An Analysis of DoS Attack on Robot Operating System

An Analysis of DoS Attack on Robot Operating System

The emergence of robotic technologies has made a significant contribution in industry. Robot Operating System (ROS) is becoming a standard framework for industrial systems uses as a middleware system with many versions. However, the initial design of ROS does not include cyber-security concepts. The intense interest in robot systems, the security concerns and vulnerabilities of these systems have started to attract the attention of attackers. One of these attacks is DoS attack that targeting system availability by slowing down or crashing a service rather than obtaining the information or system. In this study, the impact of DoS attack has been analyzed in various scenarios for both in application and transport layer of the ROS middleware.

___

  • [1] Internet: IFR Executive Summary World Robotics 2020 Industrial Robots, Online.https://ifr.org/img/worldrobotics/Executive_Summary_WR_2020_Industrial_Robots_1.pdf, (2020).
  • [2] Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., and Ng, A., "ROS: an open-source Robot Operating System", ICRA Workshop on Open Source Software, Kobe, 5, (2009).
  • [3] Rivera, S., Lagraa, S., and State, R., "ROSploit: Cybersecurity tool for ROS", 2019 Third IEEE International Conference on Robotic Computing (IRC), Naples, 415-416, (2019).
  • [4] Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., and Iyer, R., "Systems-theoretic safety assessment of robotic telesurgical systems", International Conference on Computer Safety, Reliability, and Security, Springer, Cham, 213-227, (2014).
  • [5] Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., and Schartner, P., "Security for the Robot Operating System", Robotics and Autonomous Systems, 98: 192-203, (2017).
  • [6] White, R., Christensen, D., Henrik, I., and Quigley, D., "SROS: Securing ROS over the wire, in the graph, and through the kernel", ArXiv, abs1611.07060, (2016).
  • [7] Narayanan, V., and Bobba, R. B., "Learning Based Anomaly Detection for Industrial Arm Applications", Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, 13-23, (2018).
  • [8] Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen, H., and Cortesi, A., "Penetration testing ROS", Robot Operating System (ROS), Springer, Cham, (2020).
  • [9] Wu, B., Chen, J., Wu, J., and Cardei, M., "A survey of attacks and countermeasures in mobile ad hoc networks", Wireless Network Security, Springer, Boston, (2007).
  • [10] Mirkovic, J., and Reiher, P., "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review, 34(2): 39-53, (2004).
  • [11] Specht, S., and Lee, R., "Taxonomies of distributed denial of service networks, attacks, tools and countermeasures", CE-L 2003-03, Princeton University, Princeton, NJ, (2003).
  • [12] Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W., "A survey of distributed denial-of-service attack, prevention, and mitigation techniques", International Journal of Distributed Sensor Networks, 13(12): 1-33, (2017).
  • [13] Salim, M. M., Rathore, S., and Park, J. H., "Distributed denial of service attacks and its defenses in IoT: a survey", The Journal of Supercomputing, 76(7): 5320-5363, (2019).
  • [14] Manavi, M. T., "Defense mechanisms against distributed denial of service attacks: a survey", Computers & Electrical Engineering, 72: 26-38, (2018).
  • [15] Durcekova, V., Schwartz, L., and Shahmehri, N., "Sophisticated denial of service attacks aimed at application layer", 2012 ELEKTRO, IEEE, Rajecke Teplice, 55-60, (2012).
  • [16] Saravanan, R., Shanmuganathan, S., and Palanichamy, Y., "Behavior-based detection of application layer distributed denial of service attacks during flash events", Turkish Journal of Electrical Engineering & Computer Sciences, 24(2): 510-523, (2016).
  • [17] Sreeram, I., and Vuppala, V. P. K., "HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm", Applied Computing and Informatics, 15(1): 59-66, (2019).
  • [18] Balsa-Comerón, J., Guerrero-Higueras, Á. M., Rodríguez-Lera, F. J., Fernández-Llamas, C., and Matellán-Olivera, V., "Cybersecurity in Autonomous Systems: Hardening ROS Using Encrypted Communications and Semantic Rules", Iberian Robotics Conference, Springer, Cham, 67-78, (2018).
  • [19] Dieber, B., Kacianka, S., Rass, S., and Schartner, P., "Application-level security for ROS-based applications", IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE, Daejeon, 4477-4482, (2016).
  • [20] Fernández Muro, B., "Securing Communications in Surgery Robots", Ph.D Thesis, Navarra University, Navarra, (2018).
  • [21] Huang, J., Erdogan, C., Zhang, Y., Moore, B., Luo, Q., Sundaresan, A., and Rosu, G., "ROSRV: Runtime Verification for Robots", International Conference on Runtime Verification, Springer, Cham, 247-254, (2014).
  • [22] Staffa, M., Mazzeo, G., and Sgaglione, L., "Hardening ROS via hardware-assisted trusted execution environment", 27th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), IEEE, Nanjing, 491-494, (2018).
  • [23] Rivera, S., Lagraa, S., Nita-Rotaru, C., Becker, S., and State, R., "ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications", IEEE Security and Privacy Workshops (SPW), San Fransisco, 114-119, (2019).
  • [24] http://wiki.ros.org/rosmon. Access date: 06.12.2020.
  • [25] Yayan, U., and Yazici, A., "Reliability-Based Multi-Robot Route Planning ", International Journal of Robotics and Automation, 34(3): 266-272, (2019).
Gazi University Journal of Science-Cover
  • Yayın Aralığı: Yılda 4 Sayı
  • Başlangıç: 1988
  • Yayıncı: Gazi Üniversitesi, Fen Bilimleri Enstitüsü
Sayıdaki Diğer Makaleler

Numerical Analysis of Air Flow in an Industrial Refrigeration System and Its Effect on Energy Consumption

Serhat KARYEYEN, Mustafa AKTAŞ, Alperen OKUR, Fatma Nur ERDOĞMUŞ

Lumbar Spinal Stenosis Analysis with Deep Learning Based Decision Support Systems

Sinan ALTUN, Ahmet ALKAN

The Study of Interaction Activity of Nickel (ll) Phthalocyanine Complex Bearing Tetra Substituted Phenoxy-3-Methoxybenzoic Acid Groups with DNA

Ali ARSLANTAS, Mehmet Salih AĞIRTAŞ

A Comparative Assessment of Five Different Distributions Based on Five Different Optimization Methods for Modeling Wind Speed Distribution

Mohammed WADİ, Wisam ELMASRY

ANN Identification technique and fuzzy PI Control of a Hybrid Indirect Matrix Converter with a Flying Capacitor three level Inverter in Power Active Filtering Application

Taki Eddine AMEUR, Aissa AMEUR, Benalia ATALLAH

Comparison of the Performance of Solar Panels Designed in Three Different Ways under the Same Conditions

Mehmet Ali SALDAMLI, Yusuf Alper KAPLAN, Gülizar Gizem ÜNALDI

A Fuzzy Logic Approach and Path Algorithm for Time and Energy Management of Smart Cleaning Robots

Hakan ŞİMŞEK, Faize Nur ERTÜRK, Recep ŞEKER

A Comparative Study on Denoising from Facial Images Using Convolutional Autoencoder

Muazzez Buket DARICI, Zeki ERDEM

Effect of Wall Colors and Usage Rates on The Perception of Interior Spaces

Kübra AKSOY ÖZLER, M. Lütfi HİDAYETOĞLU, Kemal YILDIRIM

Discrete-Time Gompertz Model for Adana Breed Pigeons

Levent ÖZBEK