Skip to content
2000
Volume 19, Issue 3
  • ISSN: 2666-2558
  • E-ISSN: 2666-2566

Abstract

Background

The increasing integration of robotic systems across various sectors has highlighted the critical need for robust cybersecurity measures to safeguard these systems against cyber threats.

Objective

This research presents a novel Real-Time Intrusion Detection System (IDS) framework specifically designed to enhance the cybersecurity of robotic systems.

Methods

The proposed IDS framework monitors network traffic and continuously identifies potential threats in real time. A testbed is set up using an AlphaBot robotic device and a server machine to perform experiments under both normal and attack conditions. Network traffic data is captured in real-time using tools like Wireshark, generating raw datasets from actual data exchanges between the robotic device and the server. The dataset undergoes preprocessing, including feature extraction, data cleaning, and normalization. This processed dataset is then used to train machine learning algorithms, such as Decision Trees, K-Nearest Neighbors, and Random Forest, designed to identify patterns distinguishing between normal and malicious activities.

Results

The IDS framework is tested on the AlphaBot robotic device and server machine, demonstrating effective results in real-world conditions. The system achieved an accuracy rate of 96.61% in distinguishing between normal and attack traffic, highlighting its robustness and practicality.

Conclusion

The proposed real-time IDS framework shows promise in enhancing the cybersecurity of robotic systems by effectively identifying potential threats in real time.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/0126662558354644241126110555
2024-12-10
2026-03-04
Loading full text...

Full text loading...

References

  1. YaacoubJ.P.A. NouraH.N. SalmanO. ChehabA. Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations.Int. J. Inf. Secur.202221111515810.1007/s10207‑021‑00545‑8 33776611
    [Google Scholar]
  2. Neerendra KumarD.A.G.S.M.N. Security analysis of vulnerabilities in robots.Design Engineering.468947002021
    [Google Scholar]
  3. CottrellK. BoseD.B. ShahriarH. RahmanA. An empirical study of vulnerabilities in robotics2021 IEEE 45th Annual Computers, Software, and Applications Conference, COMPSACMadrid, Spain202173574410.1109/COMPSAC51774.2021.00105
    [Google Scholar]
  4. SayeedA. VermaC. KumarN. KoulN. IllésZ. Approaches and challenges in internet of robotic things.Future Internet20221426510.3390/fi14090265
    [Google Scholar]
  5. PoglianiM. PolinoM. QuartaD. Security of controlled manufacturing systems in the connected factory: The case of industrial robots.J. Comput. Virol. Hacking Tech.20191516117510.1007/s11416‑019‑00329‑8
    [Google Scholar]
  6. BonaciT. HerronJ. YusufT. YanJ. KohnoT. ChizeckH.J. To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots2015 https://www.researchgate.net/citation/329012011_Semi-Quantitative_Security_Risk_Assessment_of_Robotic_Systems
    [Google Scholar]
  7. NeupaneS. MitraS. FernandezI.A. SahaS. MittalS. ChenJ. PillaiN. RahimiS. Security considerations in AI-robotics: A survey of current methods, challenges, and opportunities.IEEE Access202412220722209710.1109/ACCESS.2024.3363657
    [Google Scholar]
  8. KabirH. ThamM.L. ChangY.C. Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions.Digit. Commun. Netw.2023961265129010.1016/j.dcan.2023.05.006
    [Google Scholar]
  9. LacavaG. Marotta1A. Martinelli1F. Cybsersecurity issues in robotics.J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl.202112312810.22667/JOWUA.2021.09.30.001
    [Google Scholar]
  10. BottaA. RotbeiS. ZinnoS. VentreG. Cyber security of robots: A comprehensive survey.Int. J. Intell. Syst.202318May20023710.1016/j.iswa.2023.200237
    [Google Scholar]
  11. Go deepAvailable from: https://www.wireshark.org/
  12. GitHub - Cometa/CICFlowMeter: CICFlowmeter-V3.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection https://github.com/cometa/CICFlowMeter
  13. BonaciT. HerronJ. YusufT. YanJ. KohnoT. ChizeckH.J. To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robotsarXiv2015
    [Google Scholar]
  14. DuongL.N.K. Al-FadhliM. JagtapS. BaderF. MartindaleW. SwainsonM. PaoliA. A review of robotics and autonomous systems in the food industry: From the supply chains perspective.Trends Food Sci. Technol.202010635536410.1016/j.tifs.2020.10.028
    [Google Scholar]
  15. KulshresthaP. Vijay KumarT.V. Machine learning based intrusion detection system for IoMT.Int. J. Syst. Assur. Eng. Manag2023111310.1007/S13198‑023‑02119‑4/FIGURES/12
    [Google Scholar]
  16. VinayakumarR. AlazabM. SomanK.P. PoornachandranP. VenkatramanS. Robust intelligent malware detection using deep learning.IEEE Access20197467174673810.1109/ACCESS.2019.2906934
    [Google Scholar]
  17. NguyenX.H. NguyenX.D. HuynhH.H. LeK.H. Realguard: A lightweight network intrusion detection system for IoT gateways.Sensors20222243210.3390/s22020432
    [Google Scholar]
  18. MeleshkoA. ShulepovA. DesnitskyV. NovikovaE. KotenkoI. Visualization assisted approach to anomaly and attack detection in water treatment systems.Water202214234210.3390/w14152342
    [Google Scholar]
  19. SiddharthanH. ThangavelD. A novel framework approach for intrusion detection based on improved critical feature selection in Internet of Things networks.Concurr. Comput.2023351e744510.1002/cpe.7445
    [Google Scholar]
  20. GhasemiH. BabaieS. A new intrusion detection system based on SVM–GWO algorithms for internet of things.Wirel. Netw.20243042173218510.1007/s11276‑023‑03637‑6
    [Google Scholar]
  21. AlsulamiA.A. Abu Al-HaijaQ. TayebA. AlqahtaniA. An intrusion detection and classification system for IoT traffic with improved data engineering.Appl. Sci.2022121233610.3390/app122312336
    [Google Scholar]
  22. VermaN. KumarN. SheikhZ.A. KoulN. AshishA. Cybersecurity issues and artificial intelligence-based solutions in cyber-physical systems.Intelligent Security Solutions for Cyber-Physical Systems.1st edCRC202410.1201/9781003406105‑10
    [Google Scholar]
  23. MohammedS. KrishnaS.H. MudalkarP.K. VermaN. KarthikeyanP. YadavA.S. Stock market price prediction using machine learning5th International Conference on Smart Systems and Inventive Technology (ICSSIT)Tirunelveli, India202382382810.1109/ICSSIT55814.2023.10061120
    [Google Scholar]
/content/journals/rascs/10.2174/0126662558354644241126110555
Loading
/content/journals/rascs/10.2174/0126662558354644241126110555
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test