Vulnerability Analysis of IP Cameras Using ARP Poisoning

T. Doughty, N. Israr, U. Adeel
{"title":"Vulnerability Analysis of IP Cameras Using ARP Poisoning","authors":"T. Doughty, N. Israr, U. Adeel","doi":"10.5121/CSIT.2019.90712","DOIUrl":null,"url":null,"abstract":"Internet Protocol (IP) cameras and Internet of Things (IoT) devices are known for their vulnerabilities, and Man in the Middle attacks present a significant privacy and security concern. Because the attacks are easy to perform and highly effective, this allows attackers to steal information and disrupt access to services. We evaluate the security of six IP cameras by performing and outlining various attacks which can be used by criminals. A threat scenario is used to describe how a criminal may attack cameras before and during a burglary. Our findings show that IP cameras remain vulnerable to ARP Poisoning or Spoofing, and while some cameras use Digest Authentication to obfuscate passwords, some vendors and applications remain insecure. We suggest methods to prevent ARP Poisoning, and reiterate the need for good password policy.","PeriodicalId":383682,"journal":{"name":"8th International Conference on Soft Computing, Artificial Intelligence and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference on Soft Computing, Artificial Intelligence and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/CSIT.2019.90712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Internet Protocol (IP) cameras and Internet of Things (IoT) devices are known for their vulnerabilities, and Man in the Middle attacks present a significant privacy and security concern. Because the attacks are easy to perform and highly effective, this allows attackers to steal information and disrupt access to services. We evaluate the security of six IP cameras by performing and outlining various attacks which can be used by criminals. A threat scenario is used to describe how a criminal may attack cameras before and during a burglary. Our findings show that IP cameras remain vulnerable to ARP Poisoning or Spoofing, and while some cameras use Digest Authentication to obfuscate passwords, some vendors and applications remain insecure. We suggest methods to prevent ARP Poisoning, and reiterate the need for good password policy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
IP摄像机ARP中毒漏洞分析
互联网协议(IP)摄像机和物联网(IoT)设备以其漏洞而闻名,中间人攻击带来了重大的隐私和安全问题。由于攻击容易执行且非常有效,因此攻击者可以窃取信息并中断对服务的访问。我们通过执行和概述犯罪分子可能使用的各种攻击来评估六个IP摄像机的安全性。威胁场景用于描述犯罪分子在入室行窃之前和期间如何攻击摄像头。我们的研究结果表明,IP摄像机仍然容易受到ARP中毒或欺骗,虽然一些摄像机使用摘要认证来混淆密码,但一些供应商和应用程序仍然不安全。我们提出了防止ARP中毒的方法,并重申需要良好的密码策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
HMM-Based Dari Named Entity Recognition for Information Extraction An Approach to Tracking Problem for Linear Control System Via Invariant Ellipsoids Method A Comparative Mention-Pair Models for Coreference Resolution in DARI Language for Information Extraction A Machine Learning Algorithm in Automated Text Categorization of Legacy Archives Vulnerability Analysis of IP Cameras Using ARP Poisoning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1