DOI QR코드

DOI QR Code

The Analysis of CCTV Hacking and Security Countermeasure Technologies: Survey

CCTV 해킹에 대한 분석 및 보안 대응책 연구: 서베이

  • Hong, Sunghyuck (Div. of Information and Communication, Baekseok University) ;
  • Jeong, Sae-Young (Div. of Civil-Engineering Education, Chungnam National University)
  • 홍성혁 (백석대학교, 정보통신학부) ;
  • 정세영 (충남대학교, 건설공학교육과)
  • Received : 2018.10.02
  • Accepted : 2018.12.20
  • Published : 2018.12.31

Abstract

This is about the CCTV hacking which is one of the recently emerging privacy-spilling crime. Recently, the usage of CCTV is being increased, and Black Hat Hackers spill the individual's privacy by hacking it. However, That crime is being increased. However, most users rarely fulfill the security management, and the government's measures are insufficient. Therfore, this research report implies some security technologies including user authentication protocols such as SSH Tunneling and Media Encryption Algorithm. and recently developed technologies including Wookyeong Information Technology's SecuWatcher for CCTV, Norma's CCTV Care App, and MarkAny's Password SAFERTM for CCTV.

최근 부각되고 있는 사생활유출범죄 유형 중 CCTV 해킹을 이용한 범행에 대한 것이다. 요즘 CCTV를 사용이 증가함에 따라 악의적인 해커들은 CCTV를 사생활유출수단으로써 이용하고 있다. 그러나 이러한 CCTV 해킹을 통한 범죄가 늘어나고 있는 반면 일반 사용자들의 보안의식 수준은 현저히 낮았고, 국가적 차원에서의 대응 대책 또한 부실한 상황이다. 따라서 이번 연구논문을 통해 CCTV 해킹을 방지할 수 있는 여러 보안기술에는 중 사용자 인증 프로토콜, SSH 터널링을 통한 원격접속, 미디어 암호화 알고리즘 등을 소개하고, 최근에 출시된 기술로는 우경정보기술사의 SecuWatcher for CCTV, 노르마사의 CCTV Care 앱, 마크애니사의 Password SAFERTM for CCTV 등을 분석하여 대응책을 제시하여 CCTV 해킹으로부터 피해를 줄이기 위한 제안을 하였다.

Keywords

JKOHBZ_2018_v8n6_129_f0001.png 이미지

Fig. 1. Shodan Homepage

JKOHBZ_2018_v8n6_129_f0002.png 이미지

Fig. 2. IoT Home CCTV

JKOHBZ_2018_v8n6_129_f0003.png 이미지

Fig. 3. Procedure of User Authentication Protocol

JKOHBZ_2018_v8n6_129_f0004.png 이미지

Fig. 4. SSH Tunneling System

JKOHBZ_2018_v8n6_129_f0005.png 이미지

Fig. 5. Algorithm for Detecting bytes to encrypt

Table 1. NAL unit type Classes

JKOHBZ_2018_v8n6_129_t0001.png 이미지

References

  1. M. C. Yim. (2018. 10. 10.). Congressman Seong-Jung Park says "Most of the CCTV Hacking is Defenseless state". ZDNetKorea. .http://www.zdnet.co.kr/news/news_view.asp?artice_id=20181010140028&type=det&re=zdk
  2. Y. S. Go. (2016. 2.). Study of Security vulnerability IOT device IP exposure threat prevention system.. Bukyeong National University, Busan.
  3. J. Y. Byeon. (2017). 'IP camera' hacked 'clumsy'... Clear outflow immediately. Sanup News. http://www.kidd.co.kr/news/199010
  4. K. T. Lee. (2018. 8. 22). Chinese CCTV Hackes Korean Privacy. Digital Times. http://www.dt.co.kr/contents.html?article_no=2018082302100351041002&ref
  5. B. S. Jeon & H. C. Yang. (2018). Chinese CCTV hacking is defenseless. MBN News. http://www.mbn.co.kr/pages/vod/programView.mbn?bcastSeqNo=1194180
  6. T. S. Park. (2011). Design and Implementation User Authentication Protocol to Prevent Malicious User in IP CCTV Enviornment. Sungsil University, Seoul.
  7. G. J. Hwang, J. P. Park & S. M. Yang. (2016). Security Technique using SSH Tunneling for CCTV Remote Access. Sungsil University, Seoul.
  8. S. C. Hwang. (2012). Development of Media Crypto Algorithm for anti-hacking into CCTV. Indeok University, Seoul.
  9. N. I. Heo. (2017). CCTV Video Hacking Protection Solution "SECUWATCHER". Money Today. http://news.mt.co.kr/mtview.php?no=2017121109240835573
  10. N. I. Heo. (2018). Norma released CCTV Security App "CCTV Care". ETNews. http://www.etnews.com/20180717000198
  11. S. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. DOI : 10.15207/jkcs.2017.8.2.021
  12. G. W. Lee. (2012). A Study on Public Institutions CCTV Information Security Management System. Dankook University, Yongin.
  13. S. Hong. (2014). Analysis of DDoS Attack and Countermeasure: Survey. The Journal of Digital Policy and Management, 12(1), 423-429. DOI : 10.14400/jdpm.2014.12.1.423
  14. S. Hong. (2013). Disconnection of Wireless LAN Attack and Countermeasure. The Journal of Digital Policy and Management, 11(12), 453-458. DOI : 10.14400/jdpm.2013.11.12.453