Security Analysis of VPN Configurations in Industrial Control Environments

Abstract : Virtual private networks (VPNs) are widely recommended to protect otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many deployments. This paper uses a probabilistic model to evaluate and quantify the security of VPN configurations. Simulations of the VPN model are conducted to investigate the trade-offs and parameter dependence in various VPN configurations. The experimental results provide recommendations for securing VPN deployments in industrial control environments.
Document type :
Conference papers
Jonathan Butts; Sujeet Shenoi. 5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. Springer, IFIP Advances in Information and Communication Technology, AICT-367, pp.73-88, 2011, Critical Infrastructure Protection V. 〈10.1007/978-3-642-24864-1_6〉
Liste complète des métadonnées

Cited literature [22 references]  Display  Hide  Download

https://hal.inria.fr/hal-01571782
Contributor : Hal Ifip <>
Submitted on : Thursday, August 3, 2017 - 3:03:59 PM
Last modification on : Thursday, August 3, 2017 - 3:04:48 PM

File

978-3-642-24864-1_6_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Sanaz Rahimi, Mehdi Zargham. Security Analysis of VPN Configurations in Industrial Control Environments. Jonathan Butts; Sujeet Shenoi. 5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. Springer, IFIP Advances in Information and Communication Technology, AICT-367, pp.73-88, 2011, Critical Infrastructure Protection V. 〈10.1007/978-3-642-24864-1_6〉. 〈hal-01571782〉

Share

Metrics

Record views

182

Files downloads

57