Abstract
The Internet-of-Things is driving significant change to the video surveillance network system, allowing access to video data anywhere and at any time. Despite the tremendous benefits, the system is faced with an insider threat, causing service interruption. Current management strategies for this system are inflexible and lack security incident mitigation. This paper offers a cost-effective, flexible, and security-oriented management system based on the software-defined network technology for the video surveillance network using commercial-off-the-shelf components. A management interface was developed for the formulation of network-enforced flow rules and the visualization of network performance. The system was tested with scenarios, such that the stations within the network were exposed to high and low network demand applications. The bandwidth visualization showed an distinguishable outcomes When the surveillance network system was overwhelmed with ping flooding attack by insiders. Enforcing the appropriate for rules successfully mitigates such Denial-of-Service attack, originating within the network infrastructure. The network bandwidth immediately return to their normal state after the malicious device was logically removed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alshalawi, R., Khozium, M.O.: A case study of IP camera monitoring traffic verification. Int. J. Adv. Res. 8, 1–11 (2020)
Bhatt, C., Sihag, V., Choudhary, G., Astillo, P.V., You, I.: A multi-controller authentication approach for SDN. In: 2021 International Conference on Electronics, Information, and Communication (ICEIC), pp. 1–4. IEEE (2021)
Cheng, J.: Securing IP surveillance cameras in the IoT ecosystem (2018). https://www.trendmicro.com/vinfo/mx/security/news/internet-of-things/securing-ip-surveillance-cameras-in-the-iot-ecosystem. Accessed 16 July 2022
Choudhary, G., Kim, J., Sharma, V.: Security of 5G-mobile backhaul networks: a survey. arXiv preprint arXiv:1906.11427 (2019)
Ciena: What is software-defined networking (SDN)? https://www.ciena.com/insights/what-is/What-Is-SDN.html. Accessed 14 Mar 2021
Dangi, R., Jadhav, A., Choudhary, G., Dragoni, N., Mishra, M.K., Lalwani, P.: ML-based 5G network slicing security: a comprehensive survey. Future Internet 14(4), 116 (2022)
Dangi, R., Lalwani, P., Choudhary, G., You, I., Pau, G.: Study and investigation on 5G technology: a systematic review. Sensors 22(1), 26 (2021)
Dridi, L., Zhani, M.F.: SDN-guard: DoS attacks mitigation in SDN networks. In: 2016 5th IEEE International Conference on Cloud Networking (Cloudnet), pp. 212–217. IEEE (2016)
GeeksforGeeks: Difference between software defined network and traditional network (2020). https://www.geeksforgeeks.org/difference-between-software-defined-network-and-traditional-network/. Accessed 23 Apr 2021
Gulve, S.P., Khoje, S.A., Pardeshi, P.: Implementation of IoT-based smart video surveillance system. In: Behera, H.S., Mohapatra, D.P. (eds.) Computational Intelligence in Data Mining. AISC, vol. 556, pp. 771–780. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-3874-7_73
IBM: What is the internet of things, and how does it work? (2020). https://www.ibm.com/blogs/internet-of-things/what-is-the-iot/. Accessed 23 Apr 2021
Imperva: What is an insider threat: Malicious insider attack examples: Imperva. https://www.imperva.com/learn/application-security/insider-threats/. Accessed 10 June 2021
Imperva: What is a ping flood: ICMP flood: DDoS attack glossary: Imperva (2020). https://www.imperva.com/learn/ddos/ping-icmp-flood/. Accessed 26 Apr 2021
Jyothi, S.N., Vardhan, K.V.: Design and implementation of real time security surveillance system using IoT. In: 2016 International Conference on Communication and Electronics Systems (ICCES), pp. 1–5. IEEE (2016)
Kenny, S.: What are the cybersecurity issues in video surveillance? https://www.axis.com/blog/secure-insights/what-are-the-cybersecurity-issues-in-video-surveillance/. Accessed 02 June 2021
Kim, H., Kim, J., Ko, Y.B.: Developing a cost-effective openflow testbed for small-scale software defined networking. In: 16th International Conference on Advanced Communication Technology, pp. 758–761. IEEE (2014)
Lin, T., Kang, J.M., Bannazadeh, H., Leon-Garcia, A.: Enabling SDN applications on software-defined infrastructure. In: 2014 IEEE Network Operations and Management Symposium (NOMS), pp. 1–7. IEEE (2014)
McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)
Penfold, A.: IoT is reshaping the future of video surveillance (2022). https://www.azena.com/insights/iot-reshaping-future-surveillance. Accessed 10 June 2021
Rametta, C., Baldoni, G., Lombardo, A., Micalizzi, S., Vassallo, A.: S6: a smart, social and SDN-based surveillance system for smart-cities. Proc. Comput. Sci. 110, 361–368 (2017)
RaspberryPi: What is a raspberry pi? https://www.raspberrypi.org/help/what-%20is-a-raspberry-pi/. Accessed 14 Mar 2021
Rice, D.: Cyber security and IP cameras: Everyone’s concern. https://www.sdmmag.com/articles/94748-cyber-security-ip-cameras-everyones-concern. Accessed 02 June 2021
Acknowledgements
This work has been supported by project TRANSACT funded under H2020-EU.2.1.1. - INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (grant agreement ID: 101007260).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 Springer Nature Switzerland AG
About this paper
Cite this paper
Del Castillo, M., Hermosa, H., Astillo, P.V., Choudhary, G., Dragoni, N. (2023). Software-Defined Network Based Secure Internet-Enabled Video Surveillance System. In: You, I., Youn, TY. (eds) Information Security Applications. WISA 2022. Lecture Notes in Computer Science, vol 13720. Springer, Cham. https://doi.org/10.1007/978-3-031-25659-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-25659-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25658-5
Online ISBN: 978-3-031-25659-2
eBook Packages: Computer ScienceComputer Science (R0)