surfi detecting surveillance camera looping attacks with
play

SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi - PowerPoint PPT Presentation

SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information Nitya Lakshmanan * , Inkyu Bang + , Min Suk Kang * , Jun Han * , Jong Taek Lee # * National University of Singapore, + Agency for Defense Development, #


  1. SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information Nitya Lakshmanan * , Inkyu Bang + , Min Suk Kang * , Jun Han * , Jong Taek Lee # * National University of Singapore, + Agency for Defense Development, # Electronics and Telecommunications Research Institute + research done while working in NUS

  2. Surveillance cameras are now everywhere 2

  3. Surveillance camera looping attack Place of interest Surveillance system Surveillance system Video shows Video shows a normal a normal activity! activity! valuable video feed security guard security guard 3

  4. Surveillance camera looping attack Place of interest Surveillance system Surveillance system Video shows Video shows a normal a normal activity! activity! valuable video feed security guard security guard No activity 4

  5. Surveillance camera looping attack Place of interest Surveillance system Surveillance system Video shows Video shows a normal a normal activity! activity! valuable video feed looped ! security guard security guard No activity Looped 5

  6. Surveillance camera looping attack Place of interest Surveillance system Surveillance system Video shows Video shows a normal a normal activity! activity! valuable video feed looped ! security guard security guard Robbery No activity Looped Reality Seen by the guard 6

  7. Surveillance camera looping is a reality now Looping Surveillance Cameras Exploiting Surveillance Cameras like in the movies Like a Hollywood Hacker DefCon 2015 BlackHat 2013 Live video Replayed image Modified timestamp 7

  8. Mitigation of camera looping attack is hard Surveillance camera with Video frame comparison integrity protection Live (3 pm) This morning (10 am) Not robust against an adversary Incur prohibitive cost who can manipulate the video 8

  9. Mitigation of camera looping attack is hard Surveillance camera with Video frame comparison integrity protection Live (3 pm) This morning (10 am) Can we mitigate the camera looping attack effectively at no extra hardware cost? Not robust against an adversary Incur prohibitive cost who can manipulate the video 9

  10. SurFi (Surveillance with Wi-Fi) detects camera looping attack Video shows a normal activity! valuable video feed looped ! security guard channel state SurFi information (CSI) Compare Wi-Fi receiver Place of interest Surveillance system No extra Low false alarms hardware cost 10

  11. SurFi (Surveillance with Wi-Fi) detects camera looping attack Video shows a normal activity! valuable video feed looped ! security guard SurFi achieves attack detection accuracy of 98.8% and Video and false positive rate of 0.1% CSI shows a channel state SurFi normal information (CSI) activity! Compare Wi-Fi receiver Place of interest Surveillance system No extra Low false alarms hardware cost 11

  12. System model: indoor space under video surveillance Field-of-view ✓ Place of interest such as bank or jewelry store ✓ Field-of-view of the camera ✓ CSI measurement cannot be compromised Place of interest 12

  13. Threat model: adversary can loop surveillance video feed Field-of-view ✓ Manipulate video feed ✓ Evade detection of his unauthorized activities Place of interest 13

  14. Challenge: video and CSI signals are different Video CSI ✓ Displacement of body keypoints (e.g., wrist, ✓ Amplitude of subcarriers elbow)

  15. Challenge: video and CSI signals are different Video CSI How to find common attributes for reliable comparison of two different sensing modalities? ✓ Displacement of body keypoints (e.g., wrist, ✓ Amplitude of subcarriers elbow)

  16. Main intuition: Both signals capture the similar timing and frequency components • • Frequency component: Prominent Timing components: Start and end frequency time of the activity End time Start time Prominent frequency 16

  17. Main intuition: Both signals capture the similar timing and frequency components • • Frequency component: Prominent Timing components: Start and end frequency time of the activity Reliable detection observed consistently across different activities, people, and times End time Start time Prominent frequency 17

  18. System design of SurFi looped or not ? Data Pre- Attribute extraction Comparison Decision processing module module module module New Event (i) detected Event(1), S(1) Video Compute … attributes similarity Live video CSI event score Event(i), feed OpenPose detector module ( S(i) ) S(i) … CSI Event(N), attributes S(N) Wi-Fi CSI Denoise signal 18

  19. 1) Data preprocessing module: Preprocesses the raw video and CSI signals Video OpenPose 19

  20. 1) Data preprocessing module: Preprocesses the raw video and CSI signals Raw video signal Processed video signal Video OpenPose Raw CSI signal Processed CSI signal ✓ Filter high frequency CSI Denoise noises 20

  21. 2) CSI event detector module: Uses the motion energy to detect the start of a new event 1) Data pre- processing module 2) CSI event detector Start module 21

  22. 3) Attribute extraction module: Extracts common attributes Video Time Frequency Prominent Start time End time frequency CSI Time Frequency 22

  23. 4) Comparison module: Computes the per-event similarity score of a single event Per-attribute threshold Video 1 Time 0 Frequency 1 Prominent ∑ Compare Start time End time frequency 0 Per-event similarity score S(i) 1 [0, 3] 0 CSI Time Frequency 23

  24. 5) Decision module: Outputs looped or not after observing multiple events Event 1, S(1) Event 2, S(2) Not looped Decision Event 3, S(3) Compare S(i) are averaged threshold Looped Event 4, S(4) Event 5, S(5) The more the events seen, the higher the confidence for the final decision 24

  25. Experiment setup Place of interest • Redmi Note 4 phone camera (13- Megapixel) receiver transmitter • Wi-Fi transmitter receiver pair 2.6-meter Wi-Fi Wi-Fi set up on Thinkpad laptops running Linux 802.11n CSI tools participant 4.9-meter 25

  26. Three events ( E 1 ) ( E 2 ) ( E 3 ) stand/arm waving sit/clapping sit/fist thumping 26

  27. Clear difference in the per-event similarity Legit: High similarity score Attack: Low similarity score 27

  28. Multiple events are observed for a duration of time Example: 25 sec 15 sec 30 sec 23 sec 10 sec 10 sec 15 sec 13 sec 25 sec Time 28

  29. Attack detection accuracy increases with more events 5 events 98.8% 1 event 36% 29

  30. Future improvements • Stronger adversary • Performs criminal activities while replicating start + end times, prominent frequency of legitimate events • Future work: Investigate more attributes • Multiple events in sequence • Future work: Activity recognition techniques 30

  31. Deployment consideration 1 1 1 • Threshold calibration 0 0 0 • Adjust to the new environment Not looped Looped • Placement of the receiver behind-the-wall activities • Strategically placing the receiver way from the wall Wi-Fi Wi-Fi 31

  32. Conclusion • First practical system to detect surveillance camera looping attack in real-time • Defense technique requiring no additional hardware deployment • Attack detection accuracy of 98.8% with false positive rate of 0.1% • Future work : more diverse events, sophisticated adversary model 32

  33. Video shows a normal activity! valuable video feed looped ! security guard channel state information SurFi (CSI) Compare Wi-Fi receiver Place of interest Surveillance system Questions? nityalak@comp.nus.edu.sg 33

  34. Extra Slides 34

  35. Activities behind-the-wall may degrade the performance of SurFi Far Near Middle behind-the-wall receiver transmitter receiver receiver Wi-Fi Wi-Fi Wi-Fi Wi-Fi Conduct experiments to test behind-the-wall activities. 35

  36. Strategically placing the receiver at a certain distance from the wall will minimize false alarms ✓ Varying motion energy may lead to false detection of an activities. ✓ Activities are not detected since the corresponding motion energy is close to zero. 36

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend