메뉴 건너뛰기




Volumn 5, Issue 1, 2012, Pages 3-13

Analysis of the security of VPN configurations in industrial control environments

Author keywords

Control systems; Security analysis; Simulation; Virtual private networks

Indexed keywords

INDUSTRIAL CONTROLS; INDUSTRIAL DEPLOYMENT; PARAMETER DEPENDENCE; PROBABILISTIC MODELS; SECURITY ANALYSIS; SIMULATION;

EID: 84858290582     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2012.01.001     Document Type: Article
Times cited : (15)

References (28)
  • 1
    • 77957983535 scopus 로고    scopus 로고
    • Research trends on secure SCADA network technology and methods
    • Alsiherov F., Kim T. Research trends on secure SCADA network technology and methods. WSEAS Transactions on Systems and Control 2010, 8(5):635-645.
    • (2010) WSEAS Transactions on Systems and Control , vol.8 , Issue.5 , pp. 635-645
    • Alsiherov, F.1    Kim, T.2
  • 2
    • 84858289473 scopus 로고    scopus 로고
    • International Electrotechnical Commission, Communication Network and System Security-Profiles including TCP/IP, Technical Specification IEC TS 62351-3, Geneva, Switzerland
    • International Electrotechnical Commission, Communication Network and System Security-Profiles including TCP/IP, Technical Specification IEC TS 62351-3, Geneva, Switzerland, 2007.
    • (2007)
  • 3
    • 84858281057 scopus 로고    scopus 로고
    • International Electrotechnical Commission, Security for IEC 60870-5 and Derivatives, Technical Specification IEC TS 62351-5, Geneva, Switzerland
    • International Electrotechnical Commission, Security for IEC 60870-5 and Derivatives, Technical Specification IEC TS 62351-5, Geneva, Switzerland, 2009.
    • (2009)
  • 4
    • 84858289472 scopus 로고    scopus 로고
    • International Electrotechnical Commission, Security for IEC 61850, Technical Specification IEC TS 62351-6, Geneva, Switzerland
    • International Electrotechnical Commission, Security for IEC 61850, Technical Specification IEC TS 62351-6, Geneva, Switzerland, 2007.
    • (2007)
  • 5
    • 41549144752 scopus 로고    scopus 로고
    • Security architecture for control networks using IPSec and KINK
    • in: Proceedings of the Symposium on Applications and the Internet
    • N. Okabe, S. Sakane, K. Miyazawa, K. Kamada, A. Inoue, M. Ishiyama, Security architecture for control networks using IPSec and KINK, in: Proceedings of the Symposium on Applications and the Internet, pp. 414-420, 2005.
    • (2005) , pp. 414-420
    • Okabe, N.1    Sakane, S.2    Miyazawa, K.3    Kamada, K.4    Inoue, A.5    Ishiyama, M.6
  • 6
    • 67651162241 scopus 로고    scopus 로고
    • Improving the cyber security of SCADA communication networks
    • Patel S., Bhatt G., Graham J. Improving the cyber security of SCADA communication networks. Communications of the ACM 2009, 52(7):139-142.
    • (2009) Communications of the ACM , vol.52 , Issue.7 , pp. 139-142
    • Patel, S.1    Bhatt, G.2    Graham, J.3
  • 8
    • 84858281058 scopus 로고    scopus 로고
    • International Electrotechnical Commission, IEC 61850 Standard, Technical Specification IEC TS 61850, Geneva, Switzerland
    • International Electrotechnical Commission, IEC 61850 Standard, Technical Specification IEC TS 61850, Geneva, Switzerland, 2003.
    • (2003)
  • 9
    • 84858289477 scopus 로고    scopus 로고
    • Modbus-IDA, Modbus Application Protocol Specification V.1.1b, Hopkinton, Massachusetts
    • Modbus-IDA, Modbus Application Protocol Specification V.1.1b, Hopkinton, Massachusetts, 2006. http://www.modbus.org/docs/Modbus_Application_Protocol_V1_1b.pdf.
    • (2006)
  • 10
    • 84858279772 scopus 로고    scopus 로고
    • Common VPN security flaws, White Paper, NTA Monitor, Rochester, United Kingdom
    • R. Hills, Common VPN security flaws, White Paper, NTA Monitor, Rochester, United Kingdom, 2005. http://www.nta-monitor.com/posts/2005/01/VPN-Flaws-Whitepaper.pdf.
    • (2005)
    • Hills, R.1
  • 11
    • 84858289476 scopus 로고    scopus 로고
    • Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts, October 19
    • R. Brown, Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts, October 19, 2010. http://www.masshightech.com/stories/2010/10/18/daily19-Stuxnet-worm-causes-industry-concern-for-security-firms.html.
    • (2010)
    • Brown, R.1
  • 12
    • 84944319215 scopus 로고    scopus 로고
    • Stochastic activity networks: formal definitions and concepts
    • Springer Verlag, Berlin-Heidelberg, Germany, E. Brinksma, H. Hermanns, J. Katoen (Eds.)
    • Sanders W., Meyer J. Stochastic activity networks: formal definitions and concepts. Lectures on Formal Methods and Performance Analysis (LNCS 2090) 2001, 315-343. Springer Verlag, Berlin-Heidelberg, Germany. E. Brinksma, H. Hermanns, J. Katoen (Eds.).
    • (2001) Lectures on Formal Methods and Performance Analysis (LNCS 2090) , pp. 315-343
    • Sanders, W.1    Meyer, J.2
  • 13
    • 84944323296 scopus 로고    scopus 로고
    • Introduction to stochastic Petri nets
    • Springer-Verlag, Berlin-Heidelberg, Germany, E. Brinksma, H. Hermanns, J. Katoen (Eds.)
    • Balbo G. Introduction to stochastic Petri nets. Lectures on Formal Methods and Performance Analysis (LNCS 2090) 2001, 84-155. Springer-Verlag, Berlin-Heidelberg, Germany. E. Brinksma, H. Hermanns, J. Katoen (Eds.).
    • (2001) Lectures on Formal Methods and Performance Analysis (LNCS 2090) , pp. 84-155
    • Balbo, G.1
  • 14
    • 33744759260 scopus 로고    scopus 로고
    • A cryptographic tour of the IPSec standards
    • K. Paterson, A cryptographic tour of the IPSec standards, Information Security Technical Report, vol. 11, (2), pp. 72-81, 2006.
    • (2006) Information Security Technical Report , vol.11 , Issue.2 , pp. 72-81
    • Paterson, K.1
  • 15
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • in: Proceedings of the Sixteenth International Cryptology Conference
    • M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, in: Proceedings of the Sixteenth International Cryptology Conference, pp. 1-15, 1996.
    • (1996) , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 16
    • 0003272021 scopus 로고    scopus 로고
    • The internet key exchange (IKE)
    • Harkins D., Carrel D. The internet key exchange (IKE). RFC 1998, 2409.
    • (1998) RFC , vol.2409
    • Harkins, D.1    Carrel, D.2
  • 17
    • 77958541036 scopus 로고    scopus 로고
    • Different flavors of man-in-the-middle attack: Consequences and feasible solutions
    • in: Proceedings of the Third IEEE International Conference on Computer Science and Information Technology
    • N. Nayak, S. Ghosh, Different flavors of man-in-the-middle attack: Consequences and feasible solutions, in: Proceedings of the Third IEEE International Conference on Computer Science and Information Technology, pp. 491-495, 2010.
    • (2010) , pp. 491-495
    • Nayak, N.1    Ghosh, S.2
  • 18
    • 33646802751 scopus 로고    scopus 로고
    • Extended authentication within ISAKMP/Oakley (XAUTH)
    • Pereira R., Beaulieu S. Extended authentication within ISAKMP/Oakley (XAUTH). Internet Draft 1999.
    • (1999) Internet Draft
    • Pereira, R.1    Beaulieu, S.2
  • 20
    • 78650366342 scopus 로고    scopus 로고
    • Getting the real-time precise roundtrip time for stepping stone detection
    • in: Proceedings of the Fourth International Conference on Network and System Security
    • P. Li, W. Zhou, Y. Wang, Getting the real-time precise roundtrip time for stepping stone detection, in: Proceedings of the Fourth International Conference on Network and System Security, pp. 377-382, 2010.
    • (2010) , pp. 377-382
    • Li, P.1    Zhou, W.2    Wang, Y.3
  • 21
    • 84858289474 scopus 로고    scopus 로고
    • How to reduce malware-induced security breaches, March 31
    • S. Dispensa, How to reduce malware-induced security breaches, March 31, 2010.
    • (2010)
    • Dispensa, S.1
  • 22
    • 2642526260 scopus 로고    scopus 로고
    • Security analysis of SITAR intrusion tolerance system
    • in: Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems
    • D. Wang, B. Madan, K. Trivedi, Security analysis of SITAR intrusion tolerance system, in: Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, pp. 23-32, 2003.
    • (2003) , pp. 23-32
    • Wang, D.1    Madan, B.2    Trivedi, K.3
  • 24
    • 33645156923 scopus 로고    scopus 로고
    • A survey on communication networks for electric system automation
    • Gungor V., Lambert F. A survey on communication networks for electric system automation. Computer Networks 2006, 50(7):877-897.
    • (2006) Computer Networks , vol.50 , Issue.7 , pp. 877-897
    • Gungor, V.1    Lambert, F.2
  • 25
    • 33646523412 scopus 로고    scopus 로고
    • Analysis of communication alternatives in a heterogeneous network for a supervision and control system
    • Sempere V., Albero T., Silvestre J. Analysis of communication alternatives in a heterogeneous network for a supervision and control system. Computer Communications 2006, 29(8):1133-1145.
    • (2006) Computer Communications , vol.29 , Issue.8 , pp. 1133-1145
    • Sempere, V.1    Albero, T.2    Silvestre, J.3
  • 26
    • 79952635830 scopus 로고    scopus 로고
    • Secure SCADA network technology and methods
    • in: Proceedings of the Twelfth WSEAS International Conference on Automatic Control, Modeling and Simulation
    • F. Alsiherov, T. Kim, Secure SCADA network technology and methods, in: Proceedings of the Twelfth WSEAS International Conference on Automatic Control, Modeling and Simulation, pp. 434-438, 2010.
    • (2010) , pp. 434-438
    • Alsiherov, F.1    Kim, T.2
  • 27
    • 33744518446 scopus 로고    scopus 로고
    • Modeling and verification of IPSec and VPN security policies
    • in: Proceedings of the Thirteenth IEEE International Conference on Network Protocols
    • H. Hamed, E. Al-Shaer, W. Marrero, Modeling and verification of IPSec and VPN security policies, in: Proceedings of the Thirteenth IEEE International Conference on Network Protocols, pp. 259-278, 2005.
    • (2005) , pp. 259-278
    • Hamed, H.1    Al-Shaer, E.2    Marrero, W.3
  • 28
    • 0029713954 scopus 로고    scopus 로고
    • Security and auditing of VPN
    • in: Proceedings of the Third International Workshop on Services in Distributed and Networked Environments
    • N. Baukari, A. Aljane, Security and auditing of VPN, in: Proceedings of the Third International Workshop on Services in Distributed and Networked Environments, pp. 132-138, 1996.
    • (1996) , pp. 132-138
    • Baukari, N.1    Aljane, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.