Article ID Journal Published Year Pages File Type
275127 International Journal of Critical Infrastructure Protection 2012 11 Pages PDF
Abstract

Virtual private networks (VPNs) are a popular approach for protecting otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many industrial deployments. This paper employs a probabilistic model to evaluate and quantify the security of VPN configurations. Simulations of the VPN model are conducted to investigate the trade-offs and parameter dependence in various VPN configurations. The experimental results provide recommendations for securing VPN deployments in industrial control environments.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,