Analysis and Verification of IPSec VPN Security Vulnerability
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network. This paper analyzes the security vulnerabilities of the radical mode of the IKE protocol a...
| Published in: | Jisuanji gongcheng |
|---|---|
| Main Author: | |
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Computer Engineering
2021-06-01
|
| Subjects: | |
| Online Access: | https://www.ecice06.com/fileup/1000-3428/PDF/20210618.pdf |
| _version_ | 1848664487944519680 |
|---|---|
| author | ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai |
| author_facet | ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai |
| author_sort | ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai |
| collection | DOAJ |
| container_title | Jisuanji gongcheng |
| description | Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network. This paper analyzes the security vulnerabilities of the radical mode of the IKE protocol and the OSPF routing protocol in IPSec VPN. Then three commonly used OSPF routing deception methods are studied for their performance in the man-in-the-middle attacks on IPSec VPN. On this basis, the traffic hijacking model for IPSec VPN and the attack data packet are constructed. The traffic hijacking algorithm for IPSec VPN and KEYMAT key acquisition algorithm are also designed. Finally, a simulation environment is built to verify the security vulnerabilities of IPSec VPN. By employing the dual LSA injection route spoofing attack method, the experiment realizes the cross-network-segment man-in-the-middle attacks on IPSec VPN. The result of the study is of great importance to the protection of network boundary devices and backbone network traffic. |
| format | Article |
| id | doaj-art-e457596fbbd14e5d9f2c0b7eff7697e3 |
| institution | Directory of Open Access Journals |
| issn | 1000-3428 |
| language | English |
| publishDate | 2021-06-01 |
| publisher | Editorial Office of Computer Engineering |
| record_format | Article |
| spelling | doaj-art-e457596fbbd14e5d9f2c0b7eff7697e32025-10-31T03:05:47ZengEditorial Office of Computer EngineeringJisuanji gongcheng1000-34282021-06-0147614215110.19678/j.issn.1000-3428.0058383Analysis and Verification of IPSec VPN Security VulnerabilityZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai0Electronic Confrontation Institute, National University of Defense Technology, Hefei 230037, ChinaNetwork boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network. This paper analyzes the security vulnerabilities of the radical mode of the IKE protocol and the OSPF routing protocol in IPSec VPN. Then three commonly used OSPF routing deception methods are studied for their performance in the man-in-the-middle attacks on IPSec VPN. On this basis, the traffic hijacking model for IPSec VPN and the attack data packet are constructed. The traffic hijacking algorithm for IPSec VPN and KEYMAT key acquisition algorithm are also designed. Finally, a simulation environment is built to verify the security vulnerabilities of IPSec VPN. By employing the dual LSA injection route spoofing attack method, the experiment realizes the cross-network-segment man-in-the-middle attacks on IPSec VPN. The result of the study is of great importance to the protection of network boundary devices and backbone network traffic.https://www.ecice06.com/fileup/1000-3428/PDF/20210618.pdfipsec vpn technology|ike protocol|man-in-the-middle attack|ospf protocol|routing spoofing attack |
| spellingShingle | ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai Analysis and Verification of IPSec VPN Security Vulnerability ipsec vpn technology|ike protocol|man-in-the-middle attack|ospf protocol|routing spoofing attack |
| title | Analysis and Verification of IPSec VPN Security Vulnerability |
| title_full | Analysis and Verification of IPSec VPN Security Vulnerability |
| title_fullStr | Analysis and Verification of IPSec VPN Security Vulnerability |
| title_full_unstemmed | Analysis and Verification of IPSec VPN Security Vulnerability |
| title_short | Analysis and Verification of IPSec VPN Security Vulnerability |
| title_sort | analysis and verification of ipsec vpn security vulnerability |
| topic | ipsec vpn technology|ike protocol|man-in-the-middle attack|ospf protocol|routing spoofing attack |
| url | https://www.ecice06.com/fileup/1000-3428/PDF/20210618.pdf |
| work_keys_str_mv | AT zhouyiminliufangzhengduzhenyuzhangkai analysisandverificationofipsecvpnsecurityvulnerability |
