Unit-2(Surveillance Robot in Cyber Intelligence) (1).pptx

umadevikakarla 54 views 14 slides Jun 23, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

robotics


Slide Content

Surveillance Robot in Cyber Intelligence for Vulnerability Detection

Introduction The weak design and malfunction of firmware and software of robotic application can open the doors for cyber vulnerabilities like ransomware and DoS attack. The robotic framework has been distinguished and implemented into heterogeneous domains including military applications, home automation, IoT -enabled devices, autonomous cars and vehicles, surveillance systems . What will occur if these robots are hacked? This aims to present a review on the online protection against cyber vulnerabilities and threats related to automatic bot and administration robots, and thus, a scientific categorization that groups the dangers looked by clients and normal users when utilizing autonomous robots, recognizing privacy and security and well-being strings , is introduced.

Methodology to Analyze Cyber Threats in Robotic Application The given architecture finds vulnerability in robotics firm ware and software by analyzing the malicious patterns retrieved by crawling the data store, so that protection mechanism can be updated . What is Cyber Security Vulnerabilities? Any flaw in an organization's internal controls, system procedures, or information systems is a vulnerability in cyber security . The table is designed for the interoperability and interdisciplinary designed techniques working to filter, detect and analyze cyber attacks and vulnerabilities.

Modeling robot cybersecurity threats Before analyzing in detail the risks generated by compromised robots, it is necessary to model the threats that define the cyber security scenario for robots. Figure 1 shows the elements that have to be taken into account to propose a model. We have group the security threats into five groups that will be described later. First, in the top layer, we present the origin of the threats. Threats can have three main origins, which are as follows: 1. Natural, associated to natural disasters. 2. Accidental, generated by the fact that there are no perfect situations as those planned in laboratories. 3. Attack, those events generated by external users with the aim to gain control over a resource of the robot.

Modeling robot cybersecurity threats

Modeling robot cybersecurity threats These elements need to be faced beforehand a robot is deployed in a real environment, and a set of contingency plans should be executed in order to handle these situations. These plans should consider the three possible targets identified in the second row of Figure 1, that is, the robot itself, data managed by the robot, and the combination of both components. First, threats change the normal operation mode in a physical way. Threats could have been generated by natural conditions, accidental situations, or attacks and could cause five different impacts on the robot (third row in Figure 1), which are as follows: 1. Destruction, which implies no operability. . 2. Partial damage, which involves malfunction of the robot. 3. Disruption, entails the interruption of a single, multiple, and total robot components. 4. Degradation, meaning that the range or capability of any robot component decreases along time. 5. Unexpected behavior, which could be considered as a degradation of the whole robot, not just a component.

Second, cyberthreats can affect the normal operation mode in a virtual way, that is, threats can modify the information gathered, stored, or transmitted by the robot. These threats have more impact on external entities than in the robot itself. In this way, we have organized the impact caused by cyber threats into three groups (corresponding to the fourth row in Figure 1), which are as follows: 1. Issues associated to robot manufacturers or open source developers (drivers and core software). 2. Issues associated to third party solutions (libraries) needed by robot manufacturer applications. 3. General vulnerabilities associated with the overall software components of the robot.

Third, cyber-physical threats represent the sum up of both previous threats (represented by C+P ellipse in Figure 1). From our point of view, it can be illustrated when a sensor or an actuator is compromised. It can be performed by substitution or modification of the hardware, changing them physically or modifying the firmware. The overall system would work in the same manner but the threat would have added a new hidden functionality.

Our proposal considers four different types of actors: final users, that is, the people interacting with the robot; business users, who deploy a robot for a particular task; robot vendors, which manufacture robots and provide software; and independent software developers who create robot functionalities (individual developers or community developers) for different commercial robots . Additionally, public and private regulatory entities are also involved in the cybersecurity of robotic systems, although they do not use robots directly.

cyber security attack scenarios 1. Denial-of-service ( DoS ) and distributed denial-of-service ( DDoS ) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A  DDoS attack  is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker . 2. Man-in-the-middle ( MitM ) attack A MitM attack occurs when a hacker inserts itself between the communications of a client and a server 3.Phishing attacks Phishing attack is the practice of sending emails that appear to be from trusted sources with the goal of gaining personal information or influencing  users to do something.  4. Drive-by attack Drive-by download attacks are a common method of spreading malware. Hackers look for insecure websites and plant a malicious script into HTTP or PHP code on one of the pages.

5. Password attack Because passwords are the most commonly used mechanism to authenticate users to an information system, obtaining passwords is a common and effective attack approach.  6 . SQL injection attack SQL commands are inserted into data-plane input (for example, instead of the login or password) in order to run predefined SQL commands. A successful SQL injection exploit can read sensitive data from the database, modify (insert, update or delete) database data, execute administration operations (such as shutdown) on the database, recover the content of a given file, and, in some cases, issue commands to the operating system . 7. Cross-site scripting (XSS) attack XSS attacks use third-party web resources to run scripts in the victim’s web browser or scriptable application. Specifically, the attacker injects a payload with malicious JavaScript into a website’s database.  8 . Eavesdropping attack By eavesdropping, an attacker can obtain passwords, credit card numbers and other confidential information that a user might be sending over the network. Eavesdropping can be passive or active: Passive eavesdropping  — A hacker detects the information by listening to the message transmission in the network. Active eavesdropping  — A hacker actively grabs the information by disguising himself as friendly unit and by sending queries to transmitters. This is called probing, scanning or tampering.

9. Birthday attack Birthday attacks are made against hash algorithms that are used to verify the integrity of a message, software or digital signature 10. Malware attack Malicious software can be described as unwanted software that is installed in your system without your consent. 
Tags