SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis paper will discuss the protocol suite IPSEC, with a view to analyzing the various weaknesses have been or could be identified within the protocol. The paper will focus on a small set of example exploits across specific implementations or vendor products. The paper will begin with a brief introduction to the fundamentals of IPSEC. IPSEC is a complex and highly mathematical subject, and many of the in depth technical issues will be beyond the scope of this paper, however, an attempt will be made to show the reader the importance of a basic understanding of these underlying operations and tools.