A Forensic Investigation of The Robot Operating System
A Forensic Investigation of The Robot Operating System
and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
852
Authorized licensed use limited to: J.R.D. Tata Memorial Library Indian Institute of Science Bengaluru. Downloaded on December 12,2024 at 08:36:32 UTC from IEEE Xplore. Restrictions apply.
related to the above definition. It helps to investigate topic, and law enforcement is also needed in the
activities relating to digital crime to conclude justice field of cyber-crimes.
or to identify parties engaged in digital forensic
science. Each party follows various approaches for What is Computer Forensics?
investigation, and this depends on their varying
Computer forensics is described as the science of
objectives. There are four intertwined constituents,
obtaining, preserving, and documenting evidence
namely, the crime, evidence, science and law in
from digital devices. Digital storage devices are
digital forensics.
computers, mobile phones, digital cameras, PDAs
and miscellaneous memory storage devices. The
Legal, ethical and other integral elements which are
science of forensics is not only related to the digital
the crux of the investigations have been relegated to
environment. Traditional forensic experts can
the bottom rung of the digital forensics field while
examine fingerprints and other physical evidence,
highlighting only certain areas of digital evidence.
while computer forensic specialists consider digital
These neglected areas are indispensable not only
evidence. The forensic approach should follow
because other forensics sciences have given them
secured protocols and recognised procedures for
their due place, but also because they have to be
collection of digital evidence. The probative value of
given top priority if digital forensics is to flourish.
the digital evidence is thus carefully conserved,
Evidence for digital forensics must be robust in all
helping to guarantee admissibility in a legal
aspects of the law. Digital forensics is still in its
proceeding.
infancy compared to those of botany or
anthropology.
Computer forensics has become an emerging new
This tool-centred domain is commercially harnessed research field as a result of requirements such as
for digital investigations. Consequently, reliability, combating fraud and the rapidly increasing number
verifiability and consistency of the digital evidence of computer crimes. DNA fingerprinting is another
legally put forward, have become questionable as form of forensic science which emerged as a result
accepted norms have not been established for the of extended studies and experimentation. Computer
guidance of digital forensics practitioners. forensics will always be bound with computer
security.
853
Authorized licensed use limited to: J.R.D. Tata Memorial Library Indian Institute of Science Bengaluru. Downloaded on December 12,2024 at 08:36:32 UTC from IEEE Xplore. Restrictions apply.
preserved. There are two methods to acquire a
forensic image from ROS. In the case of ROS
The UK – ACPO hacking by a man-in-the-middle attack, Trojan,
The ACPO guidelines are used in United Kingdom backdoor and so on, this study reveals how robot
law enforcement, and the main principles are applied forensics can assist in investigations. Through the
in the computer forensics field. ACPO guidelines intermediary of FTK imager and chip-off forensics,
provide four principles for handling evidence an ROS can be forensically investigated.
(ACPO, 2012), (1) No action should be taken by law
enforcement agencies or their agents, that could VII. FTK
change data held on a computer or storage media
which may subsequently be relied upon in court; (2) Forensic Toolkit (FTK) is a developed platform
In exceptional circumstances, where a person finds it involved in the field of information security and law
necessary to access original data held on a computer enforcement for digital investigations. It is a free
or storage media, that person must be competent to forensic tool that can be used for the acquisition of
do so; (3) An audit trail or another record of all digital media. Filters and the indexing engine are
processes applied to computer-based electronic used in new technologies. FTK helps to reduce the
evidence should be created and preserved. An time consumed in the analysis of relevant evidence
independent third party should be able to examine of an investigation. It can be downloaded from the
those processes and achieve the same result; (4) The AccessData official website. Analysis of the data,
person in charge of the investigation (the case information search and volatile data like RAM are
officer) has overall responsibility for ensuring these allowed by FTK. It can be used to create bit-for-bit
principles are adhered to. duplicate images using FTK Imager. This forensic
image contains the file slack and unallocated space
Law enforcement in the United Kingdom can be which is an identical copy of the first device. This
defined in six steps as identification, preservation, forensic evidence image helps to continue the
collection, examination, analysis and presentation. investigation process, and it preserves the original
device. The analysis of the duplicated image can
generate further information about the investigation
VI. FORENSIC ANALYSIS OF HACKED ROS SYSTEM to be included in the final report. A log file is
created by the FTK imager after imaging the
It is crucial that numerous data are made available
evidence. Log files are included with the MD5 hash
when analysing and evaluating with tools for ROS algorithm. This hash value is very important in
forensics. Some of the data extracted may be raw
computer forensics.
data. The data for ROS is composed of pictures,
point cloud data, GPS data, databases, and file and
network logs. A forensics examiner seeks maximum
output from ROS, such as current memory dump or FTK Imager gives a log file after imaging the
cached files and deleted files or images. evidence, which is very important for computer
forensics because it has hash value.
Although a methodology has been prescribed for
computer forensics, a standardised method specific Why is hash value important for computer
to ROS is yet to be found. After the FTK imager forensics?
tools obtain images from ROS, all the hashes are
verified and isolated to preserve the integrity of the A hash value can perform affirmation that a file has
image. Two methods to acquire the forensics image not been tampered with. For instance, an E01 image
are highlighted in the current study. file calculates a hash value when copying an exact
byte-for-byte image from a hard drive. A forensics
There are some studies which have been conducted investigator identifies the integrity of the evidence
in the field of computer forensics, and some of these using a hash function. A raw image file such as a
have outlined a methodology to adopt in the case of .dd image file does not involve the hash function
computer forensic as a whole. However, a when copying an exact byte-for-byte image from a
standardised method specific to ROS has yet to hard drive. Therefore, it cannot verify that the file
come into effect. The method adopted here first has not been tampered with. Ignorable files and alert
acquires images from the ROS by using the FTK files can be found using hash functions. Alert files
Imager tool. All the hashes are verified and placed are also known as indecent images, and they can be
separately so that the integrity of the image is automatically flagged.
854
Authorized licensed use limited to: J.R.D. Tata Memorial Library Indian Institute of Science Bengaluru. Downloaded on December 12,2024 at 08:36:32 UTC from IEEE Xplore. Restrictions apply.
detect evidence after security attacks. It is reordered
VIII. ANALYSIS AND DATA RECOVERY by an acquisition of digital evidence that helps to
identify security incidents and identify problems.
FTK and Encase software can be used for this step. Computer forensics researchers have implemented
Consider EXT2 as the default file system using two approaches for network forensics on a system.
The first method is called a catch. It captures all
Linux. This can be referred to as a Second Extended
network packets, and it requires large storage. The
File System. Recently EXT3 has become common. second method is stopped. In this approach, all
Linux EXT2 and EXT3 file systems work in network traffic is monitored.
different ways.
This method requires a high-performance processor.
The file header is located at the beginning of a file. Currently, there is no well-developed network
Manually, files can be recovered by searching forensics system for academic or educational
institutions. Cybercrimes occur due to ongoing
unallocated space for the file header. If an intruder
network packets exchanged with other hosts’
deleted a directory of bitmap graphics, you could communication on the network. In this research, the
search using a sector of BM through unallocated volatile evidence is obtained using tools after
space. This can be used to recover the file using the capturing network packets.
Linux dd command, providing that the file has not
been overwritten and the file is not fragmented. In In this research, Tcpdump, which is a free software
this research, the case of several deleted jpg files is and depends on BSD license, is used. Tcpdump is
executed in command mode. The Lib-pcap library is
considered. The first sector of the jpg file is
used to extract network packets in a Linux System,
identified by searching as JFIF. (Figure 2) which can help with the analysis of the packet
header and content. This capture tool is implemented
Let us assume that the file system as EXT2 for the to acquire real-time network packets from a
final recovery method. This is somewhat common compromised host.
for Linux file systems. The system debugger is used
X. RESULTS
to recover files in this method. All data of the ROS
system is stored inside Linux, which aids recovery
of the ROS file system. ROS uses two database
systems, namely, SQL and Mango. The Mango DB
is an open source database system, and it is
classified as an NSQL database system. In database
forensics, you can recover deleted data rows and
reconstruct them. Also, you can forensically analyse
mechanisms of DB data writing, data overwriting,
and the internal structure of the data rows and data
geometry. All ROS programs stored in SQL The deleted images of the robot operating system are
databases are formatted. available at img/E01/home/ros/.cache/thumbnails.
855
Authorized licensed use limited to: J.R.D. Tata Memorial Library Indian Institute of Science Bengaluru. Downloaded on December 12,2024 at 08:36:32 UTC from IEEE Xplore. Restrictions apply.
XI. CONCLUSIONS
[1] Abdulhayoglu, M., Tas, E., Sealskin, I., Lvovskiy, V. & Klimov
system for performing security and vulnerability scans on devices
behind a network security device, V. 2008, Method and.
[6] Choi, B. & Seo, D. 2005, System and method for analyzing
malicious code protocol and generating harmful traffic.
856
Authorized licensed use limited to: J.R.D. Tata Memorial Library Indian Institute of Science Bengaluru. Downloaded on December 12,2024 at 08:36:32 UTC from IEEE Xplore. Restrictions apply.
[7] DFRWS, "WS1 - A Framework for Digital Forensic Science," in
A Road Map for Digital Forensic Research, G. Palmer, ed., NY,
DFRWS, 2001.
[8] Elder, B. 2012, "Chip-Off and JTAG Analysis for Mobile Device
Forensics", Evidence Technology Magazine, May-June.
[13] Holik, F., Horalek, J., Marik, O., Neradova, S. & Zitta, S. 2014,
"Effective penetration testing with Metasploit framework and
methodologies", Computational Intelligence and Informatics (CINTI),
2014
[14] Joshi, Y., Das, D. & Saha, S. 2009, "Mitigating man in the
middle attack over secure sockets layer", Internet Multimedia Services
Architecture and Applications (IMSAA), 2009 IEEE International
Conference on IEEE, , pp. 1.
[16] Lyon, G.F. 2009, Nmap network scanning: The official Nmap
project guide to network discovery and security scanning, Insecure.
[20] Ouafi, K., Overbeck, R. & Vaudenay, S. 2008, "On the security
of HB# against a man-in-the-middle attack", International Conference
on the Theory and Application of Cryptology and Information
Security Springer, pp. 108.
857
Authorized licensed use limited to: J.R.D. Tata Memorial Library Indian Institute of Science Bengaluru. Downloaded on December 12,2024 at 08:36:32 UTC from IEEE Xplore. Restrictions apply.