{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T07:01:29Z","timestamp":1648969289105},"reference-count":23,"publisher":"Information Processing Society of Japan","issue":"0","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Processing"],"published-print":{"date-parts":[[2020]]},"DOI":"10.2197\/ipsjjip.28.502","type":"journal-article","created":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T22:08:29Z","timestamp":1600121309000},"page":"502-510","source":"Crossref","is-referenced-by-count":1,"title":["Dangers of IP Camera - An Observational Study on Peeping"],"prefix":"10.2197","volume":"28","author":[{"given":"Kazuki","family":"Tamiya","sequence":"first","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University"}]},{"given":"Aamir H.","family":"Bokhari","sequence":"additional","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University"}]},{"given":"Yuta","family":"Ezawa","sequence":"additional","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University"}]},{"given":"Sou","family":"Nakayama","sequence":"additional","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University"}]},{"given":"Ying","family":"Tie","sequence":"additional","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University"}]},{"given":"Rui","family":"Tanabe","sequence":"additional","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University"}]},{"given":"Akira","family":"Fujita","sequence":"additional","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University"}]},{"given":"Katsunari","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University\/Institute of Advanced Sciences, Yokohama National University"}]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University\/Institute of Advanced Sciences, Yokohama National University"}]}],"member":"1012","reference":[{"key":"1","unstructured":"[1] Insecam, available from &lt;http:\/\/www.insecam.org\/&gt; (accessed 2019-02-25)."},{"key":"2","unstructured":"[2] Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. and Rossow, C.: IoTPOT: Analyzing the Rise of IoT Compromises, <i>Proc. 9th USENIX Workshop on Offensive Technologies<\/i> (<i>WOOT&apos;15<\/i>) (2015)."},{"key":"3","unstructured":"[3] Suzuki, S., Pa, Y.M.P., Ezawa, Y., Tie, Y., Nakayama, S., Yoshioka, K. and Matsumoto, T.: Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices, <i>IEICE Technical Report<\/i>, <i>ICSS2015-47<\/i>, Vol.115, No.488, pp.1-6 (2016)."},{"key":"4","unstructured":"[4] Ezawa, Y., Tamiya, K., Nakayama, S., Tie, Y., Yoshioka, K. and Matsumoto, T.: An Analysis of Attacks Targeting WebUI of Embedded Devices by Bare-Metal Honeypot, <i>Proc. Computer Security Symposium 2017<\/i> (<i>CSS2017<\/i>), pp.211-217 (2017)."},{"key":"5","unstructured":"[5] Guarnizo, J.D. Tambe, A. Bhunia, S.S. Ochoa, M., Tippenhauer, N.O., Shabtai, A. and Elovici, Y.: SIPHON: Towards scalable high-interaction physical honeypots, <i>Proc. 3rd ACM Workshop on Cyber-Physical System Security<\/i> (<i>CPSS&apos;17<\/i>), pp.57-68 (2017)."},{"key":"6","unstructured":"[6] Stelma, J.: <i>Securing the Home Network<\/i>, Master thesis, Eindhoven University of Technology (2015), available from &lt;https:\/\/pure.tue.nl\/ws\/files\/47037062\/799535-1.pdf&gt; (accessed 2019-03-18)."},{"key":"7","unstructured":"[7] Bogaard, C.V.: Security analysis of cloud-based video cameras (2017), available from &lt;https:\/\/pdfs.semanticscholar.org\/17cb\/8f89320c9ca31d93b0e9e8ede68b6d03ff74.pdf&gt; (accessed 2020-03-30)."},{"key":"8","unstructured":"[8] Smith, M.: Peeping into 73000 unsecured security cameras thanks to default passwords, CSO Online (2014), available from &lt;https:\/\/www.csoonline.com\/article\/2844283\/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html&gt; (accessed 2019-03-18)."},{"key":"9","unstructured":"[9] How safe are home security systems? An HP study on IoT security (2015)."},{"key":"10","unstructured":"[10] Vivotek IP Cameras - RTSP Authentication Bypass: HelpSystems (2013), available from &lt;http:\/\/www.coresecurity.com\/advisories\/vivotek-ip-cameras-rtsp-authentication-bypass&gt; (accessed 2019-02-17)."},{"key":"11","unstructured":"[11] Donohue, B.: Urban surveillance camera systems lacking security, Blog, Kaspersky (2015), available from &lt;https:\/\/blog.kaspersky.co.jp\/urban-surveillance-not-secure\/7781\/&gt; (accessed 2019-02-25)."},{"key":"12","unstructured":"[12] CVE-2017-5674: National vulnerability database, NIST (2017), available from &lt;https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5674&gt; (accessed 2018-12-20)."},{"key":"13","unstructured":"[13] Shodan, available from &lt;https:\/\/www.shodan.io\/&gt; (accessed 2018-11-11)."},{"key":"14","unstructured":"[14] Censys, available from &lt;https:\/\/censys.io\/&gt; (accessed 2019-01-25)."},{"key":"15","unstructured":"[15] Seals, J.: Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities, <i>Internet Crime Complaint Center<\/i> (<i>IC3<\/i>) (2018), available from &lt;https:\/\/www.ic3.gov\/media\/2018\/180802.aspx&gt; (accessed 2019-03-21)."},{"key":"16","unstructured":"[16] Glastoph, Web Application Honeypot, available from &lt;https:\/\/github.com\/mushorg\/glastopf&gt; (accessed 2018-11-21)."},{"key":"17","unstructured":"[17] Dionaea low interaction honeypot, available from &lt;https:\/\/github.com\/rep\/dionaea&gt; (accessed 2018-11-21)."},{"key":"18","unstructured":"[18] Yang, Z., Xiong, J., Tie, Y., Tamiya, K., Nishida, S., Yang, D., Fujita, A., Yoshioka, K. and Matsumoto, T.: Observation and Analysis of Cyber Attacks in Home Network Testbed, <i>Proc. Computer Security Symposium 2017<\/i> (<i>CSS2017<\/i>) (2017)."},{"key":"19","unstructured":"[19] AS number assignments: Japan Network Information Center (JPNIC), available from &lt;https:\/\/www.nic.ad.jp\/ja\/ip\/asnumber.html&gt; (accessed 2018-11-11)."},{"key":"20","unstructured":"[20] Safari - Apple Support, available from &lt;https:\/\/support.apple.com\/ja_JP\/downloads\/safari&gt; (accessed 2018-11-14)."},{"key":"21","unstructured":"[21] Internet Explorer - Microsoft Download Center, available from &lt;https:\/\/www.microsoft.com\/ja-jp\/download\/internet-explorer.aspx&gt; (accessed 2018-11-14)."},{"key":"22","unstructured":"[22] Home Gadgets at Risk: NHK Documentary, <i>Season 2018<\/i>, Episode 4 (2018)."},{"key":"23","unstructured":"[23] Home Gadgets at Risk: Science ZERO, NHK Educational TV (2017), available from &lt;https:\/\/www2.nhk.or.jp\/archives\/chronicle\/pg\/page010-01-01.cgi?recId=0001000000000000%400000000000000000000000%2D50%2D21%2D4800000000000000000000&gt; (accessed 2019-03-18)."}],"container-title":["Journal of Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/28\/0\/28_502\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T01:07:36Z","timestamp":1638320856000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/28\/0\/28_502\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":23,"journal-issue":{"issue":"0","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.2197\/ipsjjip.28.502","relation":{},"ISSN":["1882-6652"],"issn-type":[{"value":"1882-6652","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}