Skip to main content

2016 | OriginalPaper | Buchkapitel

MPLS Policy Target Recognition Network

verfasst von : Abdulrahman Al-Mutairi, Stephen Wolthusen

Erschienen in: Risks and Security of Internet and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Policy-based protocols such as Multi-Protocol Label Switching (MPLS) and Border Gateway Protocol (BGP) are deployed by service providers to increase the efficiency of their networks; particularly the MPLS protocol where traffic engineering is required for the guarantee of Quality of Service (QoS) that is crucial for real-time dependant systems such as financial services, government and public safety, critical infrastructures and smart grids. Network operators are cautious about revealing information of their network; mainly for security reasons. Whereas, sophisticated adversaries are known for launching reconnaissance attacks years in advance of more malicious attacks. Whilst, research in this area was limited to the BGP, this paper aims to analyse the ability to reveal MPLS policy states with limited knowledge using Bayesian Belief Network (BBN).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Due to the limitation of the simulation tool, the simulation study was only conducted with the conservative label retention policy.
 
Literatur
1.
Zurück zum Zitat Sanzotta, M.A., Sherrill, E.T.: Approximation probability of detection in the Janus model. Technical report, DTIC Document (1997) Sanzotta, M.A., Sherrill, E.T.: Approximation probability of detection in the Janus model. Technical report, DTIC Document (1997)
2.
Zurück zum Zitat Lampis, M.: Application of Bayesian Belief Networks to system fault diagnostics. Ph.D. thesis, Mariapia Lampis (2010) Lampis, M.: Application of Bayesian Belief Networks to system fault diagnostics. Ph.D. thesis, Mariapia Lampis (2010)
3.
Zurück zum Zitat Dawsey, W.J., Minsker, B.S., VanBlaricum, V.L.: Bayesian belief networks to integrate monitoring evidence of water distribution system contamination. J. Water Resour. Plan. Manag. 132(4), 234–241 (2006)CrossRef Dawsey, W.J., Minsker, B.S., VanBlaricum, V.L.: Bayesian belief networks to integrate monitoring evidence of water distribution system contamination. J. Water Resour. Plan. Manag. 132(4), 234–241 (2006)CrossRef
4.
Zurück zum Zitat Al-Mutairi, A., Wolthusen, S.: Malicious MPLS policy engine reconnaissance. In: De Decker, C.M.S., Zúquete, A. (eds.) CMS 2014. LNCS, vol. 8735, pp. 3–18. Springer, Heidelberg (2014) Al-Mutairi, A., Wolthusen, S.: Malicious MPLS policy engine reconnaissance. In: De Decker, C.M.S., Zúquete, A. (eds.) CMS 2014. LNCS, vol. 8735, pp. 3–18. Springer, Heidelberg (2014)
5.
Zurück zum Zitat Krieg, M.L.: A tutorial on Bayesian belief networks. Technical report, Defence Science and Technology Organisation (2001) Krieg, M.L.: A tutorial on Bayesian belief networks. Technical report, Defence Science and Technology Organisation (2001)
6.
Zurück zum Zitat Caesar, M., Rexford, J.: BGP routing policies in ISP networks. IEEE Netw. 19(6), 5–11 (2005)CrossRef Caesar, M., Rexford, J.: BGP routing policies in ISP networks. IEEE Netw. 19(6), 5–11 (2005)CrossRef
7.
Zurück zum Zitat Awduchea, D.O., Jabbarib, B.: Internet traffic engineering using multi-protocol label switching (MPLS). Comput. Netw. 40(1), 111–129 (2002)CrossRef Awduchea, D.O., Jabbarib, B.: Internet traffic engineering using multi-protocol label switching (MPLS). Comput. Netw. 40(1), 111–129 (2002)CrossRef
8.
Zurück zum Zitat Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol label switching architecture. IETF, RFC 3031 (2001) Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol label switching architecture. IETF, RFC 3031 (2001)
9.
Zurück zum Zitat Andersson, L., Doolan, P., Feldman, N., Fredette, A., Thomas, B.: LDP specification, October 2007 Andersson, L., Doolan, P., Feldman, N., Fredette, A., Thomas, B.: LDP specification, October 2007
10.
Zurück zum Zitat Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques. MIT Press, Cambridge (2009)MATH Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques. MIT Press, Cambridge (2009)MATH
12.
Zurück zum Zitat Davie, B.S., Farrel, A.: MPLS: Next Steps. Morgan Kaufmann Publishers Inc., San Francisco (2008) Davie, B.S., Farrel, A.: MPLS: Next Steps. Morgan Kaufmann Publishers Inc., San Francisco (2008)
13.
Zurück zum Zitat Stewart, L., McCarty Jr., P.: Use of bayesian belief networks to fuse continuous and discrete information for target recognition, tracking, and situation assessment. In: Aerospace Sensing, International Society for Optics and Photonics, pp. 177–185 (1992) Stewart, L., McCarty Jr., P.: Use of bayesian belief networks to fuse continuous and discrete information for target recognition, tracking, and situation assessment. In: Aerospace Sensing, International Society for Optics and Photonics, pp. 177–185 (1992)
15.
Zurück zum Zitat Al-Mutairi, A., Wolthusen, S.D.: A security analysis of mpls service degradation attacks based on restricted adversary models. In: Kayem, A. (ed.) Information Security in Diverse Computing Environments. IGI Global, Hershey (2014) Al-Mutairi, A., Wolthusen, S.D.: A security analysis of mpls service degradation attacks based on restricted adversary models. In: Kayem, A. (ed.) Information Security in Diverse Computing Environments. IGI Global, Hershey (2014)
Metadaten
Titel
MPLS Policy Target Recognition Network
verfasst von
Abdulrahman Al-Mutairi
Stephen Wolthusen
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-31811-0_5