Malicious MPLS Policy Engine Reconnaissance

Abdulrahman Almutairi, Stephen D. Wolthusen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Multi-Protocol Label Switching (MPLS) is widely used on telecommunications carrier and service provider backbone networks, complex network infrastructures, and also for the interconnection of distributed sites requiring guaranteed quality of service (QoS) and service levels such as the financial services sector, government and public safety, or control networks such as the electric power grid.

MPLS is a policy-based system wherein router behaviour is determined not only by the base protocols, but also by a set of further policies that network operators will typically wish not to reveal. However, sophisticated adversaries are known to conduct network reconnaissance years before executing actual attacks, and may also wish to conduct deniable attacks that may not be visible as such that appear as service degradation or which will cause re-configuration of paths in the interest of the attacker. In this paper we therefore describe a probing algorithm and a model of MPLS state space allowing an adversary to learn about the policies and policy state of an MPLS speaker. In spite of the restrictions on the adversary, our probing algorithm revealed the policy states of non-directly connected routers. Also, we analyse the confirmed information using a Bayesian network and provide simulative validation of our findings.
Original languageEnglish
Title of host publicationProceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014)}
PublisherSpringer-Verlag
Pages3
Number of pages18
Volume8735
DOIs
Publication statusPublished - 2014

Cite this