Research Article
BibTex RIS Cite

An Analysis of DoS Attack on Robot Operating System

Year 2023, , 1050 - 1069, 01.09.2023
https://doi.org/10.35378/gujs.976496

Abstract

The emergence of robotic technologies has made a significant contribution in industry. Robot Operating System (ROS) is becoming a standard framework for industrial systems uses as a middleware system with many versions. However, the initial design of ROS does not include cyber-security concepts. The intense interest in robot systems, the security concerns and vulnerabilities of these systems have started to attract the attention of attackers. One of these attacks is DoS attack that targeting system availability by slowing down or crashing a service rather than obtaining the information or system. In this study, the impact of DoS attack has been analyzed in various scenarios for both in application and transport layer of the ROS middleware.
In the experiments four different volume of DoS attacks are performed in five different experiment scenarios on ROS. To understand the impact of DoS attack, network traffics are monitored using Tshark. The resulting effects measured with some Quality of Service parameters that are delay and packet loss. 

Supporting Institution

This work supported by the VALU3S project that has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 876852. . The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Czech Republic, Germany, Ireland, Italy, Portugal, Spain, Sweden, Turkey.

Project Number

876852

References

  • [1] Internet: IFR Executive Summary World Robotics 2020 Industrial Robots, Online.https://ifr.org/img/worldrobotics/Executive_Summary_WR_2020_Industrial_Robots_1.pdf, (2020).
  • [2] Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., and Ng, A., "ROS: an open-source Robot Operating System", ICRA Workshop on Open Source Software, Kobe, 5, (2009).
  • [3] Rivera, S., Lagraa, S., and State, R., "ROSploit: Cybersecurity tool for ROS", 2019 Third IEEE International Conference on Robotic Computing (IRC), Naples, 415-416, (2019).
  • [4] Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., and Iyer, R., "Systems-theoretic safety assessment of robotic telesurgical systems", International Conference on Computer Safety, Reliability, and Security, Springer, Cham, 213-227, (2014).
  • [5] Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., and Schartner, P., "Security for the Robot Operating System", Robotics and Autonomous Systems, 98: 192-203, (2017).
  • [6] White, R., Christensen, D., Henrik, I., and Quigley, D., "SROS: Securing ROS over the wire, in the graph, and through the kernel", ArXiv, abs1611.07060, (2016).
  • [7] Narayanan, V., and Bobba, R. B., "Learning Based Anomaly Detection for Industrial Arm Applications", Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, 13-23, (2018).
  • [8] Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen, H., and Cortesi, A., "Penetration testing ROS", Robot Operating System (ROS), Springer, Cham, (2020).
  • [9] Wu, B., Chen, J., Wu, J., and Cardei, M., "A survey of attacks and countermeasures in mobile ad hoc networks", Wireless Network Security, Springer, Boston, (2007).
  • [10] Mirkovic, J., and Reiher, P., "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review, 34(2): 39-53, (2004).
  • [11] Specht, S., and Lee, R., "Taxonomies of distributed denial of service networks, attacks, tools and countermeasures", CE-L 2003-03, Princeton University, Princeton, NJ, (2003).
  • [12] Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W., "A survey of distributed denial-of-service attack, prevention, and mitigation techniques", International Journal of Distributed Sensor Networks, 13(12): 1-33, (2017).
  • [13] Salim, M. M., Rathore, S., and Park, J. H., "Distributed denial of service attacks and its defenses in IoT: a survey", The Journal of Supercomputing, 76(7): 5320-5363, (2019).
  • [14] Manavi, M. T., "Defense mechanisms against distributed denial of service attacks: a survey", Computers & Electrical Engineering, 72: 26-38, (2018).
  • [15] Durcekova, V., Schwartz, L., and Shahmehri, N., "Sophisticated denial of service attacks aimed at application layer", 2012 ELEKTRO, IEEE, Rajecke Teplice, 55-60, (2012).
  • [16] Saravanan, R., Shanmuganathan, S., and Palanichamy, Y., "Behavior-based detection of application layer distributed denial of service attacks during flash events", Turkish Journal of Electrical Engineering & Computer Sciences, 24(2): 510-523, (2016).
  • [17] Sreeram, I., and Vuppala, V. P. K., "HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm", Applied Computing and Informatics, 15(1): 59-66, (2019).
  • [18] Balsa-Comerón, J., Guerrero-Higueras, Á. M., Rodríguez-Lera, F. J., Fernández-Llamas, C., and Matellán-Olivera, V., "Cybersecurity in Autonomous Systems: Hardening ROS Using Encrypted Communications and Semantic Rules", Iberian Robotics Conference, Springer, Cham, 67-78, (2018).
  • [19] Dieber, B., Kacianka, S., Rass, S., and Schartner, P., "Application-level security for ROS-based applications", IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE, Daejeon, 4477-4482, (2016).
  • [20] Fernández Muro, B., "Securing Communications in Surgery Robots", Ph.D Thesis, Navarra University, Navarra, (2018).
  • [21] Huang, J., Erdogan, C., Zhang, Y., Moore, B., Luo, Q., Sundaresan, A., and Rosu, G., "ROSRV: Runtime Verification for Robots", International Conference on Runtime Verification, Springer, Cham, 247-254, (2014).
  • [22] Staffa, M., Mazzeo, G., and Sgaglione, L., "Hardening ROS via hardware-assisted trusted execution environment", 27th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), IEEE, Nanjing, 491-494, (2018).
  • [23] Rivera, S., Lagraa, S., Nita-Rotaru, C., Becker, S., and State, R., "ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications", IEEE Security and Privacy Workshops (SPW), San Fransisco, 114-119, (2019).
  • [24] http://wiki.ros.org/rosmon. Access date: 06.12.2020.
  • [25] Yayan, U., and Yazici, A., "Reliability-Based Multi-Robot Route Planning ", International Journal of Robotics and Automation, 34(3): 266-272, (2019).
Year 2023, , 1050 - 1069, 01.09.2023
https://doi.org/10.35378/gujs.976496

Abstract

Project Number

876852

References

  • [1] Internet: IFR Executive Summary World Robotics 2020 Industrial Robots, Online.https://ifr.org/img/worldrobotics/Executive_Summary_WR_2020_Industrial_Robots_1.pdf, (2020).
  • [2] Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., and Ng, A., "ROS: an open-source Robot Operating System", ICRA Workshop on Open Source Software, Kobe, 5, (2009).
  • [3] Rivera, S., Lagraa, S., and State, R., "ROSploit: Cybersecurity tool for ROS", 2019 Third IEEE International Conference on Robotic Computing (IRC), Naples, 415-416, (2019).
  • [4] Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., and Iyer, R., "Systems-theoretic safety assessment of robotic telesurgical systems", International Conference on Computer Safety, Reliability, and Security, Springer, Cham, 213-227, (2014).
  • [5] Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., and Schartner, P., "Security for the Robot Operating System", Robotics and Autonomous Systems, 98: 192-203, (2017).
  • [6] White, R., Christensen, D., Henrik, I., and Quigley, D., "SROS: Securing ROS over the wire, in the graph, and through the kernel", ArXiv, abs1611.07060, (2016).
  • [7] Narayanan, V., and Bobba, R. B., "Learning Based Anomaly Detection for Industrial Arm Applications", Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, 13-23, (2018).
  • [8] Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen, H., and Cortesi, A., "Penetration testing ROS", Robot Operating System (ROS), Springer, Cham, (2020).
  • [9] Wu, B., Chen, J., Wu, J., and Cardei, M., "A survey of attacks and countermeasures in mobile ad hoc networks", Wireless Network Security, Springer, Boston, (2007).
  • [10] Mirkovic, J., and Reiher, P., "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review, 34(2): 39-53, (2004).
  • [11] Specht, S., and Lee, R., "Taxonomies of distributed denial of service networks, attacks, tools and countermeasures", CE-L 2003-03, Princeton University, Princeton, NJ, (2003).
  • [12] Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W., "A survey of distributed denial-of-service attack, prevention, and mitigation techniques", International Journal of Distributed Sensor Networks, 13(12): 1-33, (2017).
  • [13] Salim, M. M., Rathore, S., and Park, J. H., "Distributed denial of service attacks and its defenses in IoT: a survey", The Journal of Supercomputing, 76(7): 5320-5363, (2019).
  • [14] Manavi, M. T., "Defense mechanisms against distributed denial of service attacks: a survey", Computers & Electrical Engineering, 72: 26-38, (2018).
  • [15] Durcekova, V., Schwartz, L., and Shahmehri, N., "Sophisticated denial of service attacks aimed at application layer", 2012 ELEKTRO, IEEE, Rajecke Teplice, 55-60, (2012).
  • [16] Saravanan, R., Shanmuganathan, S., and Palanichamy, Y., "Behavior-based detection of application layer distributed denial of service attacks during flash events", Turkish Journal of Electrical Engineering & Computer Sciences, 24(2): 510-523, (2016).
  • [17] Sreeram, I., and Vuppala, V. P. K., "HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm", Applied Computing and Informatics, 15(1): 59-66, (2019).
  • [18] Balsa-Comerón, J., Guerrero-Higueras, Á. M., Rodríguez-Lera, F. J., Fernández-Llamas, C., and Matellán-Olivera, V., "Cybersecurity in Autonomous Systems: Hardening ROS Using Encrypted Communications and Semantic Rules", Iberian Robotics Conference, Springer, Cham, 67-78, (2018).
  • [19] Dieber, B., Kacianka, S., Rass, S., and Schartner, P., "Application-level security for ROS-based applications", IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE, Daejeon, 4477-4482, (2016).
  • [20] Fernández Muro, B., "Securing Communications in Surgery Robots", Ph.D Thesis, Navarra University, Navarra, (2018).
  • [21] Huang, J., Erdogan, C., Zhang, Y., Moore, B., Luo, Q., Sundaresan, A., and Rosu, G., "ROSRV: Runtime Verification for Robots", International Conference on Runtime Verification, Springer, Cham, 247-254, (2014).
  • [22] Staffa, M., Mazzeo, G., and Sgaglione, L., "Hardening ROS via hardware-assisted trusted execution environment", 27th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), IEEE, Nanjing, 491-494, (2018).
  • [23] Rivera, S., Lagraa, S., Nita-Rotaru, C., Becker, S., and State, R., "ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications", IEEE Security and Privacy Workshops (SPW), San Fransisco, 114-119, (2019).
  • [24] http://wiki.ros.org/rosmon. Access date: 06.12.2020.
  • [25] Yayan, U., and Yazici, A., "Reliability-Based Multi-Robot Route Planning ", International Journal of Robotics and Automation, 34(3): 266-272, (2019).
There are 25 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Computer Engineering
Authors

Elif Değirmenci 0000-0001-8772-4543

Yunus Sabri Kırca 0000-0001-5938-2822

Esra N. Yolaçan 0000-0002-0008-1037

Ahmet Yazici 0000-0001-5589-2032

Project Number 876852
Publication Date September 1, 2023
Published in Issue Year 2023

Cite

APA Değirmenci, E., Kırca, Y. S., Yolaçan, E. N., Yazici, A. (2023). An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science, 36(3), 1050-1069. https://doi.org/10.35378/gujs.976496
AMA Değirmenci E, Kırca YS, Yolaçan EN, Yazici A. An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science. September 2023;36(3):1050-1069. doi:10.35378/gujs.976496
Chicago Değirmenci, Elif, Yunus Sabri Kırca, Esra N. Yolaçan, and Ahmet Yazici. “An Analysis of DoS Attack on Robot Operating System”. Gazi University Journal of Science 36, no. 3 (September 2023): 1050-69. https://doi.org/10.35378/gujs.976496.
EndNote Değirmenci E, Kırca YS, Yolaçan EN, Yazici A (September 1, 2023) An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science 36 3 1050–1069.
IEEE E. Değirmenci, Y. S. Kırca, E. N. Yolaçan, and A. Yazici, “An Analysis of DoS Attack on Robot Operating System”, Gazi University Journal of Science, vol. 36, no. 3, pp. 1050–1069, 2023, doi: 10.35378/gujs.976496.
ISNAD Değirmenci, Elif et al. “An Analysis of DoS Attack on Robot Operating System”. Gazi University Journal of Science 36/3 (September 2023), 1050-1069. https://doi.org/10.35378/gujs.976496.
JAMA Değirmenci E, Kırca YS, Yolaçan EN, Yazici A. An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science. 2023;36:1050–1069.
MLA Değirmenci, Elif et al. “An Analysis of DoS Attack on Robot Operating System”. Gazi University Journal of Science, vol. 36, no. 3, 2023, pp. 1050-69, doi:10.35378/gujs.976496.
Vancouver Değirmenci E, Kırca YS, Yolaçan EN, Yazici A. An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science. 2023;36(3):1050-69.