Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario
Abstract
:1. Introduction
2. Related Work
2.1. Slow DoS
2.2. ROS Security
3. ROS Primer
3.1. History
3.2. Basic Concepts
3.3. ROS Master Protocol
4. Attack Context and Description
4.1. Underlying Protocol Mechanisms
4.2. Kernel Behavior and System Limits in TCP Connection Handling
- When they have been fully established from the TCP/IP protocol stack point of view, incoming connections enter the backlog of the listening socket, waiting to be accepted by the server by means of an accept() system call. The actual limit to the backlog length is primarily set by the server through the second parameter of listen(), but a kernel parameter sets an upper bound to what the server may ask for. The parameter is net.core.somaxconn, and its default value is 4096 on the nodes used in our test bed.
- As also discussed in Section 4.1, when the server eventually tries to accept an incoming connection, a new socket must be allocated for it within the accept(). Linux, like many other operating systems, represents a socket in user space with a file descriptor. Therefore, the maximum number of connections a server can accept is also limited by the maximum number of open file descriptors the server is allowed to have.
- The server accepts the first incoming connections, where k represents the number of file descriptors already opened by the server for other purposes.
- Then, b more connections are established at the TCP level but stay in the listening socket backlog.
- Eventually, further connections requests are postponed by the TCP/IP protocol stack, which stops acknowledging incoming SYNs.
4.3. Slow DoS Attack Description and Analysys
- In the system initialization and setup phase, regular ROS nodes interact with the ROS Master to register themselves as publishers and/or subscribers. The attacker does not interfere with this phase.
- ROS nodes typically do not interact with the ROS master anymore when the system enters the operational phase. Instead, they exchange process data through dedicated point-to-point TCP connections and may query the ROS parameter server. As also mentioned in Section 3.2, in the ROS version considered in this paper, parameter server access is not as sporadic as it was supposed to be when ROS was designed. Even more importantly, its use is not at all confined to the setup phase.
- At this point, the attacker opens a number of TCP connections to the ROS Master by conducting the three-way handshake shown in Figure 2 and, optionally, sending partial requests to it. As described in Section 4.1, the ROS Master has to allocate some resources for each open connection.
- As the number of malicious connections keeps increasing, the ROS Master exhausts its resources. Most notably, it runs out of file descriptors as outlined in Section 4.2. Resource exhaustion affects not only the ROS Master but also the parameter server since they share the same pool of process-level file descriptors.
- The final effect of the attack is that operational ROS nodes become unable to reach the parameter server. Moreover, any ROS node that attempts to recover and repeat the setup phase to become operational again can no longer communicate with the ROS Master to announce itself.
5. Test Bed
- Node alice, depicted on the right of the figure, is an Interbotix PincherX-100 robot arm (4 DOF plus gripper) controlled by an 8th Gen Intel NUC equipped with the Interbotix-provided distribution of Ubuntu 20.04 and ROS noetic. It corresponds to one of the regular ROS nodes depicted on the right side of Figure 4. The NUC runs the ROS joint control software and, possibly, additional ROS applications that implement any local robot arm control algorithms needed by the application at hand.
- Nodes alpha, bravo, and charlie are also regular ROS nodes, based on Raspberry PI 3 model B boards equipped with an off-the-shelf distribution of Ubuntu 20.04 and ROS noetic. They run ROS code that performs various higher-level system coordination and supervision functions. According to the guidelines presented in [51], alpha also hosts the centralized ROS Master and parameter server shown in the middle of Figure 4, which all ROS nodes query as described in Section 3. Node charlie is the malicious node that conducts the slow DoS attack. In our scenario, we assume this node has been compromised in some way to act malevolently and implement the attack sequence summarized in Figure 4.
- The gateway shown at the far left of Figure 5 grants external access to the shop-floor network, for instance, through a wired or WiFi connection to a plant-wide SCADA or MES network. This node usually incorporates a firewall that protects the shop-floor network from unauthorized access, while still allowing control and supervision traffic to pass through. For instance, a SCADA system might obtain access to robot arm operating information and statistics by means of an OPC-UA/ROS software gateway installed at the shop-floor boundary, or use ROS directly for the same purpose. In the example attack described in this paper, the gateway represents the entry point leveraged by the remote attacker to inject malicious software into node charlie.
6. Tests, Results, and Analysis
6.1. Identifying the Maximum Number of TCP Connections the Server Can Simultaneously Manage
6.2. Identification of the Connection Timeout Used by the ROS Master
- A numeric identifier used to refer to the test.
- Brief description of the scenario considered.
- Information about the application payload being sent by the test program, if any. When sending a partial payload, it simply refers to a range of lines of Figure 3. When sending an altered payload, details of the alteration are reported in the scenario description: for instance, in test 4, the partial payload being sent consists of lines 1–8 of Figure 3 plus an invalid XML-RPC token.
- Information on the measured connection closure time .
- The time required by the server to return either an error indication or a method response, from the reception of the connection closure packet from the client.
- The final application server response when the connection is closed, for both HTTP and XML protocol layers, which does not affect assessment but will be further discussed in Section 6.3.
6.3. Response of the ROS Master Service to Different Malicious Payloads
- In test 3, the XML-RPC fault indication contains the error “no element found” from the XML parser because empty XML-RPC requests are forbidden.
- In test 4, the parser reports a syntax error that pinpoints the invalid token present in the request.
- In test 5, the parser is unable to find the end of the dangling <params> clause.
6.4. Systemwide Effects of the Attack
6.5. Connection Request Flooding Bypass
7. Countermeasures and Protection
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- ROS Industrial Consortium. Consortium Home Page. Available online: https://rosindustrial.org (accessed on 28 January 2025).
- Dechouniotis, D.; Spatharakis, D.; Papavassiliou, S. Edge robotics experimentation over next generation iiot testbeds. In Proceedings of the NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 25–29 April 2022; pp. 1–3. [Google Scholar]
- Ayaida, M.; Messai, N.; Valentin, F.; Marcheras, D. Talkrobots: A middleware for robotic systems in industry 4.0. Future Internet 2022, 14, 109. [Google Scholar] [CrossRef]
- Lin, H.I.; Hwang, Y.C. Integration of robot and IIoT over the OPC unified architecture. In Proceedings of the 2019 International Automatic Control Conference (CACS), Keelung, Taiwan, 13–16 November 2019; pp. 1–6. [Google Scholar]
- Profanter, S.; Tekat, A.; Dorofeev, K.; Rickert, M.; Knoll, A. OPC UA versus ROS, DDS, and MQTT: Performance evaluation of industry 4.0 protocols. In Proceedings of the 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, Australia, 13–15 February 2019; pp. 955–962. [Google Scholar]
- Cambiaso, E.; Papaleo, G.; Chiola, G.; Aiello, M. Slow DoS attacks: Definition and categorisation. Int. J. Trust. Manag. Comput. Commun. 2013, 1, 300–319. [Google Scholar] [CrossRef]
- Rios, V.; Inacio, P.; Magoni, D.; Freire, M. Detection of Slowloris Attacks using Machine Learning Algorithms. In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, Avila, Spain, 8–12 April 2024; pp. 1321–1330. [Google Scholar]
- Cambiaso, E.; Papaleo, G.; Aiello, M. Slowcomm: Design, development and performance evaluation of a new slow DoS attack. J. Inf. Secur. Appl. 2017, 35, 23–31. [Google Scholar] [CrossRef]
- Sabri, S.; Ismail, N.; Hazzim, A. Slowloris DoS attack based simulation. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Bapatla, India, 7–8 May 2021; Volume 1062, p. 012029. [Google Scholar]
- Tripathi, N.; Hubballi, N. Slow rate denial of service attacks against HTTP/2 and detection. Comput. Secur. 2018, 72, 255–272. [Google Scholar] [CrossRef]
- Vaccari, I.; Aiello, M.; Cambiaso, E. SlowTT: A slow denial of service against IoT networks. Information 2020, 11, 452. [Google Scholar] [CrossRef]
- Cambiaso, E.; Durante, L.; Cibrario Bertolotti, I. SlowROS: Investigating the possibility to perpetrate Slow DoS Attacks against Robot Operating System. In Proceedings of the 8th International Conference on Communication and Network Technology (ICCNT), Florence, Italy, 16–18 September 2024. [Google Scholar]
- Aiello, M.; Cambiaso, E.; Mongelli, M.; Papaleo, G. An on-line intrusion detection approach to identify low-rate DoS attacks. In Proceedings of the 2014 International Carnahan Conference on Security Technology (ICCST), Rome, Italy, 13–16 October 2014; pp. 1–6. [Google Scholar]
- Kemp, C.; Calvert, C.; Khoshgoftaar, T.M. Detection methods of slow read DoS using full packet capture data. In Proceedings of the 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI), Las Vegas, NV, USA, 11–13 August 2020; pp. 9–16. [Google Scholar]
- Wen, S.; Jia, W.; Zhou, W.; Zhou, W.; Xu, C. CALD: Surviving various application-layer DDoS attacks that mimic flash crowd. In Proceedings of the 2010 Fourth International Conference on Network and System Security, Melbourne, Australia, 1–3 September 2010; pp. 247–254. [Google Scholar]
- Yu, S.; Zhou, W.; Jia, W.; Guo, S.; Xiang, Y.; Tang, F. Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 2011, 23, 1073–1080. [Google Scholar] [CrossRef]
- Alashhab, A.A.; Zahid, M.S.M.; Azim, M.A.; Daha, M.Y.; Isyaku, B.; Ali, S. A survey of low rate DDoS detection techniques based on machine learning in software-defined networks. Symmetry 2022, 14, 1563. [Google Scholar] [CrossRef]
- Wu, Z.; Li, W.; Liu, L.; Yue, M. Low-rate DoS attacks, detection, defense, and challenges: A survey. IEEE Access 2020, 8, 43920–43943. [Google Scholar]
- Lysenko, S.; Bobrovnikova, K.; Matiukh, S.; Hurman, I.; Savenko, O. Detection of the botnets’ low-rate DDoS attacks based on self-similarity. Int. J. Electr. Comput. Eng. 2020, 10, 3651–3659. [Google Scholar] [CrossRef]
- Savchenko, V.; Ilin, O.; Hnidenko, N.; Tkachenko, O.; Laptiev, O.; Lehominova, S. Detection of slow DDoS attacks based on user’s behavior forecasting. Int. J. Emerg. Trends Eng. Res. (IJETER) 2020, 8, 2019–2025. [Google Scholar] [CrossRef]
- Garcia, N.; Alcaniz, T.; González-Vidal, A.; Bernabe, J.B.; Rivera, D.; Skarmeta, A. Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence. J. Netw. Comput. Appl. 2021, 173, 102871. [Google Scholar] [CrossRef]
- Muraleedharan, N.; Janet, B. A deep learning based HTTP slow DoS classification approach using flow data. ICT Express 2021, 7, 210–214. [Google Scholar]
- Nugraha, B.; Murthy, R.N. Deep learning-based slow DDoS attack detection in SDN-based networks. In Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Virtual, 9–12 November 2020; pp. 51–56. [Google Scholar]
- de Miranda Rios, V.; Inácio, P.R.; Magoni, D.; Freire, M.M. Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms. Comput. Netw. 2021, 186, 107792. [Google Scholar] [CrossRef]
- Xu, C.; Shen, J.; Du, X. Low-rate DoS attack detection method based on hybrid deep neural networks. J. Inf. Secur. Appl. 2021, 60, 102879. [Google Scholar] [CrossRef]
- Jeong, S.Y.; Choi, I.J.; Kim, Y.J.; Shin, Y.M.; Han, J.H.; Jung, G.H.; Kim, K.G. A Study on ROS Vulnerabilities and Countermeasure. In Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, Vienna, Austria, 6–9 March 2017; HRI ’17; pp. 147–148. [Google Scholar] [CrossRef]
- Abeykoon, I.; Feng, X. Challenges in ROS Forensics. In Proceedings of the 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Leicester, UK, 19–23 August 2019; pp. 1677–1682. [Google Scholar] [CrossRef]
- Teixeira, R.R.; Maurell, I.P.; Drews, P.L. Security on ROS: Analyzing and exploiting vulnerabilities of ROS-based systems. In Proceedings of the 2020 Latin American Robotics Symposium (LARS), 2020 Brazilian Symposium on Robotics (SBR) and 2020 Workshop on Robotics in Education (WRE), Virtual, 10–13 November 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Dieber, B.; White, R.; Taurer, S.; Breiling, B.; Caiazza, G.; Christensen, H.; Cortesi, A. Penetration Testing ROS. In Robot Operating System (ROS): The Complete Reference (Volume 4); Koubaa, A., Ed.; Springer International Publishing: Cham, Switzerland, 2020; pp. 183–225. [Google Scholar] [CrossRef]
- Basan, E.; Sushkin, N.; Khabarov, O.; Makarevich, O.; Azarov, I. Analysis of Attacks on Robotic Operation System. In Proceedings of the International Workshop on Advanced in Information Security Management and Applications (AISMA 2021), CEUR Workshop Proceedings, Stavropol and Krasnoyarsk, Russia, 1 October 2021; pp. 41–48. [Google Scholar]
- Mokhamed, T.; Dakalbab, F.M.; Abbas, S.; Talib, M.A. Security in Robot Operating Systems (ROS): Analytical review study. In Proceedings of the 3rd International Conference on Distributed Sensing and Intelligent Systems (ICDSIS 2022), Dubai, United Arab Emirates, 19–21 October 2022; pp. 79–94. [Google Scholar] [CrossRef]
- van Rossum, G.; the Python Development Team. The Python Library Reference—Release 3.12.3; Python Software Foundation: Beaverton, OR, USA, 2024. [Google Scholar]
- MITRE Corporation. Common Vulnerabilities and Exposures (CVE) List. Available online: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=ros (accessed on 28 January 2025).
- Open Source Robotics Foundation, Inc. SROS Documentation. Available online: https://wiki.ros.org/SROS (accessed on 28 January 2025).
- Open Source Robotics Foundation, Inc. ROS.org Documentation. Available online: http://wiki.ros.org/Documentation (accessed on 28 January 2025).
- DeMarinis, N.; Tellex, S.; Kemerlis, V.P.; Konidaris, G.; Fonseca, R. Scanning the Internet for ROS: A View of Security in Robotics Research. In Proceedings of the 2019 International Conference on Robotics and Automation (ICRA), Montreal, QC, Canada, 20–24 May 2019; pp. 8514–8521. [Google Scholar] [CrossRef]
- Antunes, R.A.; Dalmazo, B.L.; Drews, P.L.J. Detecting Data Injection Attacks in ROS Systems using Machine Learning. In Proceedings of the 2022 Latin American Robotics Symposium (LARS), 2022 Brazilian Symposium on Robotics (SBR), and 2022 Workshop on Robotics in Education (WRE), São Paulo, Brazil, 18–21 October 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Zaim, H.Ç.; Yolaçan, E.N.; Yavanoğlu, U. Intelligent Attack Detection in ROS-based Systems. In Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, 15–18 December 2023; pp. 5946–5950. [Google Scholar] [CrossRef]
- Qiu, Q.; Zhang, X.; Yao, S.; Chen, Y.; Chen, G.; Hua, B.; Ji, J. Training a Non-Cooperator to Identify Vulnerabilities and Improve Robustness for Robot Navigation. IEEE Robot. Autom. Lett. 2023, 8, 4465–4472. [Google Scholar] [CrossRef]
- Portugal, D.; Rocha, R.P.; Castilho, J.P. Inquiring the robot operating system community on the state of adoption of the ROS 2 robotics middleware. Int. J. Intell. Robot. Appl. 2024, 1–26. [Google Scholar] [CrossRef]
- Object Management Group, Inc. DDS Security, Version 1.1. 2018. Available online: https://www.omg.org/spec/DDS-SECURITY/1.1/About-DDS-SECURITY (accessed on 24 May 2024).
- Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI. Defending the Supply Chain: Why the DDS Protocol Is Critical in Industrial and Software Systems. 2022. Available online: https://www.trendmicro.com/en_us/research/22/a/defending-the-supply-chain-why-dds-is-critical-in-industrial-and-software-systems.html (accessed on 24 May 2024).
- America’s Cyber Defense Agency. ICS ADVISORY—Multiple Data Distribution Service (DDS) Implementations (Update A). 2022. Available online: https://www.cisa.gov/news-events/ics-advisories/icsa-21-315-02 (accessed on 24 May 2024).
- Wyrobek, K.A.; Berger, E.H.; Van der Loos, H.M.; Salisbury, J.K. Towards a personal robotics development platform: Rationale and design of an intrinsically safe personal robot. In Proceedings of the 2008 IEEE International Conference on Robotics and Automation, Pasadena, CA, USA, 19–23 May 2008; pp. 2165–2170. [Google Scholar] [CrossRef]
- Winer, D. XML-RPC Specification. Available online: https://xmlrpc.com/spec.md (accessed on 28 January 2025).
- Internet Engineering Task Force (IETF). HTTP/2, RFC 9113. Available online: https://datatracker.ietf.org/doc/html/rfc9113 (accessed on 28 January 2025).
- World Wide Web Consortium (W3C). Extensible Markup Language (XML). Available online: https://www.w3.org/XML/ (accessed on 28 January 2025).
- Internet Engineering Task Force (IETF). Transmission Control Protocol (TCP), RFC 9293. Available online: https://datatracker.ietf.org/doc/html/rfc9293 (accessed on 28 January 2025).
- Shebaro, B. SYN, SYN-ACK, and beyond: Learning by networking. J. Comput. Sci. Coll. 2020, 35, 44–51. [Google Scholar]
- ISO/IEC/IEEE. International Standard ISO/IEC/IEEE 9945, Information Technology—Portable Operating System Interface (POSIX®) Base Specifications, Issue 7; International Organization for Standardization: Geneva, Switzerland, 2009. [Google Scholar]
- Malavolta, I.; Lewis, G.; Schmerl, B.; Lago, P.; Garlan, D. How do you Architect your Robots? State of the Practice and Guidelines for ROS-based Systems. In Proceedings of the 2020 IEEE/ACM 42nd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Seoul, Republic of Korea, 27 June–19 July 2020; pp. 31–40. [Google Scholar]
- Open Source Robotics Foundation, Inc. Source code of the Ros_comm Component. Available online: https://github.com/ros/ros_comm (accessed on 28 January 2025).
- Yang, C.H.; Wu, J.P.; Lee, F.Y.; Lin, T.Y.; Tsai, M.H. Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists. Sensors 2023, 23, 3817. [Google Scholar] [CrossRef] [PubMed]
- Netfilter Core Team. The netfilter.org “Iptables” Project”, 1999–2021. Available online: https://www.netfilter.org/projects/iptables/index.html (accessed on 20 June 2024).
- Bewasana, D.A.D.; Harumnanda, M.S.A.; Priambodo, D.F. Securing Networks with Port Knocking: An Experimental Study on Ubuntu and Kali. In Proceedings of the 2023 3rd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS), Yogyakarta, Indonesia, 9–10 August 2023; pp. 92–97. [Google Scholar]
- Oktivasari, P.; Zain, A.R.; Agustin, M.; Kurniawan, A.; arbi Murad, F.; fabian Anshor, M. Analysis of effectiveness of iptables on web server from Slowloris attack. In Proceedings of the 2022 5th International Conference of Computer and Informatics Engineering (IC2IE), Jakarta, Indonesia, 13–14 September 2022; pp. 215–219. [Google Scholar]
- Treglia, P. PiSecurityCheck: Server Security Check in a Hand. In Proceedings of the 2024 47th MIPRO ICT and Electronics Convention (MIPRO), Opatija, Croatia, 20–24 May 2024; pp. 1549–1554. [Google Scholar]
f | s | c (from (1)) | (Measured) | k (calc.) |
---|---|---|---|---|
1024 | 4096 | 1152 | 1148 | 4 |
768 | 96 | 864 | 860 | 4 |
512 | 96 | 608 | 604 | 4 |
512 | 64 | 576 | 572 | 4 |
256 | 64 | 320 | 316 | 4 |
Response | Response upon Close | |||||
---|---|---|---|---|---|---|
# | Scenario | Payload | Time (ms) | HTTP | XML | |
1 | Basic | none | — | none | N/A | |
2 | POST only | 1–1 | 1.44 | HTTP/1.1 500 | N/A | |
3 | Full HTTP header | 1–7 | 1.45 | HTTP/1.1 200 | <fault> | |
4 | Invalid XML-RPC request | 1–8 | 1.16 | HTTP/1.1 200 | <fault> | |
5 | Partial XML-RPC request | 1–11 | 1.84 | HTTP/1.1 200 | <fault> | |
6 | Ending newline missing | 1–25 | 3.42 | HTTP/1.1 200 | <methodResponse> | |
7 | Full, valid request | 1–35 | — | HTTP/1.1 200 (immediate) | none |
Scenario | Paper Section | Strategy | DoS? |
---|---|---|---|
1 | Section 6.2 | Single connection, | X |
2 | Section 6.2 | Multiple connections, no payload, | √ |
3 | Section 6.3 | Multiple connections, partial/malformed payload, | √ |
4 | Section 6.3 | Multiple connections, full payload, | √ |
5 | Section 6.5 | Multiple connections, (SYN flooding) | X |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cibrario Bertolotti, I.; Durante, L.; Cambiaso, E. Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario. Future Internet 2025, 17, 167. https://doi.org/10.3390/fi17040167
Cibrario Bertolotti I, Durante L, Cambiaso E. Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario. Future Internet. 2025; 17(4):167. https://doi.org/10.3390/fi17040167
Chicago/Turabian StyleCibrario Bertolotti, Ivan, Luca Durante, and Enrico Cambiaso. 2025. "Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario" Future Internet 17, no. 4: 167. https://doi.org/10.3390/fi17040167
APA StyleCibrario Bertolotti, I., Durante, L., & Cambiaso, E. (2025). Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario. Future Internet, 17(4), 167. https://doi.org/10.3390/fi17040167