Multi-Protocol Label Switching (MPLS) is widely used on telecommunications carrier and service provider backbone networks, complex network infrastructures, and also for the interconnection of distributed sites requiring guaranteed quality of service (QoS) and service levels such as the financial services sector, government and public safety, or control networks such as the electric power grid. MPLS is a policy-based system wherein router behaviour is determined not only by the base protocols, but also by a set of further policies that network operators will typically wish not to reveal. However, sophisticated adversaries are known to conduct network reconnaissance years before executing actual attacks, and may also wish to conduct deniable attacks that may not be visible as such that appear as service degradation or which will cause re-configuration of paths in the interest of the attacker. In this paper we therefore describe a probing algorithm and a model of MPLS state space allowing an adversary to learn about the policies and policy state of an MPLS speaker. In spite of the restrictions on the adversary, our probing algorithm revealed the policy states of non-directly connected routers. Also, we analyse the confirmed information using a Bayesian network and provide simulative validation of our findings.
[1]
Gordon Thomson.
APTs: a poorly understood challenge
,
2011,
Netw. Secur..
[2]
Colin Tankard,et al.
Advanced Persistent threats and how to monitor and deter them
,
2011,
Netw. Secur..
[3]
Wei Wang,et al.
Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats
,
2012
.
[4]
Eric Michael Hutchins,et al.
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
,
2010
.
[5]
Yi-Ming Chen,et al.
A Novel Search Engine to Uncover Potential Victims for APT Investigations
,
2013,
NPC.
[6]
Frank Hill,et al.
Protecting data from malicious software
,
2002,
18th Annual Computer Security Applications Conference, 2002. Proceedings..
[7]
J. Initiative.
SP 800-39. Managing Information Security Risk: Organization, Mission, and Information System View
,
2011
.
[8]
Wouter Joosen,et al.
Evolutionary algorithms for classification of malware families through different network behaviors
,
2014,
GECCO.
[9]
Leyla Bilge,et al.
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat
,
2012,
RAID.
[10]
Susan Young,et al.
Anatomy of an Attack
,
2003
.