ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축

Vol. 34, No. 4, pp. 681-691, 8월. 2024
10.13089/JKIISC.2024.34.4.681, Full Text:
Keywords: Robot Operating System, Attack Dataset, Intrusion Detection System, Cyber Security
Abstract

In recent decades, research and development in the field of industrial robotics, such as an unmanned ground vehicle (UGV) and an unmanned aerial vehicle (UAV), has been significant progress. In these advancements, it is important to use middleware, which facilitates communication and data management between different applications, and various industrial communication middleware protocols have been released. The robot operating system (ROS) is the most widely adopted as the main platform for robot system development among the communication middleware protocols. However, the ROS is known to be vulnerable to various cyber attacks, such as eavesdropping on communications and injecting malicious messages, because it was initially designed without security considerations. In response, numerous studies have proposed countermeasures to ROS vulnerabilities. In particular, some work has been proposed on generating ROS datasets for intrusion detection systems (IDS), but there is a lack of research in this area. In this paper, in order to contribute to improving the performance of ROS IDSs, we propose a new type of attack scenario that can occur in the ROS and build ROS attack datasets collected from a real robot system and make it available as an open dataset.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
김형훈, 조효진, 이승민, 허재웅, "ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 4, pp. 681-691, 2024. DOI: 10.13089/JKIISC.2024.34.4.681.

[ACM Style]
김형훈, 조효진, 이승민, and 허재웅. 2024. ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축. Journal of The Korea Institute of Information Security and Cryptology, 34, 4, (2024), 681-691. DOI: 10.13089/JKIISC.2024.34.4.681.