Virtual private networks (VPNs) are a popular approach for protecting otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many industrial deployments. This paper employs a probabilistic model to evaluate and quantify the security of VPN configurations. Simulations of the VPN model are conducted to investigate the trade-offs and parameter dependence in various VPN configurations. The experimental results provide recommendations for securing VPN deployments in industrial control environments. © 2012 Elsevier B.V.
Rahimi, S., & Zargham, M. (2012). Analysis of the security of VPN configurations in industrial control environments. International Journal of Critical Infrastructure Protection, 5(1), 3–13. https://doi.org/10.1016/j.ijcip.2012.01.001