An Analysis of DoS Attack on Robot Operating System
Year 2023,
Volume: 36 Issue: 3, 1050 - 1069, 01.09.2023
Elif Değirmenci
,
Yunus Sabri Kırca
,
Esra N. Yolaçan
,
Ahmet Yazici
Abstract
The emergence of robotic technologies has made a significant contribution in industry. Robot Operating System (ROS) is becoming a standard framework for industrial systems uses as a middleware system with many versions. However, the initial design of ROS does not include cyber-security concepts. The intense interest in robot systems, the security concerns and vulnerabilities of these systems have started to attract the attention of attackers. One of these attacks is DoS attack that targeting system availability by slowing down or crashing a service rather than obtaining the information or system. In this study, the impact of DoS attack has been analyzed in various scenarios for both in application and transport layer of the ROS middleware.
In the experiments four different volume of DoS attacks are performed in five different experiment scenarios on ROS. To understand the impact of DoS attack, network traffics are monitored using Tshark. The resulting effects measured with some Quality of Service parameters that are delay and packet loss.
Supporting Institution
This work supported by the VALU3S project that has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 876852. . The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Czech Republic, Germany, Ireland, Italy, Portugal, Spain, Sweden, Turkey.
References
- [1] Internet: IFR Executive Summary World Robotics 2020 Industrial Robots, Online.https://ifr.org/img/worldrobotics/Executive_Summary_WR_2020_Industrial_Robots_1.pdf, (2020).
- [2] Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., and Ng, A., "ROS: an open-source Robot Operating System", ICRA Workshop on Open Source Software, Kobe, 5, (2009).
- [3] Rivera, S., Lagraa, S., and State, R., "ROSploit: Cybersecurity tool for ROS", 2019 Third IEEE International Conference on Robotic Computing (IRC), Naples, 415-416, (2019).
- [4] Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., and Iyer, R., "Systems-theoretic safety assessment of robotic telesurgical systems", International Conference on Computer Safety, Reliability, and Security, Springer, Cham, 213-227, (2014).
- [5] Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., and Schartner, P., "Security for the Robot Operating System", Robotics and Autonomous Systems, 98: 192-203, (2017).
- [6] White, R., Christensen, D., Henrik, I., and Quigley, D., "SROS: Securing ROS over the wire, in the graph, and through the kernel", ArXiv, abs1611.07060, (2016).
- [7] Narayanan, V., and Bobba, R. B., "Learning Based Anomaly Detection for Industrial Arm Applications", Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, 13-23, (2018).
- [8] Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen, H., and Cortesi, A., "Penetration testing ROS", Robot Operating System (ROS), Springer, Cham, (2020).
- [9] Wu, B., Chen, J., Wu, J., and Cardei, M., "A survey of attacks and countermeasures in mobile ad hoc networks", Wireless Network Security, Springer, Boston, (2007).
- [10] Mirkovic, J., and Reiher, P., "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review, 34(2): 39-53, (2004).
- [11] Specht, S., and Lee, R., "Taxonomies of distributed denial of service networks, attacks, tools and countermeasures", CE-L 2003-03, Princeton University, Princeton, NJ, (2003).
- [12] Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W., "A survey of distributed denial-of-service attack, prevention, and mitigation techniques", International Journal of Distributed Sensor Networks, 13(12): 1-33, (2017).
- [13] Salim, M. M., Rathore, S., and Park, J. H., "Distributed denial of service attacks and its defenses in IoT: a survey", The Journal of Supercomputing, 76(7): 5320-5363, (2019).
- [14] Manavi, M. T., "Defense mechanisms against distributed denial of service attacks: a survey", Computers & Electrical Engineering, 72: 26-38, (2018).
- [15] Durcekova, V., Schwartz, L., and Shahmehri, N., "Sophisticated denial of service attacks aimed at application layer", 2012 ELEKTRO, IEEE, Rajecke Teplice, 55-60, (2012).
- [16] Saravanan, R., Shanmuganathan, S., and Palanichamy, Y., "Behavior-based detection of application layer distributed denial of service attacks during flash events", Turkish Journal of Electrical Engineering & Computer Sciences, 24(2): 510-523, (2016).
- [17] Sreeram, I., and Vuppala, V. P. K., "HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm", Applied Computing and Informatics, 15(1): 59-66, (2019).
- [18] Balsa-Comerón, J., Guerrero-Higueras, Á. M., Rodríguez-Lera, F. J., Fernández-Llamas, C., and Matellán-Olivera, V., "Cybersecurity in Autonomous Systems: Hardening ROS Using Encrypted Communications and Semantic Rules", Iberian Robotics Conference, Springer, Cham, 67-78, (2018).
- [19] Dieber, B., Kacianka, S., Rass, S., and Schartner, P., "Application-level security for ROS-based applications", IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE, Daejeon, 4477-4482, (2016).
- [20] Fernández Muro, B., "Securing Communications in Surgery Robots", Ph.D Thesis, Navarra University, Navarra, (2018).
- [21] Huang, J., Erdogan, C., Zhang, Y., Moore, B., Luo, Q., Sundaresan, A., and Rosu, G., "ROSRV: Runtime Verification for Robots", International Conference on Runtime Verification, Springer, Cham, 247-254, (2014).
- [22] Staffa, M., Mazzeo, G., and Sgaglione, L., "Hardening ROS via hardware-assisted trusted execution environment", 27th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), IEEE, Nanjing, 491-494, (2018).
- [23] Rivera, S., Lagraa, S., Nita-Rotaru, C., Becker, S., and State, R., "ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications", IEEE Security and Privacy Workshops (SPW), San Fransisco, 114-119, (2019).
- [24] http://wiki.ros.org/rosmon. Access date: 06.12.2020.
- [25] Yayan, U., and Yazici, A., "Reliability-Based Multi-Robot Route Planning ", International Journal of Robotics and Automation, 34(3): 266-272, (2019).
Year 2023,
Volume: 36 Issue: 3, 1050 - 1069, 01.09.2023
Elif Değirmenci
,
Yunus Sabri Kırca
,
Esra N. Yolaçan
,
Ahmet Yazici
References
- [1] Internet: IFR Executive Summary World Robotics 2020 Industrial Robots, Online.https://ifr.org/img/worldrobotics/Executive_Summary_WR_2020_Industrial_Robots_1.pdf, (2020).
- [2] Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., and Ng, A., "ROS: an open-source Robot Operating System", ICRA Workshop on Open Source Software, Kobe, 5, (2009).
- [3] Rivera, S., Lagraa, S., and State, R., "ROSploit: Cybersecurity tool for ROS", 2019 Third IEEE International Conference on Robotic Computing (IRC), Naples, 415-416, (2019).
- [4] Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., and Iyer, R., "Systems-theoretic safety assessment of robotic telesurgical systems", International Conference on Computer Safety, Reliability, and Security, Springer, Cham, 213-227, (2014).
- [5] Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., and Schartner, P., "Security for the Robot Operating System", Robotics and Autonomous Systems, 98: 192-203, (2017).
- [6] White, R., Christensen, D., Henrik, I., and Quigley, D., "SROS: Securing ROS over the wire, in the graph, and through the kernel", ArXiv, abs1611.07060, (2016).
- [7] Narayanan, V., and Bobba, R. B., "Learning Based Anomaly Detection for Industrial Arm Applications", Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, 13-23, (2018).
- [8] Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen, H., and Cortesi, A., "Penetration testing ROS", Robot Operating System (ROS), Springer, Cham, (2020).
- [9] Wu, B., Chen, J., Wu, J., and Cardei, M., "A survey of attacks and countermeasures in mobile ad hoc networks", Wireless Network Security, Springer, Boston, (2007).
- [10] Mirkovic, J., and Reiher, P., "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review, 34(2): 39-53, (2004).
- [11] Specht, S., and Lee, R., "Taxonomies of distributed denial of service networks, attacks, tools and countermeasures", CE-L 2003-03, Princeton University, Princeton, NJ, (2003).
- [12] Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W., "A survey of distributed denial-of-service attack, prevention, and mitigation techniques", International Journal of Distributed Sensor Networks, 13(12): 1-33, (2017).
- [13] Salim, M. M., Rathore, S., and Park, J. H., "Distributed denial of service attacks and its defenses in IoT: a survey", The Journal of Supercomputing, 76(7): 5320-5363, (2019).
- [14] Manavi, M. T., "Defense mechanisms against distributed denial of service attacks: a survey", Computers & Electrical Engineering, 72: 26-38, (2018).
- [15] Durcekova, V., Schwartz, L., and Shahmehri, N., "Sophisticated denial of service attacks aimed at application layer", 2012 ELEKTRO, IEEE, Rajecke Teplice, 55-60, (2012).
- [16] Saravanan, R., Shanmuganathan, S., and Palanichamy, Y., "Behavior-based detection of application layer distributed denial of service attacks during flash events", Turkish Journal of Electrical Engineering & Computer Sciences, 24(2): 510-523, (2016).
- [17] Sreeram, I., and Vuppala, V. P. K., "HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm", Applied Computing and Informatics, 15(1): 59-66, (2019).
- [18] Balsa-Comerón, J., Guerrero-Higueras, Á. M., Rodríguez-Lera, F. J., Fernández-Llamas, C., and Matellán-Olivera, V., "Cybersecurity in Autonomous Systems: Hardening ROS Using Encrypted Communications and Semantic Rules", Iberian Robotics Conference, Springer, Cham, 67-78, (2018).
- [19] Dieber, B., Kacianka, S., Rass, S., and Schartner, P., "Application-level security for ROS-based applications", IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE, Daejeon, 4477-4482, (2016).
- [20] Fernández Muro, B., "Securing Communications in Surgery Robots", Ph.D Thesis, Navarra University, Navarra, (2018).
- [21] Huang, J., Erdogan, C., Zhang, Y., Moore, B., Luo, Q., Sundaresan, A., and Rosu, G., "ROSRV: Runtime Verification for Robots", International Conference on Runtime Verification, Springer, Cham, 247-254, (2014).
- [22] Staffa, M., Mazzeo, G., and Sgaglione, L., "Hardening ROS via hardware-assisted trusted execution environment", 27th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), IEEE, Nanjing, 491-494, (2018).
- [23] Rivera, S., Lagraa, S., Nita-Rotaru, C., Becker, S., and State, R., "ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications", IEEE Security and Privacy Workshops (SPW), San Fransisco, 114-119, (2019).
- [24] http://wiki.ros.org/rosmon. Access date: 06.12.2020.
- [25] Yayan, U., and Yazici, A., "Reliability-Based Multi-Robot Route Planning ", International Journal of Robotics and Automation, 34(3): 266-272, (2019).