An Analysis of DoS Attack on Robot Operating System

An Analysis of DoS Attack on Robot Operating System

The emergence of robotic technologies has made a significant contribution in industry. Robot Operating System (ROS) is becoming a standard framework for industrial systems uses as a middleware system with many versions. However, the initial design of ROS does not include cyber-security concepts. The intense interest in robot systems, the security concerns and vulnerabilities of these systems have started to attract the attention of attackers. One of these attacks is DoS attack that targeting system availability by slowing down or crashing a service rather than obtaining the information or system. In this study, the impact of DoS attack has been analyzed in various scenarios for both in application and transport layer of the ROS middleware.

___

  • [1] Internet: IFR Executive Summary World Robotics 2020 Industrial Robots, Online.https://ifr.org/img/worldrobotics/Executive_Summary_WR_2020_Industrial_Robots_1.pdf, (2020).
  • [2] Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., and Ng, A., "ROS: an open-source Robot Operating System", ICRA Workshop on Open Source Software, Kobe, 5, (2009).
  • [3] Rivera, S., Lagraa, S., and State, R., "ROSploit: Cybersecurity tool for ROS", 2019 Third IEEE International Conference on Robotic Computing (IRC), Naples, 415-416, (2019).
  • [4] Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., and Iyer, R., "Systems-theoretic safety assessment of robotic telesurgical systems", International Conference on Computer Safety, Reliability, and Security, Springer, Cham, 213-227, (2014).
  • [5] Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., and Schartner, P., "Security for the Robot Operating System", Robotics and Autonomous Systems, 98: 192-203, (2017).
  • [6] White, R., Christensen, D., Henrik, I., and Quigley, D., "SROS: Securing ROS over the wire, in the graph, and through the kernel", ArXiv, abs1611.07060, (2016).
  • [7] Narayanan, V., and Bobba, R. B., "Learning Based Anomaly Detection for Industrial Arm Applications", Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, 13-23, (2018).
  • [8] Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen, H., and Cortesi, A., "Penetration testing ROS", Robot Operating System (ROS), Springer, Cham, (2020).
  • [9] Wu, B., Chen, J., Wu, J., and Cardei, M., "A survey of attacks and countermeasures in mobile ad hoc networks", Wireless Network Security, Springer, Boston, (2007).
  • [10] Mirkovic, J., and Reiher, P., "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review, 34(2): 39-53, (2004).
  • [11] Specht, S., and Lee, R., "Taxonomies of distributed denial of service networks, attacks, tools and countermeasures", CE-L 2003-03, Princeton University, Princeton, NJ, (2003).
  • [12] Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W., "A survey of distributed denial-of-service attack, prevention, and mitigation techniques", International Journal of Distributed Sensor Networks, 13(12): 1-33, (2017).
  • [13] Salim, M. M., Rathore, S., and Park, J. H., "Distributed denial of service attacks and its defenses in IoT: a survey", The Journal of Supercomputing, 76(7): 5320-5363, (2019).
  • [14] Manavi, M. T., "Defense mechanisms against distributed denial of service attacks: a survey", Computers & Electrical Engineering, 72: 26-38, (2018).
  • [15] Durcekova, V., Schwartz, L., and Shahmehri, N., "Sophisticated denial of service attacks aimed at application layer", 2012 ELEKTRO, IEEE, Rajecke Teplice, 55-60, (2012).
  • [16] Saravanan, R., Shanmuganathan, S., and Palanichamy, Y., "Behavior-based detection of application layer distributed denial of service attacks during flash events", Turkish Journal of Electrical Engineering & Computer Sciences, 24(2): 510-523, (2016).
  • [17] Sreeram, I., and Vuppala, V. P. K., "HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm", Applied Computing and Informatics, 15(1): 59-66, (2019).
  • [18] Balsa-Comerón, J., Guerrero-Higueras, Á. M., Rodríguez-Lera, F. J., Fernández-Llamas, C., and Matellán-Olivera, V., "Cybersecurity in Autonomous Systems: Hardening ROS Using Encrypted Communications and Semantic Rules", Iberian Robotics Conference, Springer, Cham, 67-78, (2018).
  • [19] Dieber, B., Kacianka, S., Rass, S., and Schartner, P., "Application-level security for ROS-based applications", IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE, Daejeon, 4477-4482, (2016).
  • [20] Fernández Muro, B., "Securing Communications in Surgery Robots", Ph.D Thesis, Navarra University, Navarra, (2018).
  • [21] Huang, J., Erdogan, C., Zhang, Y., Moore, B., Luo, Q., Sundaresan, A., and Rosu, G., "ROSRV: Runtime Verification for Robots", International Conference on Runtime Verification, Springer, Cham, 247-254, (2014).
  • [22] Staffa, M., Mazzeo, G., and Sgaglione, L., "Hardening ROS via hardware-assisted trusted execution environment", 27th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), IEEE, Nanjing, 491-494, (2018).
  • [23] Rivera, S., Lagraa, S., Nita-Rotaru, C., Becker, S., and State, R., "ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications", IEEE Security and Privacy Workshops (SPW), San Fransisco, 114-119, (2019).
  • [24] http://wiki.ros.org/rosmon. Access date: 06.12.2020.
  • [25] Yayan, U., and Yazici, A., "Reliability-Based Multi-Robot Route Planning ", International Journal of Robotics and Automation, 34(3): 266-272, (2019).
Gazi University Journal of Science-Cover
  • Yayın Aralığı: 4
  • Başlangıç: 1988
  • Yayıncı: Gazi Üniversitesi, Fen Bilimleri Enstitüsü
Sayıdaki Diğer Makaleler

A Fuzzy Logic Approach and Path Algorithm for Time and Energy Management of Smart Cleaning Robots

Hakan ŞİMŞEK, Faize Nur ERTÜRK, Recep ŞEKER

The Study of Interaction Activity of Nickel (ll) Phthalocyanine Complex Bearing Tetra Substituted Phenoxy-3-Methoxybenzoic Acid Groups with DNA

Ali ARSLANTAS, Mehmet Salih AĞIRTAŞ

Integral Fuzzy Sliding Mode Controller for Hydraulic System Using Neural Network Modelling

Ayça AK, Erdal YILMAZ, Sevan KATRANCIOĞLU

Geometric Patterns Used in the Architecture of Kaboud Mosque in Tabriz, Iran

Mahya GHOUCHANİ, Faeze GHOLİZADE, Hooman SOBOUTİ

A Systematic Review of Transfer Learning-Based Approaches for Diabetic Retinopathy Detection

Burcu OLTU, Büşra Kübra KARACA, Hamit ERDEM, Atilla ÖZGÜR

Framework for Heterogeneous Sensor Data Stream Management with BIM and WSN

Ozgun PINARER

Characterization of Divalent Metal Soaps of Cannabis Sativa Seed Oil

Senem YETGİN, Theresa O. EGBUCHUNAM, Felix OKİEİMEN, Kutalmış GÖKKUŞ, Kerim GÜNEY

Numerical Analysis of Air Flow in an Industrial Refrigeration System and Its Effect on Energy Consumption

Serhat KARYEYEN, Mustafa AKTAŞ, Alperen OKUR, Fatma Nur ERDOĞMUŞ

Effect of Post-thermal Annealing on the Structural, Morphological, and Optical Properties of RF-sputtered In2S3 Thin Films

Neslihan AKCAY, Berkcan ERENLER, Yunus ÖZEN, Valery GREMENOK, Konstantin Pavlovich BUSKIS, Süleyman ÖZÇELİK

Design and Implementation of MRAC & MRAC-PID Feedback for Turntable

Saıbal MANNA, Deepak Kumar SİNGH, Ashok Kumar AKELLA