• Challenges in ROS forensics

      Abeykoon, Iroshan; Feng, Xiaohua; University of Bedfordshire (Institute of Electrical and Electronics Engineers Inc., 2020-04-09)
      The usage of robot is rapidly growth in our society. The communication link and applications connect the robots to their clients or users. This communication link and applications are normally connected through some kind of network connections. This network system is amenable of being attached and vulnerable to the security threats. It is a critical part for ensuring security and privacy for robotic platforms. The paper, also discusses about several cyber-physical security threats that are only for robotic platforms. The peer to peer applications use in the robotic platforms for threats target integrity, availability and confidential security purposes. A Remote Administration Tool (RAT) was introduced for specific security attacks. An impact oriented process was performed for analyzing the assessment outcomes of the attacks. Tests and experiments of attacks were performed in simulation environment which was based on Gazbo Turtlebot simulator and physically on the robot. A software tool was used for simulating, debugging and experimenting on ROS platform. Integrity attacks performed for modifying commands and manipulated the robot behavior. Availability attacks were affected for Denial-of-Service (DoS) and the robot was not listened to Turtlebot commands. Integrity and availability attacks resulted sensitive information on the robot.
    • Cyberstalking Issues

      Feng, Xiaohua; Asante, Audrey; Short, Emma; Abeykoon, Iroshan; University of Bedfordshire (Institute of Electrical and Electronics Engineers Inc., 2018-04-02)
      Cyberstalking is closely related to Digital forensics. Digital forensics is an investigation and analysis technique to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. We can extract evidences from digital devices. The cutting edge technology is to track down the Cyber-stalking evidence with the aid of AI technology, report to law enforcement, and pin down the identity of the stalker. A key focus at this moment is how to proactively detect and prevent this kind of crime.
    • A forensic investigation of robot operating system

      Abeykoon, Iroshan; Feng, Xiaohua; Qiu, Renxi; University of Bedfordshire (Institute of Electrical and Electronics Engineers Inc., 2018-04-02)
      The robot operating system for robot which is still relatively new, is rapidly gaining robot manufacture industry market share with dozens of robots and drons either released or set to be released. In this paper we present the first methodology and toolset for acquisition and deep analysis of volatile physical memory from robot operating system devices. The article discusses some of the challenges in performing ros memory acquisition, discusses. For memory forensics we used Lime, volatility memory framework and DD command. The acquisition tool supports dump memory to either exterl drive or via the network.
    • A forensic investigation of the robot operating system

      Abeykoon, Iroshan; Feng, Xiaohua; University of Bedfordshire (Institute of Electrical and Electronics Engineers Inc., 2018-02-01)
      The Robot Operating System (ROS) is a framework that is mostly used in industrial applications such as automotive, healthcare and manufacturing and it is not immune from potential future hacking. By carrying out various types of cyber-attacks, hackers can disrupt the normal operation of a robot. It is easy to get control of communication between a robot and a human due to the open communication network after carrying out malicious attacks to jam the network. As a result, hackers can change commands which are sent by an operator to the robot, making usual activities impossible. For instance, in a case of ROS hacking, man-in-the-middle attacks, Trojans, backdoor attacks, and so on, can change the behaviour of robots to something completely different than expected.Therefore, forensic analysts require a specific method to forensically investigate ROS. This is a new area in the computer forensics field. Therefore, it is proposed to create an analytical framework to facilitate the forensic investigation of the Robot Operating System and methodologies and standards for acquiring related digital evidence using forensic tools. This study addresses a formalized and structured methodology that would assist the forensic investigation approach.This research will help to enhance the gathering, identification and preservation of evidence related to forensics investigations of the Robot Operating System. The forensic analysts could adapt the examination procedure of hacked ROS with a focused, crime-specific, forensics framework.