; Lazzaretti, A.E.; Lopes, H.S. A study of deep convolutional auto-encoders for anomaly detection
in videos. Pattern Recognit. Lett. 2018, 105, 13–22. [CrossRef]
87. Evtimov, I.; Eykholt, K.; Fernandes, E.; Kohno, T.; Li, B.; Prakash, A.; Rahmati, A.; Song, D.
Robust physical-world attacks on deep learning models. In Proceedings of the 2018 IEEE/CVF Conference
on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–23 June 2018.
88. Goswami, G.; Ratha, N.; Agarwal, A.; Singh, R.; Vatsa, M. Unravelling robustness of deep learning based
face recognition against adversarial attacks. In Proceedings of the Thirty-Second AAAI Conference on
Artificial Intelligence (AAAI-18), New Orleans, LA, USA, 2–7 February 2018.
Sensors 2020, 20, 4806 27 of 27
89. Tambe, A.; Aung, Y.L.; Sridharan, R.; Ochoa, M.; Tippenhauer, N.O.; Shabtai, A.; Elovici, Y. Detection
of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. In Proceedings of the Ninth ACM
Conference on Data and Application Security and Privacy, Dallas, TX, USA, 25–27 March 2019.
90. Wampler, C. Information Leakage in Encrypted IP Video Traffic. Ph.D. Thesis, Georgia Institute of
Technology, Atlanta, GA, USA, 2014.
91. Game of Drones-Detecting Streamed POI from Encrypted FPV Channel. Available online: https://arxiv.org/
abs/1801.03074 (accessed on 21 August 2020).
c 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).