寻找隐藏的智能摄像头:基于网络流的智能摄像头分析和检测 (ICC' 19)

李白杨  朱宇佳  刘庆云  周舟  郭莉 



Nowadays, the rapid growth of cloud computing and IoT enabled services among multiple organizations bring both promising prospects and security & privacy challenges. IP cameras have become a top target for hackers because of their relatively high computing power and good internet traffic throughput. To understand the risks of these threats requires learning about IP cameras–where are they, how many are there? Active scanning is considered to be an effective way, like SHODAN. However, deployment of smart cameras in the network address translation (NAT) environments with dynamic locations is usually desired. To find these Invisible Cameras, CAMHUNTER: (i) introduces three statements of smart cameras when they are online, (ii) concludes the most popular smart cameras in China have very similar communication patterns, (iii) proposes a model to detect smart cameras in a passive way constructed by nineteen feature sets, and (iv) raises the alarms for the IoT manufacturers. Our real-world experiments demonstrate the effectiveness of CAMHUNTER on finding smart cameras even if they are NAT-behind and using encrypted connections like TLS or private protocol. We argue that CAMHUNTER represents an important view of IoT security and privacy, and it can guide the effort of designing and protecting smart cameras.




首页
团队介绍
发展历史
组织结构
MESA大事记
新闻中心
通知
组内动态
科研成果
专利
论文
项目
获奖
软著
人才培养
MESA毕业生
MESA在读生
MESA员工
招贤纳士
走进MESA
学长分享
招聘通知
招生宣传
知识库
文章
地址:北京市朝阳区华严北里甲22号楼五层 | 邮编:100029
邮箱:nelist@iie.ac.cn
京ICP备15019404号-1