Properly protecting industrial environments is a relevant activity in the network security field, due to the significant impact that potential cyberattacks may have. By exploiting the possibility of designing new threats targeting industrial networks, in this paper we present SlowROS, a novel Slow DoS Attack targeting the Robot Operating System, ROS. In our work, we validated the threat through the execution of dedicated test sets on a real network, composed of multiple interacting components. Obtained results show that the proposed attack leads to a denial of service against ROS components, making them unable to operate correctly. Indeed, although we did not directly targeted it, we also observed the attack impact on a typical ROS device and discussed how a production pipeline can be blocked by SlowROS. In addition, we found non-negligible peaks of data exchanged, thus we discussed how it is possible to optimize the threat and minimize its impact on the network in terms of network bandwidth needed by the attacker, by exploiting the potentially endless connection timeout of the targeted service.

SlowROS: Investigating the Possibility to Perpetrate Slow DoS Attacks Against Robot Operating System

Cambiaso, Enrico
Primo
;
Durante, Luca;Cibrario Bertolotti, Ivan
Ultimo
2025

Abstract

Properly protecting industrial environments is a relevant activity in the network security field, due to the significant impact that potential cyberattacks may have. By exploiting the possibility of designing new threats targeting industrial networks, in this paper we present SlowROS, a novel Slow DoS Attack targeting the Robot Operating System, ROS. In our work, we validated the threat through the execution of dedicated test sets on a real network, composed of multiple interacting components. Obtained results show that the proposed attack leads to a denial of service against ROS components, making them unable to operate correctly. Indeed, although we did not directly targeted it, we also observed the attack impact on a typical ROS device and discussed how a production pipeline can be blocked by SlowROS. In addition, we found non-negligible peaks of data exchanged, thus we discussed how it is possible to optimize the threat and minimize its impact on the network in terms of network bandwidth needed by the attacker, by exploiting the potentially endless connection timeout of the targeted service.
2025
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
9783031924484
9783031924491
Critical infrastructure protection
Cybersecurity
Denial of service
Industrial security
ROS
Slow dos attack
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/552701
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ente

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact