The present application claims priority to Korean patent application numbers 10-2015-0053235 filed on Apr. 15, 2015, the entire disclosure of which is incorporated herein in its entirety by reference.
1. Field of Invention
Various embodiments of the present disclosure relate to a virtual private network (VPN) security apparatus and an operation method thereof.
2. Description of Related Art
Due to its open properties, an IP network is attackable with only an IP address. In order to prevent such vulnerability, Internet Protocol security (IPsec) is used. However, typical IPsec may secure data but expose an IP header for packet forwarding. Accordingly, when a destination address in the IP header is exposed, it is possible for an attacker to increase loads to an IPsec support device by means of a flooding attack, etc.
Generally an IPsec VPN is used for security communication in service servers 161, 162, . . . , and 16N located inside a data center or an enterprise network 140 by using a public network 120 such as the Internet. At this point, a VPN apparatus 150 is present at a boundary of the data center or the enterprise network 140 and a terminal and a client 111, 112, . . . , or 11k, which desire to access, request and set IPsec VPN tunnels 131, 132, . . . , and 13k. The IPsec VPN is divided into a tunnel mode and a transport mode, and a description herein will be provided on the basis of the tunnel mode.
When a security tunnel is set between a client 110 and a VPN device 150 through a network 120, data necessary for security is transmitted through the security tunnel. At this point, the data 210 is encoded and transmission data is generated by using the IP header 220. In addition, a header 230 of the generated IPsec VPN (hereinafter referred to security tunnel) is added ahead of the data 210. At this point, since the Internet network is used in the middle, the security tunnel header necessarily uses an IP address that general network equipment may know. The VPN device 150 receiving the data decodes the data by using the security tunnel header and restores original data 240 and IP header 250.
When a third party accessing the Internet network becomes to know the security tunnel header, in terms of open properties of the IP internet network, since a continuous IPsec VPN setting request may be transferred to the IPsec VPN device, performance of the IPsec VPN device may be lowered and finally an unserviceable case may occur. In this case, the disabled state of the IPsec VPN device may cause an entirely unserviceable state.
Various embodiments of the present disclosure are directed to providing a VPN security apparatus for allocating a virtual address for each user and service and an operation method thereof.
One embodiment of the present disclosure provides an operation method of a VPN security apparatus. The operation method includes: receiving a service request from a client; dynamically allocating a fake address of a VPN apparatus connected to a service server, which provides the service requested by the client; and transmitting the fake address allocated to the VPN apparatus to the client and the VPN apparatus.
Another embodiment of the present disclosure provides an operation method of a VPN apparatus. The operation method includes: receiving a packet through a fake address allocated from a VPN security apparatus; performing network address translation (NAT) for translating the fake address in a header of the received packet into an original address; and decoding the packet on which the NAT is performed to remove an address for the VPN apparatus from the header of the packet.
Still another embodiment of the present disclosure provides a VPN security apparatus includes: a communication unit transmitting and receiving data with a client and a VPN device; an address allocation unit dynamically allocating a fake address of a VPN apparatus connected to a service server that provides the service requested by the client; and a control unit controlling to transmit the fake address, which is allocated to the VPN apparatus by the address allocation unit, to the client and the VPN apparatus, when the service request is received from the client.
Further another embodiment of the present disclosure provides a VPN apparatus includes: a communication unit transmitting and receiving data with a client and a VPN security apparatus; and a control unit controlling to receive a packet through a fake address allocated by the VPN security apparatus, perform NAT for translating the fake address in a header of the received packet into an original address, and to decode the NAT-performed packet to remove an address for the VPN apparatus from the header of the packet.
Example embodiments will now be described more fully hereinafter with reference to the accompanying drawings; however, they may be embodied in different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the example embodiments to those skilled in the art.
In the drawing figures, dimensions may be exaggerated for clarity of illustration. It will be understood that when an element is referred to as being “between” two elements, it can be the only element between the two elements, or one or more intervening elements may also be present. Like reference numerals refer to like elements throughout.
Hereinafter, it will be described in detail about an exemplary embodiment of the present invention in conjunction with the accompanying drawings. It should be noted that like reference numerals refer to like constituent elements in the drawings. In addition, detailed descriptions of well-known functions or constructions will be omitted since they would obscure the disclosure in unnecessary detail
In addition, if certain parts are described as being “connected” to other parts, they are not only “directly connected” to the other parts, but also “indirectly connected” to the other parts with any other device intervened therebetween. In addition, when an element is referred to as “comprising” or “including” a component, it does not preclude another component but may further include the other component unless the context clearly indicates otherwise.
Referring
The client 110 and the VPN apparatus 150 are configured with basic apparatuses for service and the VPN security apparatus 310 performs controls on the client 110 and the VPN apparatus 150.
The VPN security apparatus 310 dynamically allocates address information on the VPN apparatus 150 to which the client 110 is connected. The VPN security apparatus 310 may interlock with an authentication system and dynamically allocate an address after the authentication. Such an operation procedure of the VPN security apparatus is illustrated in
Referring to
Then, in operation 420, the VPN security apparatus 310 dynamically allocates a fake address of the VPN apparatus 150, which is connected to a service server providing the service requested by the client. Here, the fake address means a virtual address which is not an original address of the VPN apparatus 150. According to an embodiment of the present disclosure, one address is arbitrarily selected from an address pool of the VPN apparatus 150 and the selected address may be allocated as the fake address. In addition, the VPN security apparatus 310 may also allocate a fake address of the service server.
Next, in operation 430, the VPN security apparatus 310 transmits the fake address allocated to the VPN apparatus 150 to the client 110 and the VPN apparatus 150.
Furthermore, periodically or when a set event occurs, the VPN security apparatus 310 may allocate a new fake address to the VPN apparatus 150 and transmit the new fake address to the client 110 and the VPN apparatus 150.
In order to dynamically allocate address information on the VPN apparatus 150 to which the client 110 is connected, the VPN security apparatus 310 may include a communication unit, an address allocation unit, and a control unit. The communication unit may transmit and receive data with the client 110 and the VPN security apparatus, the address allocation unit may dynamically allocate the fake address of the VPN apparatus 150, which is connected to a service server for providing a service requested by the client 110, and the control unit may control an overall operation process of the VPN security apparatus 310, namely, a process for transmitting the fake address, which is allocated to the VPN apparatus 150 by the address allocation unit, to the client 110 and the VPN apparatus 150 when the service request is received from the client 110.
Referring to
As explained in relation to
The control plane 610 is configured with a VPN security apparatus (VPS) interlocking protocol 611 and the IKE protocol 612, and the data plane 620 may include a virtual interface 621, an IPsec interface 622, an IPsec engine 623, and a network address translation (NAT) interface 624. In addition, the data plane 620 is connected to physical interfaces 631 and 632.
At this point, the IKE protocol 612 is driven for one IPsec interface 622, and each virtual address may be generated from a virtual interface 621. Data 710, which is input through the physical interface 631, is input to a corresponding virtual interface. The IPsec interface 622 performs NAT on the data 710 to make data 720 for which the Fake VPN IP address is removed. Such data 720 is input to the IPsec engine 623 and is decoded (operation 730). The NAT interface 624 changes the Fake Service Server IP address in the decoded data 730 into the original IP address and outputs the original IP address to the service server through the physical interface 632. Such an operation process of the VPN apparatus is illustrated in
Referring to
Then in operation 820, the VPN apparatus 150 performs the NAT for translating, into the original address, the fake address for the VPN apparatus 150 in a header of the received packet.
Then in operation 830, the packet on which the NAT is performed is decoded and an address for the VPN apparatus 150 is removed from a header of the packet.
Furthermore, the VPN apparatus 150 may translate the fake address for the service server in the received packet into the original address and transmit the packet to the service server.
The VPN apparatus 150 may include a communication unit and a control unit for performing such a process. The communication unit may transmit and receive data with the client and the VPN security apparatus, and the control unit may control the entire operation process of the VPN apparatus 150, namely, a process for receiving a packet through a fake address allocated by the VPN security apparatus 310, performing NAT for translating the fake address in the header of the received packet into the original address, and for decoding the packet, on which the NAT is performed, to remove the address for the VPN apparatus from the header of the packet.
According to the present disclosure, an attack is not possible even if an attacker comes to know the address of the VPN apparatus 150 by using a virtual IPsec VPN address. In particular, when the virtual address is not routable, network equipment in the middle of the network drops attack traffics.
Referring to
According to various embodiments of the present disclosure, an address of a VPN apparatus may be dynamically changed to secure the VPN apparatus.
Example embodiments have been disclosed herein, and although specific terms are employed, they are used and are to be interpreted in a generic and descriptive sense only and not for purpose of limitation. In some instances, as would be apparent to one of ordinary skill in the art as of the filing of the present application, features, characteristics, and/or elements described in connection with a particular embodiment may be used singly or in combination with features, characteristics, and/or elements described in connection with other embodiments unless otherwise specifically indicated. Accordingly, it will be understood by those of skill in the art that various changes in form and details may be made without departing from the spirit and scope of the present invention as set forth in the following claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2015-0053235 | Apr 2015 | KR | national |