Security Analysis of Urban Video Surveillance Systems: Vulnerabilities and Protection Strategies
- Authors: Israfilov A.1, Sitnikov P.R.2, Sokolov A.D.2, Ishankhonov A.Y.3, Blagova I.Y.4
-
Affiliations:
- Researcher
- Bauman Moscow State Technical University
- The National University of Science and Technology MISIS
- Peter the Great St.Petersburg Polytechnic University
- Issue: Vol 14, No 2 (2024)
- Pages: 7-31
- Section: Articles
- Published: 30.06.2024
- URL: https://bakhtiniada.ru/2328-1391/article/view/299597
- DOI: https://doi.org/10.12731/2227-930X-2024-14-2-292
- EDN: https://elibrary.ru/ZXCGYP
- ID: 299597
Cite item
Full Text
Abstract
In the era of digitalization of urban spaces, video surveillance systems play a key role in ensuring public safety. However, vulnerabilities in the software and hardware of these systems can lead to serious privacy and security breaches. The importance of this topic is due to the growing number of cyber attacks and data leaks, the targets of which are often urban infrastructure.
Purpose. The main aim of this article is to analyze the vulnerabilities of video surveillance systems in the context of urban infrastructure, as well as to identify potential risks to data security and personal privacy. The article seeks to identify weaknesses in technologies and offer recommendations for eliminating them.
Methodology. The analysis used methods for analyzing data on violations in video surveillance systems over the past five years and a review of modern technologies: Study of modern encryption methods and practices of regular software updates aimed at minimizing risks.
Results. The study showed that most video surveillance systems are vulnerable to medium-level attacks. The most common vulnerabilities are related to insufficient data encryption and outdated software. As a result of the analysis, proposals were developed to strengthen data protection, including regular software updates and the use of multi-level authentication and encryption systems.
Practical implications. The findings and recommendations for strengthening surveillance systems can be applied across various sectors of urban infrastructure, including public transportation, municipal institutions, and commercial facilities. The implementation of these recommendations is particularly critical for locations with high foot traffic and elevated security requirements, such as schools, hospitals, and shopping centers. Effective adoption of the proposed encryption technologies and enhanced security measures will help prevent not only data breaches but also potential acts of terrorism or other security threats to citizens.
About the authors
Anar Israfilov
Researcher
Author for correspondence.
Email: israfilov_anar@ro.ru
ORCID iD: 0009-0004-5760-9631
individual researcher
Russian FederationPavel R. Sitnikov
Bauman Moscow State Technical University
Email: sitnikov_p@mail.ru
ORCID iD: 0009-0000-0960-4108
bachelor’s degree
Russian Federation, 5, 2nd Baumanskaya Str., Moscow, 105005, Russian FederationAleksandr D. Sokolov
Bauman Moscow State Technical University
Email: sokolov_alex@mail.ru
ORCID iD: 0009-0002-7336-9573
bachelor’s degree
Russian Federation, 5, 2nd Baumanskaya Str., Moscow, 105005, Russian FederationAzizkhon Yu. Ishankhonov
The National University of Science and Technology MISIS
Email: ishanaziz@ya.ru
ORCID iD: 0009-0009-8934-6289
master’s degree
Russian Federation, 4, Leninskiy Prospekt, Moscow, 119049, Russian FederationIrina Yu. Blagova
Peter the Great St.Petersburg Polytechnic University
Email: blagovairina@ya.ru
ORCID iD: 0000-0002-2418-1702
PhD, Associate Professor
Russian Federation, 29, Politekhnicheskaya Str., St. Petersburg, 195251, Russian FederationReferences
- Video Surveillance Market Size & Share Analysis - Growth Trends & Forecasts (2024-2029). URL: https://www.mordorintelligence.com/industry-reports/video-surveillance-systems-market (accessed 05.04.2024)
- Surveillance camera statistics / Surveillance Studies. URL: https://www.comparitech.com/vpn-privacy/the-worlds-most-surveilled-cities/ (accessed 02.04.2024).
- IAA TelecomDaily: IA market can grow twice / Information and Analytical Agency “Telecom-Daily”. URL: https://telecomdaily.ru/news/2022/06/16/iaa-telecomdaily-v-2023-rynok-va-mozhet-vyrasti-v-dva-raza/ (accessed 09.04.2024)
- Gubeev E.P. Prospects for the development of urban infrastructure to improve the quality of life. Vestnik nauki, 2023, no. 7 (64), pp. 245-266.
- Popular CCTV Camera Brands - JVSG Ratings. URL: https://www.jvsg.com/ipica-ratings/ (accessed 09.04.2024)
- Kaliuta K. Integration of AI for Routine Tasks Using Salesforce. Asian Journal of Research in Computer Science, 2023, vol. 16(3), pp. 119-127.
- IP Camera Market by Component (Hardware, Services), Product Type (Fixed, Pan-Tilt-Zoom (PTZ), Infrared), Connection Type (Consolidated, Distributed), Application (Residential, Commercial, Government), and Region 2024-2032. URL: https://www.imarcgroup.com/ip-camera-market#:~:text=The%20global%20IP%20camera%20market,key%20factors%20driving%20the%20market (accessed 08.04.2024)
- Speed camera statistics. URL: https://www.scdb.info/en/stats/ (accessed 08.04.2024)
- Frolova E. Y., Koshlykova Y.A. Human identification by biometric data: a review of modern technologies. North Caucasian Legal Bulletin, 2022, no. 3, pp. 167-174.
- Kosmacheva, I.M.; Kuchin, I.Yu.; Davidyuk, N.V.; Rudenko, M.F.; Lobeiko, V.I.; Sibikina, I.V. Event monitoring system for automated incident detection. Bulletin of Astrakhan State Technical University. Series: Management, Computer Science and Informatics, 2023, no. 3, pp. 76-86.
- Nakiev R.R., Ulyanov V.V. Analysis of the Internet of Things (IoT) vulnerabilities and ways to prevent them. Vestnik nauki, 2023, vol. 4, no. 7 (64), pp. 250-264.
- RCE Vulnerability in Hikvision Cameras. URL: https://www.cisa.gov/news-events/alerts/2021/09/28/rce-vulnerability-hikvision-cameras-cve-2021-36260 (accessed 11.04.2024)
- USN-5889-1: ZoneMinder vulnerabilities / Linux. URL: https://www.linuxcompatible.org/story/usn58891-zoneminder-vulnerabilities/ (accessed 11.04.2024)
- CyberTogs of 2022 according to Informzaschita. URL: https://www.infosec.ru/press-center/news/kiberitogi-2022-goda-po-versii-informzashchity/ (accessed 02.04.2024)
- Israfilov A. Cyberattacks: the scale and possible consequences of viruses created by hackers for computers and phones. Trends in the development of science and education, 2024, no. 106(11), pp. 48-52.
- Yakovishin A.D. Combating the interception of RFID and remote control traffic: methods of protection and security enhancement. Modern Scientific Research and Innovations, 2024, no. 1. https://web.snauka.ru/issues/2024/01/101405
- Security startup Verkada hack exposes 150,000 security cameras in Tesla factories, jails, and more / Verkada. URL: https://www.theverge.com/2021/3/9/22322122/verkada-hack-150000-security-cameras-tesla-factory-cloudflare-jails-hospitals (accessed 02.04.2024)
- Number of households with smart security cameras worldwide from 2016 to 2027 / Statista. URL: https://www.statista.com/forecasts/1301193/worldwide-smart-security-camera-homes (accessed 12.04.2024)
- Amazon Quickly Fixed a Vulnerability in Ring Android App That Could Expose Users' Camera Recordings / Checkmarx. URL: https://www.statista.com/forecasts/1301193/worldwide-smart-security-camera-homes (accessed on 12.04.2024)
- U.S. Department of Justice Disrupts Hive Ransomware Variant. URL: https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant (accessed 05.04.2024)
- Russia has learned to protect intelligent video surveillance systems from cyberattacks / National portal in the field of artificial intelligence. URL: https://ai.gov.ru/mediacenter/v-rossii-nauchilis-zashchishchat-sistemy-intellektualnogo-videonablyudeniya-ot-kiberatak/ (accessed 05.04.2024)
- Gerasimov A. S. Main problems of information network security and options to combat them. Actual researches, 2022, no. 40 (119). https://apni.ru/article/5662-osnovnie-problemi-informatsionnoj-setevoj-bez
- Man Wrongfully Arrested Because Face Recognition Can't Tell People Apart / Aclu Press Releases. URL: https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant (accessed 12.04.2024)
- More than one million cameras installed in Russia for security surveillance / National portal in the field of artificial intelligence. URL: https://ai.gov.ru/mediacenter/glava-mintsifry-maksut-shadaev-zayavil-chto-kazhdaya-tretya-kamera-sledyashchaya-za-bezopasnostyu-v-/ (accessed 08.04.2024)
- Grepan V. Theoretical and practical foundations of smart contract validation. Innovacionnaya nauka, 2024, no. 3-2, pp. 24-28.
- ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection. URL: https://www.iso.org/standard/27001 (accessed 13.04.2024)
- Kotlyarova E. V., Volokhova E. A. Architectural and urban planning features of redevelopment of former industrial zones on the example of Canary Wharf in London. Digitalization: new trends and experience of implementation: a collection of articles, 2023, p. 128.
Supplementary files
