• Title/Summary/Keyword: IPsec VPN

Search Result 93, Processing Time 0.034 seconds

IP VPN

  • 이계상;장상수
    • TTA Journal
    • /
    • s.77
    • /
    • pp.72-80
    • /
    • 2001
  • 본 고는 IP 기반 VPN의 핵심 요소기술인 대표적 터널 프로토콜과 이들의 표준화동향을 살펴본다. IPSEC의 최근 표준화동향, IPSEC을 이용한 L2TP 터널 보안, 그리고 네트워크 기반 VPN의 유력한 터널 프로토콜로 부상하는 MPLS가 논의된다. 아울러 말미에 VPN 표준 기술의 향후 전망이 간략히 기술된다.

  • PDF

VPN Traversal Scheme in Hierarchical MIPv4 environment (계층적 이동 IPv4 환경에서 VPN 운영 방안)

  • Sung, Su-Lyun;Kang, Jung-Ho;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.519-526
    • /
    • 2004
  • This paper presents an efficient interoperation scheme of a VPN(Virtual Private Network) and Mobile IP using a hierarchical structure of a FA(Foreign Agent). In the proposed scheme, the GFA(Gateway Foreign Agent) plays a role of VPN gateway on behalf of the MN(Mobile Node). When the MN moves in the same GFA domain, because the GFA has already an IPsec security association with a VPN gateway in the home network of the MN, the MN does not need an IPsec re-negotiaion. In this way, our mechanism reduces a message overhead and a delay resulted from an IPsec negotiation. And a MN can send a data to a correspondent node without a packet leakage. We show a performance of our scheme by using a discrete analytical model. Analytical results demonstrated that the total processing cost calculated by a registration update cost and a packet delivery cost is significantly reduced through our proposed scheme.

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.

Performance Evaluation of VPN Protocols Using Various Traffic (다양한 트래픽을 이용한 VPN 프로토콜 성능 평가)

  • O, Seung-Hui;Chae, Gi-Jun;Nam, Taek-Yong;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.721-730
    • /
    • 2001
  • Nowadays corporation networks are growing rapidly and they are needed to communicate with branch offices. Therefore, a VPN (Virtual Private Network) appears to reduce the cost of access and facilitate to manage and operate the enterprise network. Along with this trend, many studies have been done on VPN. It is important that the performance issues should be considered when VPN protocols are applied. However, most of them are limited on the tunneling methods and implementation of VPN and a few studies are performed on how installation of VPN affects the network. Therefore, in this paper, a testbed is constructed and VPN protocols are installed on it. Real traffic is generated and transmitted on the testbed to test how installing a VPN affects the network. As a result, layer 3 VPN protocol shows lower network performance than layer 2 VPN protocols. And we realize that the combination of L2TP and IPSec is the better method to install VPN than using IPSec only in the aspects of performance and security.

  • PDF

The Aliasing IPsec Network Mechanism for Solving an Overlapping Network Problem in the IPSec-VPN (IPsec-VPN에서의 네트워크 중복 문제 해결을 위한 IPsec 네트워크 별칭 기법)

  • Park Jaesung;Chun Junho;Jun Moon-Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.160-162
    • /
    • 2005
  • IPsec Tunnel Mode를 이용하여 보안 네트워크를 구축 시, 네트워크 구성이 중복된 경우에는 중복되지 않도록 재구성해야 하는 문제가 있다. 본 논문에서는 IPSec Tunnel Mode 통신을 하고자 하는 두 네트워크가 중복된 경우, IPSec 네트워크 별칭 기법을 통하여, 이전 네트워크의 구성을 변경하지 않고 통신할 수 있는 방안을 제시한다.

  • PDF

Mobile VPN Service Provision based on Diameter Mobile IPv4 Application (Diameter Mobile IPv4 응용에 기반한 Mobile VPN 서비스 제공)

  • Woo Hyeon-Je;Lee Mee-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1081-1084
    • /
    • 2006
  • MVPN(Mobile Virtual Private Network)은 이동단말을 사용하는 이동근무자가 지역적 제한 없이 VPN 서비스를 제공받을 수 있도록 하는 기술이다. 현재 IPsec-based VPN의 비중을 고려해볼 때, MVPN 기술은 Mobile 사용자에게 이동성을 제공하기 위한 Mobile IP프로토콜과 IPsec 기반 VPN 기술의 공존이 주된 연구 내용이다. mobile IP가 IPsec-based VPN GW(Gateway)와 동작할 경우 비호환성 문제가 발생한다. IETF에서는 두 프로토콜 간의 비호환성을 해결하기 위해VPN GW의 외부에 홈 에이전트(x-HA)를 새롭게 추가하는 방안이 연구되고 있다. 이에, AAA(Authentication, Authorization, Accounting) 서버를 이용하여 신뢰성 있는 x-HA를 동적으로 할당하는 방안이 제시되었으나, 세션 키의 외부 노출과 네트워크 간 이동 시 최초 핸드오프 시간이 오래 걸리는 한계를 지닌다. 본 논문은 이와 같은 문제점을 해결하여 이동하는 원격 VPN 사용자에게 보다 안전하며 핸드오프 지연시간이 최소화된 통신을 제공하는 방안을 제안한다.

  • PDF

Secure VPN Performance in IP Layers (IP계층에서의 VPN 전송성능에 관한 연구)

  • 임형진;권윤주;정태명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.102-112
    • /
    • 2001
  • This paper analyzes Security Performance and Processing Performance to measure performance between nodes by using AH and ESP protocol. IPsec VPN provides application with security service implemented in IP Layer while traffic cost and packet processing time it increased by encryption, decryption and authentication in AH and ESP. We measured overall packet processing time and IPsec module processing time. The result of the efficiency test showed that the factors of influencing electrical transmission efficiency were the size of electrical transmission packets, codes used for tunnelling, authentication functions, CPU velocity of host7, and the embodiment of IPsec; for a high capacity traffic, IPsec transmission was not appropriate, because transmission velocity was delayed by more than ten times in comparison with Non-IPsec.

  • PDF

A Configuration of LINUX router VPN using FreeS/WAN IPSEC (FreeS/WAN IPSEC을 이용한 LINUX 라우터 VPN 구성)

  • 김한철;이계상
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.499-502
    • /
    • 2001
  • FreeS/WAN[l] 은 LINUX 상에서 네트워크 보안 프로토콜표준인 IPSEC을 구현한 공개 S/W이다. 현재 LINUX Project로 수행되고 있으며 1.91 version 까지 나와 있다. 라우터와 라우터간에 IPSEC을 사용하여 통신함으로써 access control, connectionless integrity, data origin authentication, protection against replays, confidentiality의 서비스를 보장받을 수 있고, 또한 이러한 서비스들은 IP 계층에서 제공되기 때문에 IP 계층뿐만 아니라 그 이상의 계층에 대한 보호를 제공한다. [2] 본 논문에서는 LINUX router에 FreeS/WAN IPSEC을 설치하여 Security Gateway를 구성하고, 이 Security Gateway를 통해 전형적인 가상사설망을 구성할 수 있음을 보였다. 양단의 Security Gateway에 설치되어진 FreeS/WAN으로 VPN connection을 설정하고, 인증방법으로 RSA authentication key를 setup 하였다. IPSEC을 통하여 암호화되어진 데이터로 양단의 Gateway 구간에서 보안통신이 이루어짐을 알아본다.

  • PDF

IPSec design and implement under Linux for VPN (VPN을 위한 리눅스 상에서의 IPSec 설계 및 구현)

  • 김정범;박남섭;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.259-261
    • /
    • 2001
  • 최근 리눅스에 대한 사용이 빠른 속도로 증가하고 있다 하지만 리눅스의 오픈 소스 정책에 따른 리눅스 보안의 필요성이 대두되어 리눅스 기반의 효과적인 암호 개발이 급속히 확산되고 있다. 이러한 것을 보완하기 위한 해결책으로써 리눅스 상에서 IP 계층의 보안 프로토콜인 IPSec이 개발되었다. 하지만 이렇게 구현된 IPSec은 사용자가 설치 및 운영이 매우 어렵다. 이에 본 논문은 새로운 커널 컴파일 없이 ethertap을 이용한 IPSec 구조의 설계 및 구현한다.

  • PDF