{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:11:11Z","timestamp":1745381471440,"version":"3.40.4"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031875403"},{"type":"electronic","value":"9783031875410"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87541-0_4","type":"book-chapter","created":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T10:36:38Z","timestamp":1744367798000},"page":"57-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security and\u00a0Privacy Evaluation of\u00a0IP Cameras on\u00a0Shodan"],"prefix":"10.1007","author":[{"given":"Cheok Ieng","family":"Ng","sequence":"first","affiliation":[]},{"given":"Maryam","family":"Mehrnezhad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Aloman, A., Ispas, A.I., Ciotirnae, P., Sanchez-Iborra, R., Cano, M.D.: Performance Evaluation of Video Streaming Using MPEG DASH, RTSP, and RTMP in Mobile Networks. IEEE, Munich, Germany (2015). https:\/\/ieeexplore.ieee.org\/abstract\/document\/7396692","DOI":"10.1109\/WMNC.2015.12"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Abdalla, P.A., Varol, C.: Testing IoT Security: The Case Study of an IP Camera. IEEE, Beirut, Lebanon (2020). https:\/\/doi.org\/10.1109\/ISDFS49300.2020.9116392","DOI":"10.1109\/ISDFS49300.2020.9116392"},{"key":"4_CR3","unstructured":"achillean: How shodan takes screenshots? (2019). https:\/\/security.stackexchange.com\/a\/203334"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Alharbi, R., Aspinall, D.: An IoT analysis framework: An investigation of IoT smart cameras\u2019 vulnerabilities. IET, London (2018). https:\/\/doi.org\/10.1049\/cp.2018.0047","DOI":"10.1049\/cp.2018.0047"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Almazrouei, O., Magalingam, P., Hasan, M.K., Almehrzi, M., Alshamsi, A.: Penetration Testing for IoT Security: The Case Study of a Wireless IP Security CAM. IEEE, Houston, TX, USA (2023). https:\/\/doi.org\/10.1109\/ICAIC57335.2023.10044176","DOI":"10.1109\/ICAIC57335.2023.10044176"},{"key":"4_CR6","unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093\u20131110. USENIX Association, Vancouver, BC (2017). https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis"},{"key":"4_CR7","unstructured":"Barker, R.: How many CCTV cameras are in London? (2022). https:\/\/clarionuk.com\/resources\/how-many-cctv-cameras-are-in-london\/"},{"key":"4_CR8","unstructured":"BBC: MWC 2017: \u201922,000 hackable webcams in Barcelona\u2019 (2017). https:\/\/www.bbc.co.uk\/news\/technology-39101533"},{"key":"4_CR9","unstructured":"BCS, T.C.I.f.I.: Code of conduct for BCS members. https:\/\/www.bcs.org\/media\/2211\/bcs-code-of-conduct.pdf"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.ijcip.2014.03.001","volume":"7","author":"R Bodenheim","year":"2014","unstructured":"Bodenheim, R., Butts, J., Dunlap, S., Mullins, B.: Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. Int. J. Crit. Infrastruct. Prot. 7(2), 114\u2013123 (2014). https:\/\/doi.org\/10.1016\/j.ijcip.2014.03.001","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Chen, Y., Lian, X., Yu, D., Lv, S., Hao, S., Ma, Y.: Exploring Shodan from the perspective of industrial control systems. IEEE Access 8, 75359\u201375369 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2988691","DOI":"10.1109\/ACCESS.2020.2988691"},{"key":"4_CR12","unstructured":"Council, G.B.P.: Great barton. https:\/\/greatbarton-pc.gov.uk\/our-village\/"},{"key":"4_CR13","unstructured":"CVEDIA: CVEDIA-RT. https:\/\/docs.cvedia.com"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Das, R., Tuna, G.: Packet tracing and analysis of network cameras with Wireshark. IEEE, Tirgu Mures, Romania (2017). https:\/\/doi.org\/10.1109\/ISDFS.2017.7916510","DOI":"10.1109\/ISDFS.2017.7916510"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Ercolani, V.J., Patton, M.W., Chen, H.: Shodan visualized. IEEE, Tucson, AZ, USA (2016). https:\/\/doi.org\/10.1109\/ISI.2016.7745467","DOI":"10.1109\/ISI.2016.7745467"},{"key":"4_CR16","unstructured":"European Commission: The Eu cybersecurity act. https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cybersecurity-act"},{"key":"4_CR17","unstructured":"European Commission: The European cyber resilience act. https:\/\/www.european-cyber-resilience-act.com"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Firmansyah, M.I.M., Suharto, N., Prasetyo, Y.H.: RTSP and HTTP protocol analysis for streaming services on manet networks in state polytechnic of Malang. J. Telecommun. Netw. 12(3), 172\u2013177 (2022). https:\/\/doi.org\/10.33795\/jartel.v12i3.473","DOI":"10.33795\/jartel.v12i3.473"},{"key":"4_CR19","unstructured":"GENERAL, S.O.C.D.O.J.O.O.T.A.: California consumer privacy Act. https:\/\/oag.ca.gov\/privacy\/ccpa"},{"issue":"15","key":"4_CR20","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1002\/sec.1262","volume":"9","author":"B Genge","year":"2015","unstructured":"Genge, B., En\u0103chescu, C.: ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services. Secur. Commun. Netw. 9(15), 2577\u20133044 (2015). https:\/\/doi.org\/10.1002\/sec.1262","journal-title":"Secur. Commun. Netw."},{"key":"4_CR21","unstructured":"Information, C.L.: SB-327 information privacy: connected devices. https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180SB327"},{"key":"4_CR22","unstructured":"Information Commissioner\u2019s Office: Overview \u2013 Data Protection and the EU. https:\/\/ico.org.uk\/for-organisations\/data-protection-and-the-eu\/overview-data-protection-and-the-eu\/"},{"key":"4_CR23","unstructured":"IP-API: Frequently asked questions. https:\/\/members.ip-api.com\/faq"},{"key":"4_CR24","unstructured":"for London, T.: London\u2019s geography and population. https:\/\/trustforlondon.org.uk\/data\/geography-population\/"},{"key":"4_CR25","unstructured":"Munford, M.: Could your \u2018smart\u2019 home be a weapon of web destruction? (2016). https:\/\/www.bbc.co.uk\/news\/business-37776964"},{"key":"4_CR26","unstructured":"National Cybersecurity Alliance: You Can\u2019t Have Privacy Without Security (2016). https:\/\/staysafeonline.org\/cybersecurity-for-business\/you-cant-have-privacy-without-security"},{"key":"4_CR27","unstructured":"NCSC: Smart devices: new law helps citizens to choose secure products. https:\/\/www.ncsc.gov.uk\/blog-post\/smart-devices-law"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Nu\u00f1ez, L., Toasa, R.M.: Performance evaluation of RTMP, RTSP and HLS protocols for IPTV in mobile networks. IEEE, Seville, Spain (2020). https:\/\/doi.org\/10.23919\/CISTI49556.2020.9140848","DOI":"10.23919\/CISTI49556.2020.9140848"},{"key":"4_CR29","unstructured":"OccupyTheWeb: IP Camera Hacking: Hacking IP Cameras with Cameradar (2023). https:\/\/www.hackers-arise.com\/post\/ip-camera-hacking-hacking-ip-cameras-with-cameradar"},{"key":"4_CR30","unstructured":"ONVIF: ONVIF Streaming Specification (2023). https:\/\/www.onvif.org\/specs\/stream\/ONVIF-Streaming-Spec.pdf"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Phan, T., Krum, D.M., Bolas, M.: ShodanVR: immersive visualization of text records from the Shodan database. IEEE, Greenville, SC, USA (2016). https:\/\/doi.org\/10.1109\/IMMERSIVE.2016.7932379","DOI":"10.1109\/IMMERSIVE.2016.7932379"},{"key":"4_CR32","doi-asserted-by":"publisher","unstructured":"Rae, J.S., Chowdhury, M.M., Jochen, M.: Internet of Things Device Hardening Using Shodan.io and ShoVAT: A Survey. IEEE, Brookings, SD, USA (2019). https:\/\/doi.org\/10.1109\/EIT.2019.8834072","DOI":"10.1109\/EIT.2019.8834072"},{"issue":"4","key":"4_CR33","doi-asserted-by":"publisher","first-page":"2210","DOI":"10.1177\/15248380221090218","volume":"24","author":"MM Rogers","year":"2023","unstructured":"Rogers, M.M., Fisher, C., Ali, P., Allmark, P., Fontes, L.: Technology-facilitated abuse in intimate relationships: a scoping review. Trauma, Violence, Abuse 24(4), 2210\u20132226 (2023)","journal-title":"Trauma, Violence, Abuse"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Rao, A., Lanphier, R.: Real Time Streaming Protocol (RTSP) (1998). https:\/\/www.ietf.org\/rfc\/rfc2326.txt","DOI":"10.17487\/rfc2326"},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Seralathan, Y., et al.: IoT security vulnerability: a case study of a Web camera. IEEE, Chuncheon, Korea (South) (2018). https:\/\/doi.org\/10.23919\/ICACT.2018.8323686","DOI":"10.23919\/ICACT.2018.8323686"},{"key":"4_CR36","unstructured":"Shodan: On-Demand Scanning. https:\/\/help.shodan.io\/the-basics\/on-demand-scanning"},{"key":"4_CR37","unstructured":"Shodan: Shodan command-line interface. https:\/\/cli.shodan.io"},{"key":"4_CR38","unstructured":"for Standardization, I.O.: Cybersecurity \u2014 IoT security and privacy \u2014 Device baseline requirements (2023). https:\/\/www.iso.org\/standard\/80136.html"},{"key":"4_CR39","doi-asserted-by":"publisher","unstructured":"of\u00a0Standards, N.I., Technology: NISTIR 8259 foundational cybersecurity activities for IoT device manufacturers (2020). https:\/\/doi.org\/10.6028\/NIST.IR.8259","DOI":"10.6028\/NIST.IR.8259"},{"key":"4_CR40","doi-asserted-by":"publisher","unstructured":"Xu, H., Xu, F., Chen, B.: Internet protocol cameras with no password protection: an empirical investigation. In: Passive and Active Measurement. PAM 2018. LNCS. vol. 10771, pp. 47\u201359. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-76481-8_4","DOI":"10.1007\/978-3-319-76481-8_4"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87541-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T05:16:29Z","timestamp":1745298989000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87541-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031875403","9783031875410"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87541-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssresearch24.github.io\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}