Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Defense method for configuring weak password vulnerability of internal and external network camera

A camera and weak password technology, applied in the defense field of weak password vulnerability configuration for internal and external network cameras, can solve the problem of unable to fundamentally eliminate camera monitoring, unable to prevent secondary infection, difficult to determine whether it is infected, etc., to prevent weak passwords. Password scanning, resolving security threats, reducing workload

Inactive Publication Date: 2019-03-19
NANJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the weak password vulnerability of the camera, since the camera password is solidified in the firmware, even if it is restarted, the secondary infection cannot be eliminated. Since the infected camera can still work normally, it is extremely difficult to determine whether it is infected, and if the source of infection cannot be confirmed, it still cannot be confirmed. Fundamentally prevent the camera from being monitored
In view of these circumstances, the defensive measures of this series of cameras are to prohibit the cameras from connecting to the external network, but this cannot meet the requirements such as resource transmission, and there are certain disadvantages
Another defensive measure is to enhance the complex strength of its password, but this method cannot ensure absolute security, nor can it solve the root cause of the continuous scanning damage of infected cameras

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method for configuring weak password vulnerability of internal and external network camera

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described below in conjunction with the accompanying drawings.

[0017] ACL technology is widely used in routers. It is a flow control technology based on packet filtering. The control list uses the source address, destination address and port number as the basic elements of data packet inspection, and can specify whether the qualified data packets are Allowed to pass.

[0018] Honeypot technology is essentially a technology to deceive the attacker. By arranging some hosts, network services or information as bait, the attacker is induced to attack them. Since the honeypot cannot execute the corresponding malicious code, the attack information It will be well preserved, so that the attack behavior can be captured and analyzed, the tools and methods used by the attacker can be understood, and the attack intention and motivation can be speculated, so that the defender can clearly understand the security threats it faces, and through T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defense method for configuring weak password vulnerabilities of internal and external network cameras. A honeypot is arranged at a network end of the camera, and a public network end of the camera is accessed to the rear of a router to configure an access control list for the router. In an internal environment, ports 23 and 80 of the camera are exposed through the honeypot, and a scanned traffic packet is obtained, the source IP address of the scanned traffic packet is analyzed, and an intranet attack host is obtained through the honeypot when a camera vulnerability scan attack occurs. In an external network environment, all traffic accessing the camera is uniformly filtered by the router, and the IP address allowed to be accessed is released, otherwise prohibiting. According to the defense method for configuring weak password vulnerabilities of the internal and external network cameras, illegal requests of the external network are filtered by using a router ACL, and all external networks accesses do not need to be forbidden, thereby guaranteeing the functionality of the camera; and a Cowrie honeypot is used for internal network deployment, so that low false alarm rate is achieved, and intrusion method and flow of an attacker can be more clearly understood.

Description

technical field [0001] The present invention relates to an overall defense method for weak camera password loopholes in the Internet of Things environment, mainly used to solve the problem that cameras with default initial login passwords are vulnerable to scan blasting attacks and distributed denial of service (DDoS) attacks due to low password strength. ) attack, by setting router access control list (ACL) and honeypot in the network segment of the camera to achieve simultaneous defense against external network and internal network attacks, which belongs to cyberspace security technology. Background technique [0002] As a security device, the network camera system is widely used in public places such as transportation, schools, enterprises, and shopping malls. With the development of Internet of Things technology, more and more families have also begun to use IP camera systems to protect their home security. In order to facilitate remote monitoring by the administrator, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/101H04L63/1425H04L63/1433H04L63/1441
Inventor 季一木姚橹吴夜刘尚东王汝传
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products