Mining Digital Twins of a VPN Server

Andrea Pferscher*, Benjamin Wunderling, Bernhard K. Aichernig, Edi Muškardin

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

Abstract

Virtual private networks (VPNs) are widely used to create a secure communication mode between multiple parties over an insecure channel. A common use case for VPNs is secure access to company networks. Therefore, bugs in VPN software are often severe. The Internet Key Exchange protocol (IKE) is a protocol in the Internet Protocol Security (IPsec) protocol suite used in VPNs. There are two version of IKE, IPsec-IKEv1 and the newer IPsec-IKEv2, with IPsec-IKEv1 still widely used in practice. While IPsec-IKEv2 has been investigated in the context of automata learning, no such work exists for IPsec-IKEv1. This paper closes the gap for the IPsec-IKEv1 protocol and shows the steps taken to learn a digital twin of an IPsec server using automata learning. We present and contrast two learned models of an IPsec server. Using learning, we also found security issues in encryption libraries.

Original languageEnglish
Number of pages11
JournalCEUR Workshop Proceedings
Volume3507
Publication statusPublished - 2023
Event2023 Workshop on Applications of Formal Methods and Digital Twins: FMDT 2023 - Lubeck, Germany
Duration: 6 Mar 20236 Mar 2023

Keywords

  • active automata learning
  • digital twin
  • IPsec
  • model mining
  • VPN

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Mining Digital Twins of a VPN Server'. Together they form a unique fingerprint.

Cite this