Virtual private networks (VPNs) are widely recommended to protect otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many deployments. This paper uses a probabilistic model to evaluate and quantify the security of VPN configurations. Simulations of the VPN model are conducted to investigate the trade-offs and parameter dependence in various VPN configurations. The experimental results provide recommendations for securing VPN deployments in industrial control environments.
CITATION STYLE
Rahimi, S., & Zargham, M. (2011). Security analysis of VPN configurations in industrial control environments. In IFIP Advances in Information and Communication Technology (Vol. 367, pp. 73–88). Springer New York LLC. https://doi.org/10.1007/978-3-642-24864-1_6
Mendeley helps you to discover research relevant for your work.