A Case Study of IP Camera Monitoring Traffic Verification

Reem Alshalawi, Mohamed Osama Khozium


Technology takes apart of our daily life, it also became a confidant of our privacysuch as thesurveillance camera which is available everywhere andits presence has prevented many cases of robberies and crimes.

Despite the wide spread of IP camera, a serious drawback is present in it, where there is the probability of being hacked and therefore there will always be the fear of being under threat.

In this paper, the IP camera traffic will be monitored to detect if there is any attack that stopped the  camera from work, we proposean algorithm that splits the IP camera traffic into a set of streams, then calculates the time difference and its mean for each stream to determine whether the camera is attacked or not.

After calculating the standard deviation which affects positively on reducing the false alarm, the results showed high accuracy which reflects higher level in security and more confidence inIP camera performance.

Full Text:



V. Memos, K. Psannis, Y. Ishibashi, B. Kim and B. Gupta, "An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework", Future Generation Computer Systems, vol. 83, pp. 619-628, 2018.

R. Alshalawi and T. Alghamdi, "Forensic tool for wireless surveillance camera", 2017 19th International Conference on Advanced Communication Technology (ICACT), 2017.

I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz and J. Lopez, "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services", IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3453-3495, 2018.

GradimirkaPopovic , NebojsaArsic , BranimirJaksic , Boris Gara , Mile Petrovic, "Overview, Characteristics and Advantages of IP Camera Video Surveillance Systems Compared to Systems with other Kinds of Camera", International Journal of Engineering Science and Innovative Technology (IJESIT), vol. 2, no. 5, 2013.

A. Sivanathan, H. HabibiGharakheili, F. Loi, A. Radford, C. Wijenayake, A. Vishwanath and V. Sivaraman, "Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics", IEEE Transactions on Mobile Computing, pp. 1-1, 2018.

Y. Gu, M. Kim, H. Lee and O. Choi, "Design and Implementation of UPnP-Based Surveillance Camera System for Home Security", IEEE, 2013.

I. A Hamid, N. AbSukor, C. MohdFoozy and Z. Abdullah, "Network Monitoring System To Detect Unauthorized Connection", Acta Electronica Malaysia, vol. 1, no. 2, pp. 13-16, 2017.

P. Billquist, D. Sodman, G. Garbutt, M. Nadler and C. Shanklin, "Method and device for monitoring data traffic and preventing unauthorized access to a network", us20020133586, 2018.

X. Ji, Y. Cheng, W. Xu and X. Zhou, "User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes", Security and Communication Networks, vol. 2018, pp. 1-10, 2018.

G. Kumar, K. Ahmad, A. Kumar Saurabh and M. Doja, "Data Prevention from Unauthorized Access by Unclassified Attack in Data Warehouse", International Conference on Computing for Sustainable Global Development, 2014.

E. AbdAllah, M. Zulkernine and H. Hassanein, "Preventing unauthorized access in information centric networking", Security and Privacy, vol. 1, no. 4, p. e33, 2018.

D. Tran, K. Warmerdam, T. Lim, R. MacPherson and B. Singh, "Managing tethered data traffic over a hotspot network", 2015.

M. Masoud, Y. Jaradat and I. Jannoud, "On Detecting Wi-Fi Unauthorized Access Utilizing Software Define Network (SDN) and Machine Learning Algorithms", International Review on Computers and Software (IRECOS), vol. 12, no. 1, p. 21, 2017.

"UIP-IHF1028-B10 - UXD Technologies Ltd.", UXD Technologies Ltd., 2018. [Online]. Available: http://www.uxdsecurity.com/product-detail/uib-ihf1028-b10/. [Accessed: 09- Dec- 2018].

Mohamed Osama Khozium, “Hello Flood Counter Measure for Wireless Sensor Net works”, International Journal of Computer Science and Security, volume (2) issue (3), may-june 2008.

DOI: https://doi.org/10.23956/ijarcsse.v8i12.924


  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.