Abstract
Internet Protocol (IP) cameras have become virtually omnipresent for organizations, businesses, and personal users across the world, for the purposes of providing physical security, increasing safety, and preventing crime. However, recent studies suggest that IP cameras contain less than ideal security and could be easily exploited by miscreants to infringe user privacy and cause even bigger threats. In this study, we focus on the IP cameras without any password protection. We conduct a large-scale empirical investigation of such IP cameras based on insecam.org, an online directory of IP cameras, which claims to be the largest one in the world. To this end, we have monitored the site and studied its dynamics with daily data collection over a continuous period of 18 days. We compute daily number of active IP cameras and new cameras on the site, and infer people’s usage habit of IP cameras. In addition, we perform a comprehensive characteristic analysis of IP cameras in terms of the most used TCP/UDP ports, manufactures, installation location, ISPs, and countries. Furthermore, we explore other possibly existing security issues with those cameras in addition to no password protection. We utilize an IP scanning tool to discover the hidden hosts and services on the internal network where a vulnerable IP camera is located, and then perform a vulnerability analysis. We believe our findings can provide valuable knowledge of the threat landscape that IP cameras are exposed to.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
There are 39 different timezones currently in use in the world [6].
- 2.
Active IP cameras refer to the IP cameras whose video feeds are accessible online.
References
Angry IP Scanner. http://angryip.org/
Apache web server CVE vulnerabilities. https://goo.gl/FaWh8y
Boa (web server): https://goo.gl/6d251V
Breaking Down Mirai: An IoT DDoS Botnet Analysis. https://goo.gl/7VcfMh
DB-IP: IP Geolocation and Network Intelligence. https://db-ip.com/
How Many Time Zones Are There? https://goo.gl/fWwFxQ
Insecam - World biggest online cameras directory. http://www.insecam.org/
Insecam Displays Unsecured Webcams Worldwide. https://goo.gl/hBqpni
The Botnet That Broke the Internet Isn’t Going Away. https://goo.gl/VqFi7f
Webcam ‘creepshot’ pictures shared on Reddit. https://goo.gl/ffKtTK
Website spies on thousands of people. https://goo.gl/SdbVcc
Albrecht, K., Mcintyre, L.: Privacy nightmare: when baby monitors go bad [opinion]. IEEE Technol. Soc. Mag. 34(3), 14–19 (2015)
Amokrane, A.: Internet of things: security issues, challenges and directions. In: C&ESAR 2016, p. 70 (2016)
Antonakakis, M., et al.: Understanding the mirai botnet. In: USENIX Security 2017 (2017)
Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. arXiv preprint arXiv:1705.06805 (2017)
Campbell, W.: Security of internet protocol cameras-a case example (2013)
Costin, A.: Security of CCTV and video surveillance systems: threats, vulnerabilities, attacks, and mitigations. In: TrustED, pp. 45–54. ACM (2016)
Rotenberg, N., Shulman, H., Waidner, M., Zeltser, B.: Authentication-bypass vulnerabilities in SOHO routers. In: SIGCOMM Posters and Demos (2017)
Stanislav, M., Beardsley, T.: Hacking IoT: a case study on baby monitor exposures and vulnerabilities. Rapid 7 (2015)
Acknowledgement
We would like to thank our shepherd Mark Gondree and anonymous reviewers for their insightful and detailed comments. This work was partially supported by Microsoft Research Asia, CCF-NSFOCUS Kunpeng Research Fund, and Alipay Research Fund. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies. The co-author F. Xu is the contact author.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Xu, H., Xu, F., Chen, B. (2018). Internet Protocol Cameras with No Password Protection: An Empirical Investigation. In: Beverly, R., Smaragdakis, G., Feldmann, A. (eds) Passive and Active Measurement. PAM 2018. Lecture Notes in Computer Science(), vol 10771. Springer, Cham. https://doi.org/10.1007/978-3-319-76481-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-76481-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76480-1
Online ISBN: 978-3-319-76481-8
eBook Packages: Computer ScienceComputer Science (R0)