Cybersecurity technology for video surveillance systems based on the HIKVISION solution

DOI: 10.31673/2409-7292.2021.034248

Authors

  • Д. Р. Колісник, (Kolisnyk D. R.) State University of Telecommunications, Kyiv
  • І. В. Ліщук, (Lishchuk I. V.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2021.034248

Abstract

The study and analysis of the problem of ensuring the protection of video surveillance systems, the essence of the tasks of their protection. The existing technologies of protection of video surveillance systems are analyzed. The technology of providing protection of video surveillance systems on the basis of the Hikvision solution is investigated. The methods and means of protection of the components of the video surveillance system, which are implemented by Hikvision, are determined. The main threats to IP video surveillance systems have been identified. Recommendations for cybersecurity specialists on the application of technology for protection of video surveillance systems at the enterprise have been developed.

Keywords: video surveillance, Hikvision, cybersecurity, protection, Internet of Things.

References
1. Cabasso, J. Analog vs. IP cameras. Aventura Technol. Newsl. 2009, 1, 1–8.
2. Statista. Security & Surveillance Technology Statistics & Facts. Technical Report. 2015. // [Електронний ресурс]. URL: https: //www.statista.com/topics/2646/security-and-surveillance-technology/
3. Mukkamala, S.; Sung, A.H. Detecting denial of service attacks using support vector machines. In Proceedings of the 12th IEEE Int. Conf. on Fuzzy Systems, St. Louis, MO, USA, 25–28 May 2003; pp. 1231–1236.
4. Peeping into 73,000 Unsecured Security Cameras Thanks to Default Passwords. // [Електронний ресурс]. Режим доступу: World Wide Web. – URL: https://www.csoonline.com/article/2844283/peeping-into-73-000-unsecured-security-cameras-thanksto-default-passwords.html
5. Akhtar, N.; Mian, A. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 2018, 6, 14410–14430. // URL: https://ieeexplore.ieee.org/document/8294186
6. Liu, Z.; Peng, D.; Zheng, Y.; Liu, J. Communication protection in IP-based video surveillance systems. In Proceedings of the Seventh IEEE International Symposium on Multimedia, Irvine, CA, USA, 14 December 2005; p. 8.
7. Guri, M.; Elovici, Y. Bridgeware: The air-gap malware. Commun. ACM 2018, 61, 74–82. // [Електронний ресурс]. Режим доступу: World Wide Web. – URL: https://dl.acm.org/doi/10.1145/3177230
8. Liu, F.; Koenig, H. A survey of video encryption algorithms. Comput. Secur. 2010, 29, 3–15. // [Електронний ресурс]. URL: https://www.sciencedirect.com/science/article/pii/S0167404809000698?via%3Dihub
9. Mitmproxy—An Interactive HTTPS Proxy. // [Електронний ресурс]. Режим доступу: World Wide Web. – URL: https://mitmproxy.org/
10. Bala, R. A Brief Survey on Robust Video Watermarking Techniques. Int. J. Eng. Sci. 2015, 4, 41–45.
11. Garg, R.; Varna, A.L.; Wu, M. Seeing ENF: natural time stamp for digital video via optical sensing and signal processing. In Proceedings of the 19th ACM International Conference on Multimedia; Association for Computing Machinery: New York, NY, USA, 2011; pp. 23–32.
12. Колісник Д. Р., Місевич К. С., Коваленко С. В. Системна архітектура IoT-Fog-Cloud для систем аналізу великих даних і кібербезпеки: огляд туманних обчислень, впровадження аудиту інтернету речей // [Електронний ресурс]. – Науковий журнал «Сучасний захист інформації». – Київ, ДУТ. – с. 34-38

Published

2021-11-28

Issue

Section

Articles