Home > News > Wireless video doorbell technical defects
Wireless video doorbell technical defects
2012-10-12 08:19:52

 

1 unauthorized access data attack

Unauthorized access to data type of attack is the main purpose of acquiring wireless interface to transfer user data and / or signaling data. The method has the following several kinds:

Tapping the user data acquiring user information content

Tapping signaling data acquisition network management information and other information for active attack

Wireless tracking mobile access to user's identity and location information, wireless tracking

Passive transport stream analysis to forecast user communication content and purpose

Active transport stream analysis to gain access to information

2 unauthorized access network service attack

In the unauthorized access network services attack, the attacker by fake a legitimate mobile subscriber identity to cheat the network end, authorized access to network services, and to avoid paying, but by being fake mobile users pay for the attacker.

The 3 threats to data integrity attack

Threats to data integrity type target wireless interface of user data flow and signaling data stream, the attacker by modifying, insert, delete or retransmission of the data stream to realize data receiver to deceive, to achieve some kind of attack intention.

In building intercom mobile communication network, network terminal composition is quite complex, which not only includes many functional units, and between different units of communication media are not the same. So the security of mobile communication network terminal also has some noticeable unsafe factors such as wireless wiretapping, identity counterfeit, tampering with the data and service denial and so on. According to the different types of attacks, the following four categories:

1 unauthorized access data attack

Unauthorized access to the data of the main attack goal is to get the network terminal unit transmits user data and signaling data, specific methods are as follows:

Tapping the user data acquiring user communication content

Tapping signaling data access security management data and other information is conducive to active attack

Fake communication receiver for obtaining user data, signaling data and other information is conducive to active attack

Passive transport stream analysis to gain access to information

Illegal access to system memory data acquisition system stores data such as the legitimate user authentication parameters

2 unauthorized access network service attack

Unauthorized access to network service class of attack is the main purpose of access network and escape the payment, the concrete manifestations are as follows:

Counterfeiting legitimate for the access network service authorization

Fake service network access to network services

Fake home network access can fake legitimate user identity authentication parameters

Abuse of power is a paid users access to Web Services

The abuse of network services authority to obtain illegal profit


  [Return Home] [Print] [Go Back]   

Contact Us

  • Contact Person:

    DongGuang HongZhao Innovation Electronic Co., Ltd.
  • Tel:

    0769-83532821
  • Fax:

    0769-86969800
  • E-mail:

    hongzhao@hongzhao-china.com