Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 565-569.doi: 10.11896/jsjkx.210100093

• Information Security • Previous Articles     Next Articles

Camera Identity Recognition Method Fused with Multi-dimensional Identification Features

ZHU Rong-chen1, LI Xin1,2, WANG Han-xu1, YE Han1, CAO Zhi-wei3, FAN Zhi-jie3   

  1. 1 School of Information Network Security,People's Public Security University of China,Beijing 100038,China
    2 Key Laboratory of Security Prevention Technology and Risk Assessment of the Ministry of Public Security,Beijing 100026,China
    3 Department of Information Security Technology,The Third Research Institute of Ministry of Public Security,Shanghai 200031,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:ZHU Rong-chen,born in 1996,master.His main research interests include cyber security,video network and machine learning.
    LI Xin,born in 1977,Ph.D,associate professor.His main research interests include cyber security and so on.
  • Supported by:
    National Natural Science Foundation of China(62076246),Science and Technology Project of the Ministry of Public Security(2020GABJC01) and Top Talent Training Special Funding Graduate Research and Innovation Project of People's Public Security University of China(2021yjsky016).

Abstract: With the development of smart cities and public security big data,video surveillance networks have become essential infrastructure for urban governance.However,by replacing or tampering with surveillance cameras- the important front-end device,an attacker can access the internal network to achieve device hijacking,information theft,network paralysis,and threatening personal,social,and national security.A camera identity recognition method combining multi-dimensional identification features is proposed to identify illegal camera identities in advance.A camera identification system that integrates explicit,implicit,and dynamic identifiers is constructed by extracting the camera's static information and the dynamic flow information.An evaluation method of identifier contribution based on self-information and information entropy is proposed to select a concise and practical identity identifier.The extracted identifier feature vector can lay the foundation for future abnormal camera intrusion detection.Experimental results show that explicit identifiers have the most considerable amount of self-information and contribution but are easy to be forged;dynamic identifiers have the second-highest contribution,but the workload of traffic collection and processing is enormous;static identifiers have a low contribution but still have a specific role in identification.

Key words: Camera, Identification feature, Identity recognition, Intrusion detection, Self-information amount

CLC Number: 

  • TP309
[1]LI X,DUAN Y C,HUANG S H,et al.Construction of network security situation index system for video private network[J].Journal of Beijing University of Aeronautics and Astronautics,2020,46(9):1625-1634.
[2]DUAN Y C.Extraction and evaluation of network security situation elements for video private network[D].Beijing:People's Public Secu-rity University of China,2020.
[3]YIN X M,HU Z L,CHEN G L,et al.Research on IP video private network access detection scheme based on device fingerprint decision tree classification[J].Information Network Secu-rity,2016(12):68-73.
[4]LUO J Z,YANG M,LING Z,et al.Cyberspace Security System and key technologies[J].Chinese Science:Information Science,2016,46(8):939-968.
[5]BUJLOW T,CARELA-ESPAÑOL V,SOLÉ-PARETA J,et al.A Survey on Web Tracking:Mechanisms,Implications,and Defenses[J].Proceedings of the IEEE,2017,105(8):1476-1510.
[6]WANG M,DING Z J.A new method for fingerprint feature selection and model construction of equipment[J].Computer Scie-nce,2020,47(7):257-262.
[7]DANEV B,ZANETTI D,CAPKUN S.On physical-layer identification of wireless devices[J].ACM Computing Surveys,2013,45(1):1-29.
[8]GERDES R,DANIELS T,PHD M,et al.Device Identificationvia Analog Signal Fingerprinting:A Matched Filter Approach[C]//Proceedings of the Network and Distributed System Security Symposium.2006:1-11.
[9]DEY S,ROY N,XU W,et al.AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable[C]//Network and Distributed System Security Symposium.2014:1-16.
[10]LI C T.Source Camera Identification Using Enhanced SensorPattern Noise[J].IEEE Transactions on Information Forensics and Security,2010,5(2):280-287.
[11]LUKAS J,FRIDRICH J,GOLJAN M.Digital camera identification from sensor pattern noise[J].IEEE Transactions on Information Forensics and Security,2006,1(2):205-214.
[12]ZHANG Y T,YAN C H.Research on RFID tag authentication technology based on bidirectional authentication protocol[J].Information Network Security,2016(1):64-69.
[13]YANG W C,GUO Y B,LI T,et al.Identification method and security model of Internet of things based on traffic fingerprint[J].Computer Science,2020,47(7):299-306.
[14]MEIDAN Y,BOHADANA M,SHABTAI A,et al.ProfilIoT:a machine learning approach for IoT device identification based on network traffic analysis[C]//Proceedings of the Symposium on Applied Computing.2017:506-509.
[15]ZHANG L P,LEI D J,ZENG X H.System call intrusion detection method based on frequency eigenvector[J].Computer Scie-nce,2013,40(S1):330-333,339.
[16]YAO D,LUO J Y,CHEN W P,et al.Double random forest real-time intrusion detection method based on improved non extensive entropy feature extraction[J].Computer Science,2013,40(12):192-196,218.
[17]LIN G Y,HUANG H,ZHANG Y P.Research progress of intrusion detection system[J].Computer Science,2008(2):69-74.
[18]LUO C K,CHEN Y X,HU X,et al.Evaluation method of equipment system contribution rate based on combat ring and self information[J].Journal of Shanghai Jiaotong University,2019,53(6):741-748.
[19]PENG C G,DING H F,ZHU Y J,et al.Information entropymodel and measurement method of privacy protection[J].Acta Sinica Sinica,2016,27(8):1891-1903.
[20]CHI Y,GAO Z W.Construction of hybrid P2P network based on self information algorithm[J].Computer Science,2012,39(S1):159-162.
[21]SHANNON C E.A mathematical theory of communication[J].The Bell System Technical Journal,1948,27(3):379-423.
[22]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT SENTINEL:Automated Device-Type Identification for Security Enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).2017.
[1] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[2] ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570.
[3] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[4] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[5] TIAN Ye, CHEN Hong-wei, WANG Fa-sheng, CHEN Xing-wen. Overview of SLAM Algorithms for Mobile Robots [J]. Computer Science, 2021, 48(9): 223-234.
[6] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[7] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[8] CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76.
[9] HE Quan-qi, YU Fei-hong. Review of Low Power Architecture for Wireless Network Cameras [J]. Computer Science, 2021, 48(6A): 369-373.
[10] CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463.
[11] YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523.
[12] JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331.
[13] WANG Ying-ying, CHANG Jun, WU Hao, ZHOU Xiang, PENG Yu. Intrusion Detection Method Based on WiFi-CSI [J]. Computer Science, 2021, 48(6): 343-348.
[14] LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332.
[15] HUAN Wen-ming, LIN Hai-tao. Design of Intrusion Detection System Based on Sampling Ensemble Algorithm [J]. Computer Science, 2021, 48(11A): 705-712.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!