Analysis and Verification of IPSec VPN Security Vulnerability

Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network. This paper analyzes the security vulnerabilities of the radical mode of the IKE protocol a...

Full description

Bibliographic Details
Published in:Jisuanji gongcheng
Main Author: ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
Format: Article
Language:English
Published: Editorial Office of Computer Engineering 2021-06-01
Subjects:
Online Access:https://www.ecice06.com/fileup/1000-3428/PDF/20210618.pdf
_version_ 1848664487944519680
author ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
author_facet ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
author_sort ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
collection DOAJ
container_title Jisuanji gongcheng
description Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network. This paper analyzes the security vulnerabilities of the radical mode of the IKE protocol and the OSPF routing protocol in IPSec VPN. Then three commonly used OSPF routing deception methods are studied for their performance in the man-in-the-middle attacks on IPSec VPN. On this basis, the traffic hijacking model for IPSec VPN and the attack data packet are constructed. The traffic hijacking algorithm for IPSec VPN and KEYMAT key acquisition algorithm are also designed. Finally, a simulation environment is built to verify the security vulnerabilities of IPSec VPN. By employing the dual LSA injection route spoofing attack method, the experiment realizes the cross-network-segment man-in-the-middle attacks on IPSec VPN. The result of the study is of great importance to the protection of network boundary devices and backbone network traffic.
format Article
id doaj-art-e457596fbbd14e5d9f2c0b7eff7697e3
institution Directory of Open Access Journals
issn 1000-3428
language English
publishDate 2021-06-01
publisher Editorial Office of Computer Engineering
record_format Article
spelling doaj-art-e457596fbbd14e5d9f2c0b7eff7697e32025-10-31T03:05:47ZengEditorial Office of Computer EngineeringJisuanji gongcheng1000-34282021-06-0147614215110.19678/j.issn.1000-3428.0058383Analysis and Verification of IPSec VPN Security VulnerabilityZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai0Electronic Confrontation Institute, National University of Defense Technology, Hefei 230037, ChinaNetwork boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network. This paper analyzes the security vulnerabilities of the radical mode of the IKE protocol and the OSPF routing protocol in IPSec VPN. Then three commonly used OSPF routing deception methods are studied for their performance in the man-in-the-middle attacks on IPSec VPN. On this basis, the traffic hijacking model for IPSec VPN and the attack data packet are constructed. The traffic hijacking algorithm for IPSec VPN and KEYMAT key acquisition algorithm are also designed. Finally, a simulation environment is built to verify the security vulnerabilities of IPSec VPN. By employing the dual LSA injection route spoofing attack method, the experiment realizes the cross-network-segment man-in-the-middle attacks on IPSec VPN. The result of the study is of great importance to the protection of network boundary devices and backbone network traffic.https://www.ecice06.com/fileup/1000-3428/PDF/20210618.pdfipsec vpn technology|ike protocol|man-in-the-middle attack|ospf protocol|routing spoofing attack
spellingShingle ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
Analysis and Verification of IPSec VPN Security Vulnerability
ipsec vpn technology|ike protocol|man-in-the-middle attack|ospf protocol|routing spoofing attack
title Analysis and Verification of IPSec VPN Security Vulnerability
title_full Analysis and Verification of IPSec VPN Security Vulnerability
title_fullStr Analysis and Verification of IPSec VPN Security Vulnerability
title_full_unstemmed Analysis and Verification of IPSec VPN Security Vulnerability
title_short Analysis and Verification of IPSec VPN Security Vulnerability
title_sort analysis and verification of ipsec vpn security vulnerability
topic ipsec vpn technology|ike protocol|man-in-the-middle attack|ospf protocol|routing spoofing attack
url https://www.ecice06.com/fileup/1000-3428/PDF/20210618.pdf
work_keys_str_mv AT zhouyiminliufangzhengduzhenyuzhangkai analysisandverificationofipsecvpnsecurityvulnerability