A Forensic Investigation of the Robot Operating System

被引:8
作者
Abeykoon, Iroshan [1 ]
Feng, Xiaohua [1 ]
机构
[1] Univ Bedfordshire, Dept Comp Sci & Technol, Luton, Beds, England
来源
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA) | 2017年
关键词
Robot Operating System; Forensics Tool Kit; Computer Emergency Response Team; Association of Chief Police Officers;
D O I
10.1109/iThings-GreenCom-CPSCom-SmartData.2017.131
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Robot Operating System (ROS) is a framework that is mostly used in industrial applications such as automotive, healthcare and manufacturing and it is not immune from potential future hacking. By carrying out various types of cyber-attacks, hackers can disrupt the normal operation of a robot. It is easy to get control of communication between a robot and a human due to the open communication network after carrying out malicious attacks to jam the network. As a result, hackers can change commands which are sent by an operator to the robot, making usual activities impossible. For instance, in a case of ROS hacking, man-in-the-middle attacks, Trojans, backdoor attacks, and so on, can change the behaNiour of robots to something completely different than expected. Therefore, forensic analysts require a specific method to forensically investigate ROS. This is a new area in the computer forensics field. Therefore, it is proposed to create an analytical framework to facilitate the forensic investigation of the Robot Operating System and methodologies and standards for acquiring related digital evidence using forensic tools. This study addresses a formalized and structured methodology that would assist the forensic investigation approach. This research will help to enhance the gathering, identification and preservation of evidence related to forensics investigations of the Robot Operating System. The forensic analysts could adapt the examination procedure of hacked ROS with a focused, crime-specific, forensics framework.
引用
收藏
页码:851 / 857
页数:7
相关论文
共 21 条
  • [1] Abdulhayoglu M., 2008, SYSTEM PERFORMING SE
  • [2] ACPO, 2012, WAL NO IR E CRIM STR
  • [3] Allen Lee., 2014, KALI LINUX ASSURING
  • [4] Altheide C, 2011, DIGITAL FORENSICS WITH OPEN SOURCE TOOLS, P1
  • [5] [Anonymous], 2009, INSECURE
  • [6] [Anonymous], 2001, ROAD MAP DIGITAL FOR
  • [7] [Anonymous], 2009, INT MULT SERV ARCH A
  • [8] Carrier B., 2005, File System Forensic Analysis
  • [9] Choi B., 2005, SYSTEM METHOD ANAL M
  • [10] Elder B., 2012, EVIDENCE TECHNOL MAY