Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
275127 | International Journal of Critical Infrastructure Protection | 2012 | 11 Pages |
Abstract
Virtual private networks (VPNs) are a popular approach for protecting otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many industrial deployments. This paper employs a probabilistic model to evaluate and quantify the security of VPN configurations. Simulations of the VPN model are conducted to investigate the trade-offs and parameter dependence in various VPN configurations. The experimental results provide recommendations for securing VPN deployments in industrial control environments.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Sanaz Rahimi, Mehdi Zargham,