Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant

  • Authors:
  • Hasmukh Patel;Devesh C. Jinwala

  • Affiliations:
  • L. C. Institute of Technology, Bhandu;SardarVallabhbhai National Institute of Technology, Surat

  • Venue:
  • Proceedings of the 6th ACM India Computing Convention
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the growing concerns on the information security and the capabilities of an attacker, Denial of Service (DoS) attacks have become one of the most serious and potent form of network security attacks. The attackers target the protocols to exhaust resources by either disabling the servers or disrupting the protocol exchange. In fact, almost all the communication protocols including TCP, HIP, etc. are vulnerable to resource exhaustion attacks. One of the ways of dealing with the DoS attacks is to carry out a cost analysis of the impact of the DoS attacks and ensure that the impact of the same is minimized to the extent possible. We illustrate the applicability of the same to analyze the Internet Key Exchange (IKE) version2 protocol. IKEv2 is one of the significant protocol of IPSec suite. It establishes the security association between source and destination before IPSec connection establishes. In this paper, we analyze IKEv2 protocol to show that IKE v2 is susceptible to DoS attacks. To the best of our knowledge, although IKE v1 has been analyzed for susceptibility to the DoS attacks, IKE v2 has not yet been. We also propose a new variant of IKE v2 protocol using model given by Stebila and et al. to ensure mitigation of DoS attacks in IKEv2.