Mining Digital Twins of a VPN Server

Andrea Pferscher*, Benjamin Wunderling, Bernhard K. Aichernig, Edi Muškardin

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in einer FachzeitschriftKonferenzartikelBegutachtung

Abstract

Virtual private networks (VPNs) are widely used to create a secure communication mode between multiple parties over an insecure channel. A common use case for VPNs is secure access to company networks. Therefore, bugs in VPN software are often severe. The Internet Key Exchange protocol (IKE) is a protocol in the Internet Protocol Security (IPsec) protocol suite used in VPNs. There are two version of IKE, IPsec-IKEv1 and the newer IPsec-IKEv2, with IPsec-IKEv1 still widely used in practice. While IPsec-IKEv2 has been investigated in the context of automata learning, no such work exists for IPsec-IKEv1. This paper closes the gap for the IPsec-IKEv1 protocol and shows the steps taken to learn a digital twin of an IPsec server using automata learning. We present and contrast two learned models of an IPsec server. Using learning, we also found security issues in encryption libraries.

Originalspracheenglisch
Seitenumfang11
FachzeitschriftCEUR Workshop Proceedings
Jahrgang3507
PublikationsstatusVeröffentlicht - 2023
Veranstaltung2023 Workshop on Applications of Formal Methods and Digital Twins: FMDT 2023 - Lubeck, Deutschland
Dauer: 6 März 20236 März 2023

ASJC Scopus subject areas

  • Allgemeine Computerwissenschaft

Fingerprint

Untersuchen Sie die Forschungsthemen von „Mining Digital Twins of a VPN Server“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren