Ensuring Network Security System For Surveillance System:

September 21st, 2019

Security camera systems are increasingly internet connected, driven in great part by customer demand for remote video access. The systems range from cloud-managed surveillance systems, traditional DVR/VMS/NVRs connected to the internet, and traditional systems connected to a local network which in turn is connected to the internet.

With cyber-attacks accelerating, physical security integrator and internal support staff must keep up-to-date on cyber security attack vectors which can impact the camera video management systems they sell and/or support. These systems require the same level of protection from cyber security vulnerabilities given to traditional IT systems.

The best practices for internet-connected security camera systems.

  1. Physical Security: A Dangerous Door for Cyber Attacks:

Security Camera Systems are increasingly internet connected, driven by the desire for remote access and control, integration, and drastically reduced cloud storage costs.

In addition to the growing number of cloud-managed surveillance systems, most traditional security camera systems are now connected to the internet for remote access, support, and maintenance, or they are connected to the local network which in turn is connected to the internet.

In parallel, cyber-attacks continue to escalate. Reading about millions of breaches in the news headlines are becoming commonplace. Liabilities for damages are a great risk to companies.

Thus it is critical that security camera systems get the same level of attention to, and protection from, cyber security vulnerabilities that are given to traditional IT systems.

Physical security integrator and internal support staff must keep up-to-date on cyber security attack vectors which can impact the camera video management systems they sell.

 

  1. Major Attack Vectors for Security Camera Systems:

The five major cyber-attack vectors for surveillance camera systems are:

Windows OS

Linux OS

DVRs, NVRS, VMS

Endpoints (Cameras)

Firewall ports

We will discuss these attack vectors in context of applicable best practices which can be deployed to protecting your surveillance system against them.

 

  1. Best Practices Differ Based on Surveillance System Type:

 

The term ‘cloud video surveillance’ and cloud system’ is used inconsistently. Thus it is important to check with your provider to see exactly how they achieve internet access, as it will impact which steps you must take to ensure your system is secure.

A traditional system, either DVR, NVR or VMS, with an internet connection, typically for the purpose of remote video access.

A cloud-managed system, also called VSAAS. With a cloud-managed system, though there may be an onsite device, the video is recording and managed from the cloud.

There are differences within each of these categories that impact features and functions, however, this top-level distinction will offer clarity in how you can apply cyber security best practices, as well as what questions to ask your provider.

 

  1. Best Practices for Cyber-Safe Security Camera Systems:

Vulnerability

At first glance, camera passwords may seem like too obvious a security measure to discuss. However, a Network World article in November 2014, cited that 73,011 locations with IP Cameras from 256 countries were exposed on one website. The United States topped the list with 11,046 links, where each link could have up to 8 or 16 cameras.

Further,, it is estimated that 1 in 5 Web users still use easy-to-hack passwords.

The Top 10 passwords of 2013, according to Splash Data.

 

  • 123456
  • Password
  • 12345678
  • qwerty
  • abc123
  • 123456789
  • 111111
  • 1234567

Almost all cameras sold today have a web-based graphical user interface (GUI) and come with a default username and password which is published on the internet.

Some installers don’t change the password at all and leave the same default password for all cameras.

Very  few cameras have a way to disable the GUI, so the security vulnerability is that someone can attempt to hack into the camera via the web GUI to guess a password.

The  hacker must have network access to do this, but the cameras are often on a shared network, not a physically separate network or a VLAN.

 

Port Forwarding:

Most end users now demand and expect video access from remote mobile devices.

This feature is normally delivered by exposing the DVR, NVR, or VMS to the internet in some way.

This  typical exposure to the internet of an HTTP server is extremely dangerous, as there are a large number of malicious exploits that can be used to obtain access. Machines open to the Internet are typically scanned more than 10,000 times a day.

One example of this vulnerability was the Heart-bleed OpenSSL exploit in 2014; many manufacturers had to ask users to reset their passwords.

 

Firewalls:

As stated above, any on-premise DVR/NVR/VMS should have a firewall for protection, especially if you are going to expose it to the internet for any type of remote access.

Firewalls can be very complex, with thousands of rules. The next generation firewalls are even more complex because they analyse the protocols going over the ports and verify that proper protocols are being used.

 

Network Topology:

Mixing the cameras on a standard network without separation is a recipe for disaster.

If your security camera system is connected to your main network, you are creating a doorway for hackers to enter your main network via your surveillance system, or to enter your physical security system through your main network.

 

Operating Systems:

Your on-premise VMS, DVR, NVR or recording system will all have an operating system. The cameras all have an operating system.

All operating systems have vulnerabilities, both Windows-based and Linux-based.

Window OS vulnerabilities are so well-accepted that IT teams monitor them regularly. Recently it has become more and more apparent that Linux has many vulnerabilities also, such as Shell-shock (2014) and Ghost (2015), which made millions of systems vulnerable.

In  theory, your system manufacturer would have a high-quality security team that is responsive in providing you with security updates. The reality is that many vendors don’t do this on a predictable basis.

Cloud-Managed System

Best  practice here is to inquire with your integrator or cloud vendor if the cloud vendor has a dedicated, experienced security team which monitors vulnerabilities.

It also  confirm whether the cloud vendor will automatically send security patches/updates through the cloud to any on-premise appliance. If so, no action is required from the end user to do operating system security monitoring, patching or upgrading.

 

Data breaches continue to accelerate throughout the world. With increasing Internet connectivity, physical security systems are very vulnerable to cyber-attacks, both as direct attacks and as an entrance to the rest of the network. Liabilities for these attacks are still being defined.

It  is prudent to protect your company and your customers through preventative measures.

To maximize your cyber security, it is critical to define best practices for your own company, as part of your security camera system assessment, as well as its deployment and maintenance.

 

 

 

FAQs on Gait representation and Recognition:

August 24th, 2019

 Biometrics is the study of methods for uniquely recognizing humans based on one or more intrinsic physical or behavioral traits. After decades of research activities, biometrics, as a recognized scientific discipline, has advanced considerably both in practical technology and theoretical discovery .They  provide both a concise and accessible introduction to the field as well as a detailed coverage on the unique research problems with their solutions in a wide spectrum of biometrics research ranging from voice, face, fingerprint, iris, handwriting, human behavior to multi-modal biometrics. The contributions also present the pioneering efforts and state-of-the-art results, with special focus on practical issues concerning development through Gait recognition and representation.

How is human identification done by Gait?

There is considerable support for the notion that each person’s gait is unique. It has been observed in literature that people can be recognized by the way they walk. The same notion has been observed in medicine and bio mechanics though not in the context of biometrics but more as an assertion of individuality. Perhaps driven by these notions, though without reference to them, there has been work in psychology on the human ability to recognise each other by using gait. People have also studied walking from medical and bio mechanics perspectives, and this gives insight into how its properties can change which is of general interest in any biometrics.

The coordinated , cyclic combination of movements that result in human locomotion is called Gait.

People often feel that they can identity a familiar person from simply by recognizing the way the person walks.

As a biometric, gait has several attractive properties.

A unique advantage of a gait as a biometric night not be perceivable.

What is gait recognition?

Recognition by gait can be based on the (static) human shape as well as on movement, suggesting a richer recognition cue. It is actually one of the newest biometrics since it’s development is contemporaneous with new approaches in computer vision.

Perhaps driven by these notions, though without reference to them, there has been work in psychology on the human ability to recognise each other by using gait. People have also studied walking from medical and bio mechanics perspective, and this gives insight into how its properties can change which is of general interest in any biometrics.

There are also several confounding properties of gait as a biometric. Unlike fingerprints, we do not know the extent to which an individual’s gait is unique.

What is Score level function?

Since individual features perform different, it is not trivial to combine them. Often this problem is bypassed by concatenating all feature vectors and learning a distance metric for the combined feature vector.

However, to perform well, metric learning approaches need many training samples which are not available in most real-world applications. In contrast, in our approach we perform score-level fusion to combine the matching scores of different features.

To evaluate which score-level fusion techniques perform best for appearance-based person re-identification, we examine several score normalization and feature weighting approaches employing the the widely used and very challenging .

Experiments show that in fusing a large ensemble of features, the proposed score-level fusion approach outperforms linear metric learning approaches which fuse at feature-level.

Furthermore, a combination of linear metric learning and score-level fusion even outperforms the currently best non-linear kernel-based metric learning approaches, regarding both accuracy and computation time.

What is Feature-level fusion?

In feature-level fusion, the feature sets originating from multiple biometric sources are consolidated into a single feature set by the application of appropriate feature normalization, transformation, and reduction schemes.

The primary benefit of feature-level fusion is the detection of correlated feature values generated by different biometric algorithms thereby identifying a compact set of salient features that can improve recognition accuracy.

Eliciting this feature set typically requires the use of  dimensional reduction methods and, therefore, feature-level fusion assumes the availability of a large number of training data. Feature-level fusion algorithms can also be used for template update or template improvement.

What is Support Vector Machine?

The Support Vector Machine (SVM) classifier to recognise defective body gestures.

SVM is an optimal discriminant method based on the Bayesian learning theory. For the cases where it is difficult to estimate the density model in high-dimensional space, the discriminant approach is preferable to the generative approach.

SVM performs an implicitly mapping of data into a higher dimensional feature space, and then finds a linear separating hyper plane with the maximal margin to separate data in this higher dimensional space.

Gait is a biometric, which aims to recognise people from their manner of walking. Unlike other biometrics, gait measurement is unobtrusive and can be captured at a distance. Moreover, it can be detected and measured at low resolution.

In contrast, most other biometrics such as fingerprint , face, iris ,signature and voice are restricted to controlled environments.

They can be captured only by physical contact or at a close distance from the probe. Even face and iris requires a high-resolution probe.

Gait can thus be alternatively used in situations where other biometrics might not be applicable.

Therefore, there has been an increase in research related to gait recognition over recent years.

These new approaches require good computer memory and processing speed to processes sequences of image data with reasonable performance.

There are also several confounding properties of gait as a biometric. Unlike fingerprints, we do not know the extent to which an individual’s gait is unique.

What is Gait representation?

Gait representation consists of a Motion Intensity Image , which measures the intensity of relative motion at each pixel location, and four Motion Direction Images , each of which represents the likelihood of the direction of motion being along one specific motion direction during a complete gait.

 How can  identification be done with template based on the width of a silhouette image?

A simple baseline method for human identification based on body shape and gait. This baseline recognition method provides a lower bound against which to evaluate more complicated procedures.

They  present a viewpoint dependent technique based on template matching of body silhouettes. Cyclic gait analysis is performed to extract key frames from a test sequence.

These frames are compared to training frames using normalized correlation, and subject classification is performed by nearest neighbor matching among correlation scores.

The approach implicitly captures biometric shape cues such as body height, width, and body-part proportions, as well as gait cues such as stride length and amount of arm swing. They  evaluate the method on four databases with varying viewing angles, background conditions (indoors and outdoors), walk styles and pixels on target.

How can features be  identified with template based on projection of a silhouette image?

They present a novel, fast, resolution-independent silhouette area-based matching approach.

We approximate the silhouette area by a small set of axis-aligned rectangles.

This yields a very memory efficient representation of templates. In addition, utilizing the integral image, we can thus compare a silhouette with an input image at an arbitrary position in constant time.

Furthermore, we present a new method to build a template hierarchy optimized for our rectangular representation of template silhouette.

Gait is a biometric, which aims to recognise people from their manner of walking. Unlike other biometrics, gait measurement is unobtrusive and can be captured at a distance. Moreover, it can be detected and measured at low resolution.

In contrast, most other biometrics such as fingerprint , face, iris ,signature and voice are restricted to controlled environments.

They can be captured only by physical contact or at a close distance from the probe. Even face and iris requires a high-resolution probe.

Gait can thus be alternatively used in situations where other biometrics might not be applicable.

Therefore, there has been an increase in research related to gait recognition over recent years.