skip to main content
10.1145/3605423.3605447acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicctaConference Proceedingsconference-collections
research-article

Exploring the Attacks, Impacts, and Mitigations in a Real-Time Streaming Protocol Service of IP Cameras

Published:20 August 2023Publication History

ABSTRACT

The constant need for security has paved the way for the use of IP Cameras and CCTVs. Given that everyone now has an internet, IP cameras have become more popular as it allows Real-Time Streaming Protocol (RTSP) which grants the user video and audio streaming over the internet. This allows for pausing, playing, and recording video and audio data for later usage. Despite its popularity, RTSP has multiple vulnerabilities which pose a security risk for its users. Although multiple studies are exploring these risks, there is a lack of understanding about the specific ways that these vulnerabilities are exploited. This paper discussed the possible specific attacks, impacts, and mitigations that could occur on an RTSP-enabled IP Camera. Based on the gathered studies, four vulnerabilities were found: (1) Unencrypted URL of the Streaming Server; (2) Unencrypted User Account, Wi-Fi, and RTSP credentials; (3) Unsecured System and Lack of Security Measures for Input Validations for RTSP requests; and (4) Improper Quality Assurance of Firmwares. These vulnerabilities lead to attacks such as Packet Sniffing, Man in the Middle Attacks, Denial of Service, and Brute Force Dictionary Attacks. Additionally, the impacts of these attacks were explored as well, such as loss and theft of data, service disruption, and brand reputational risks. Mitigations for these attacks and exploited vulnerabilities include the following: Utilizing OpenSSL to provide encryption and authentication of data over the networks, Implementing Cryptography-based APIs in the system development, Implementing an Access Control List to control authentication, changing default passwords to strong passwords, updating softwares and firmwares to ensure patches are applied, and making use of secure authentication modules that implement hashing algorithms, QR codes, and other authentication values.

References

  1. Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, and Yuval Elovici. 2020. The Security of IP-Based Video Surveillance Systems. Sensors 20, 17 (August 2020), 4806. DOI:https://doi.org/10.3390/s20174806Google ScholarGoogle ScholarCross RefCross Ref
  2. Pietro Biondi, Stefano Bognanni, and Giampaolo Bella. 2021. Vulnerability Assessment and Penetration Testing on IP camera. In 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), IEEE, Gandia, Spain, 1–8. DOI:https://doi.org/10.1109/IOTSMS53705.2021.9704890Google ScholarGoogle ScholarCross RefCross Ref
  3. Schulzrinne, H., Rao, A., Lanphier, R., Westerlund, M., Ericsson, & Stiemerling, M. (2011). Real-Time Streaming Protocol Version 2.0. RFC 7826. Retrieved from https://www.rfc-editor.org/rfc/rfc7826.htmlGoogle ScholarGoogle Scholar
  4. Gradimirka Popovic, Nebojsa Arsic, Branimir Jaksic, Boris Gara, and Mile Petrovic. 2013. Overview, Characteristics and Advantages of IP Camera Video Surveillance Systems Compared to Systems with other Kinds of Camera. International Journal of Engineering Science and Innovative Technology (IJESIT) 2, 5 (2013).Google ScholarGoogle Scholar
  5. Wayne Hahne. 2022. What is the difference between an IP camera and CCTV? A1SecurityCameras. Retrieved from https://www.a1securitycameras.com/blog/what-is-the-difference-between-an-ip-camera-and-cctv/Google ScholarGoogle Scholar
  6. Yogeesh Seralathan, Tae Tom Oh, Suyash Jadhav, Jonathan Myers, Jaehoon Paul Jeong, Young Ho Kim, and Jeong Neyo Kim. 2018. IoT security vulnerability: A case study of a Web camera. In 2018 20th International Conference on Advanced Communication Technology (ICACT), IEEE, Chuncheon-si Gangwon-do, Korea (South), 172–177. DOI:https://doi.org/10.23919/ICACT.2018.8323686Google ScholarGoogle ScholarCross RefCross Ref
  7. A. O. Prokofiev, Y. S. Smirnova, and D. S. Silnov. 2017. Examination of cybercriminal behaviour while interacting with the RTSP-Server. In 2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), IEEE, Saint Petersburg, Russia, 1–4. DOI:https://doi.org/10.1109/ICIEAM.2017.8076437Google ScholarGoogle ScholarCross RefCross Ref
  8. Bitdefender. 2015. Remote Exploitation of the NeoCoolcam IP Cameras and Gateway. Retrieved from https://www.bitdefender.com/files/News/CaseStudies/study/165/Bitdefender-Whitepaper-NeoCoolCam.pdfGoogle ScholarGoogle Scholar
  9. Alexander Manske. 2019. Conducting a Vulnerability Assessment of an IP Camera. Retrieved from https://www.diva-portal.org/smash/get/diva2:1336667/FULLTEXT01.pdfGoogle ScholarGoogle Scholar
  10. James Walden and Northern Kentucky University. 2020. The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL. (2020).Google ScholarGoogle Scholar
  11. Preethi Vennam, T C Pramod, B M Thippeswamy, and Yong-guk Kim. 2021. applied sciences Attacks and Preventive Measures on Video Surveillance Systems: A Review. (2021).Google ScholarGoogle Scholar
  12. Thomas Doughty, Nauman Israr, and Usman Adeel. 2019. Vulnerability Analysis of IP Cameras Using ARP Poisoning. In 8th International Conference on Soft Computing, Artificial Intelligence and Applications, Aircc Publishing Corporation, 163–172. DOI:https://doi.org/10.5121/csit.2019.90712Google ScholarGoogle ScholarCross RefCross Ref
  13. M. Yıldırım and I. Mackie. 2019. Encouraging users to improve password security and memorability. Int. J. Inf. Secur. 18, 6 (December 2019), 741–759. DOI:https://doi.org/10.1007/s10207-019-00429-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  14. Devang Thakar and Hepi Suthar. 2020. Mitigation for Brute Force Attack against IP/CCTV Camera Login. Ijraset 8, III (2020).Google ScholarGoogle Scholar

Index Terms

  1. Exploring the Attacks, Impacts, and Mitigations in a Real-Time Streaming Protocol Service of IP Cameras
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCTA '23: Proceedings of the 2023 9th International Conference on Computer Technology Applications
        May 2023
        270 pages
        ISBN:9781450399579
        DOI:10.1145/3605423

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 August 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)42
        • Downloads (Last 6 weeks)7

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format