An Analysis of DoS Attack on Robot Operating System

An Analysis of DoS Attack on Robot Operating System

The emergence of robotic technologies has made a significant contribution in industry. Robot Operating System (ROS) is becoming a standard framework for industrial systems uses as a middleware system with many versions. However, the initial design of ROS does not include cyber-security concepts. The intense interest in robot systems, the security concerns and vulnerabilities of these systems have started to attract the attention of attackers. One of these attacks is DoS attack that targeting system availability by slowing down or crashing a service rather than obtaining the information or system. In this study, the impact of DoS attack has been analyzed in various scenarios for both in application and transport layer of the ROS middleware.

___

  • [1] Internet: IFR Executive Summary World Robotics 2020 Industrial Robots, Online.https://ifr.org/img/worldrobotics/Executive_Summary_WR_2020_Industrial_Robots_1.pdf, (2020).
  • [2] Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., and Ng, A., "ROS: an open-source Robot Operating System", ICRA Workshop on Open Source Software, Kobe, 5, (2009).
  • [3] Rivera, S., Lagraa, S., and State, R., "ROSploit: Cybersecurity tool for ROS", 2019 Third IEEE International Conference on Robotic Computing (IRC), Naples, 415-416, (2019).
  • [4] Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., and Iyer, R., "Systems-theoretic safety assessment of robotic telesurgical systems", International Conference on Computer Safety, Reliability, and Security, Springer, Cham, 213-227, (2014).
  • [5] Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., and Schartner, P., "Security for the Robot Operating System", Robotics and Autonomous Systems, 98: 192-203, (2017).
  • [6] White, R., Christensen, D., Henrik, I., and Quigley, D., "SROS: Securing ROS over the wire, in the graph, and through the kernel", ArXiv, abs1611.07060, (2016).
  • [7] Narayanan, V., and Bobba, R. B., "Learning Based Anomaly Detection for Industrial Arm Applications", Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, 13-23, (2018).
  • [8] Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen, H., and Cortesi, A., "Penetration testing ROS", Robot Operating System (ROS), Springer, Cham, (2020).
  • [9] Wu, B., Chen, J., Wu, J., and Cardei, M., "A survey of attacks and countermeasures in mobile ad hoc networks", Wireless Network Security, Springer, Boston, (2007).
  • [10] Mirkovic, J., and Reiher, P., "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review, 34(2): 39-53, (2004).
  • [11] Specht, S., and Lee, R., "Taxonomies of distributed denial of service networks, attacks, tools and countermeasures", CE-L 2003-03, Princeton University, Princeton, NJ, (2003).
  • [12] Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W., "A survey of distributed denial-of-service attack, prevention, and mitigation techniques", International Journal of Distributed Sensor Networks, 13(12): 1-33, (2017).
  • [13] Salim, M. M., Rathore, S., and Park, J. H., "Distributed denial of service attacks and its defenses in IoT: a survey", The Journal of Supercomputing, 76(7): 5320-5363, (2019).
  • [14] Manavi, M. T., "Defense mechanisms against distributed denial of service attacks: a survey", Computers & Electrical Engineering, 72: 26-38, (2018).
  • [15] Durcekova, V., Schwartz, L., and Shahmehri, N., "Sophisticated denial of service attacks aimed at application layer", 2012 ELEKTRO, IEEE, Rajecke Teplice, 55-60, (2012).
  • [16] Saravanan, R., Shanmuganathan, S., and Palanichamy, Y., "Behavior-based detection of application layer distributed denial of service attacks during flash events", Turkish Journal of Electrical Engineering & Computer Sciences, 24(2): 510-523, (2016).
  • [17] Sreeram, I., and Vuppala, V. P. K., "HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm", Applied Computing and Informatics, 15(1): 59-66, (2019).
  • [18] Balsa-Comerón, J., Guerrero-Higueras, Á. M., Rodríguez-Lera, F. J., Fernández-Llamas, C., and Matellán-Olivera, V., "Cybersecurity in Autonomous Systems: Hardening ROS Using Encrypted Communications and Semantic Rules", Iberian Robotics Conference, Springer, Cham, 67-78, (2018).
  • [19] Dieber, B., Kacianka, S., Rass, S., and Schartner, P., "Application-level security for ROS-based applications", IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE, Daejeon, 4477-4482, (2016).
  • [20] Fernández Muro, B., "Securing Communications in Surgery Robots", Ph.D Thesis, Navarra University, Navarra, (2018).
  • [21] Huang, J., Erdogan, C., Zhang, Y., Moore, B., Luo, Q., Sundaresan, A., and Rosu, G., "ROSRV: Runtime Verification for Robots", International Conference on Runtime Verification, Springer, Cham, 247-254, (2014).
  • [22] Staffa, M., Mazzeo, G., and Sgaglione, L., "Hardening ROS via hardware-assisted trusted execution environment", 27th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), IEEE, Nanjing, 491-494, (2018).
  • [23] Rivera, S., Lagraa, S., Nita-Rotaru, C., Becker, S., and State, R., "ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications", IEEE Security and Privacy Workshops (SPW), San Fransisco, 114-119, (2019).
  • [24] http://wiki.ros.org/rosmon. Access date: 06.12.2020.
  • [25] Yayan, U., and Yazici, A., "Reliability-Based Multi-Robot Route Planning ", International Journal of Robotics and Automation, 34(3): 266-272, (2019).

___

Bibtex @araştırma makalesi { gujs976496, journal = {Gazi University Journal of Science}, eissn = {2147-1762}, address = {}, publisher = {Gazi Üniversitesi}, year = {2023}, volume = {36}, number = {3}, pages = {1050 - 1069}, doi = {10.35378/gujs.976496}, title = {An Analysis of DoS Attack on Robot Operating System}, key = {cite}, author = {Değirmenci, Elif and Kırca, Yunus Sabri and Yolaçan, Esra N. and Yazici, Ahmet} }
APA Değirmenci, E. , Kırca, Y. S. , Yolaçan, E. N. & Yazici, A. (2023). An Analysis of DoS Attack on Robot Operating System . Gazi University Journal of Science , 36 (3) , 1050-1069 . DOI: 10.35378/gujs.976496
MLA Değirmenci, E. , Kırca, Y. S. , Yolaçan, E. N. , Yazici, A. "An Analysis of DoS Attack on Robot Operating System" . Gazi University Journal of Science 36 (2023 ): 1050-1069 <
Chicago Değirmenci, E. , Kırca, Y. S. , Yolaçan, E. N. , Yazici, A. "An Analysis of DoS Attack on Robot Operating System". Gazi University Journal of Science 36 (2023 ): 1050-1069
RIS TY - JOUR T1 - An Analysis of DoS Attack on Robot Operating System AU - ElifDeğirmenci, Yunus SabriKırca, Esra N.Yolaçan, AhmetYazici Y1 - 2023 PY - 2023 N1 - doi: 10.35378/gujs.976496 DO - 10.35378/gujs.976496 T2 - Gazi University Journal of Science JF - Journal JO - JOR SP - 1050 EP - 1069 VL - 36 IS - 3 SN - -2147-1762 M3 - doi: 10.35378/gujs.976496 UR - Y2 - 2022 ER -
EndNote %0 Gazi University Journal of Science An Analysis of DoS Attack on Robot Operating System %A Elif Değirmenci , Yunus Sabri Kırca , Esra N. Yolaçan , Ahmet Yazici %T An Analysis of DoS Attack on Robot Operating System %D 2023 %J Gazi University Journal of Science %P -2147-1762 %V 36 %N 3 %R doi: 10.35378/gujs.976496 %U 10.35378/gujs.976496
ISNAD Değirmenci, Elif , Kırca, Yunus Sabri , Yolaçan, Esra N. , Yazici, Ahmet . "An Analysis of DoS Attack on Robot Operating System". Gazi University Journal of Science 36 / 3 (Eylül 2023): 1050-1069 .
AMA Değirmenci E. , Kırca Y. S. , Yolaçan E. N. , Yazici A. An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science. 2023; 36(3): 1050-1069.
Vancouver Değirmenci E. , Kırca Y. S. , Yolaçan E. N. , Yazici A. An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science. 2023; 36(3): 1050-1069.
IEEE E. Değirmenci , Y. S. Kırca , E. N. Yolaçan ve A. Yazici , "An Analysis of DoS Attack on Robot Operating System", , c. 36, sayı. 3, ss. 1050-1069, Eyl. 2023, doi:10.35378/gujs.976496