Fig. 1. Shodan Homepage
Fig. 2. IoT Home CCTV
Fig. 3. Procedure of User Authentication Protocol
Fig. 4. SSH Tunneling System
Fig. 5. Algorithm for Detecting bytes to encrypt
Table 1. NAL unit type Classes
참고문헌
- M. C. Yim. (2018. 10. 10.). Congressman Seong-Jung Park says "Most of the CCTV Hacking is Defenseless state". ZDNetKorea. .http://www.zdnet.co.kr/news/news_view.asp?artice_id=20181010140028&type=det&re=zdk
- Y. S. Go. (2016. 2.). Study of Security vulnerability IOT device IP exposure threat prevention system.. Bukyeong National University, Busan.
- J. Y. Byeon. (2017). 'IP camera' hacked 'clumsy'... Clear outflow immediately. Sanup News. http://www.kidd.co.kr/news/199010
- K. T. Lee. (2018. 8. 22). Chinese CCTV Hackes Korean Privacy. Digital Times. http://www.dt.co.kr/contents.html?article_no=2018082302100351041002&ref
- B. S. Jeon & H. C. Yang. (2018). Chinese CCTV hacking is defenseless. MBN News. http://www.mbn.co.kr/pages/vod/programView.mbn?bcastSeqNo=1194180
- T. S. Park. (2011). Design and Implementation User Authentication Protocol to Prevent Malicious User in IP CCTV Enviornment. Sungsil University, Seoul.
- G. J. Hwang, J. P. Park & S. M. Yang. (2016). Security Technique using SSH Tunneling for CCTV Remote Access. Sungsil University, Seoul.
- S. C. Hwang. (2012). Development of Media Crypto Algorithm for anti-hacking into CCTV. Indeok University, Seoul.
- N. I. Heo. (2017). CCTV Video Hacking Protection Solution "SECUWATCHER". Money Today. http://news.mt.co.kr/mtview.php?no=2017121109240835573
- N. I. Heo. (2018). Norma released CCTV Security App "CCTV Care". ETNews. http://www.etnews.com/20180717000198
- S. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. DOI : 10.15207/jkcs.2017.8.2.021
- G. W. Lee. (2012). A Study on Public Institutions CCTV Information Security Management System. Dankook University, Yongin.
- S. Hong. (2014). Analysis of DDoS Attack and Countermeasure: Survey. The Journal of Digital Policy and Management, 12(1), 423-429. DOI : 10.14400/jdpm.2014.12.1.423
- S. Hong. (2013). Disconnection of Wireless LAN Attack and Countermeasure. The Journal of Digital Policy and Management, 11(12), 453-458. DOI : 10.14400/jdpm.2013.11.12.453