{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:32:12Z","timestamp":1761964332894},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642248634"},{"type":"electronic","value":"9783642248641"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24864-1_6","type":"book-chapter","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T16:34:47Z","timestamp":1318869287000},"page":"73-88","source":"Crossref","is-referenced-by-count":5,"title":["Security Analysis of VPN Configurations in Industrial Control Environments"],"prefix":"10.1007","author":[{"given":"Sanaz","family":"Rahimi","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Zargham","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"6_CR1","first-page":"635","volume":"8","author":"F. Alsiherov","year":"2010","unstructured":"F. Alsiherov and T. Kim, Research trend on secure SCADA network technology and methods, WSEAS Transactions on Systems and Control, vol. 8(5), pp. 635\u2013645, 2010.","journal-title":"WSEAS Transactions on Systems and Control"},{"key":"6_CR2","first-page":"434","volume-title":"Proceedings of the Twelfth WSEAS International Conference on Automatic Control, Modeling and Simulation","author":"F. Alsiherov","year":"2010","unstructured":"F. Alsiherov and T. Kim, Secure SCADA network technology and methods, Proceedings of the Twelfth WSEAS International Conference on Automatic Control, Modeling and Simulation, pp. 434\u2013438, 2010."},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-44667-2_3","volume-title":"Lectures on Formal Methods and Performance Analysis","author":"G. Balbo","year":"2001","unstructured":"G. Balbo, Introduction to stochastic Petri nets, in Lectures on Formal Methods and Performance Analysis (LNCS 2090), E. Brinksma, H. Hermanns and J.-P. Katoen (Eds.), Springer Verlag, Berlin-Heidelberg, Germany, pp. 84\u2013155, 2001."},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/SDNE.1996.502456","volume-title":"Proceedings of the Third International Workshop on Services in Distributed and Networked Environments","author":"N. Baukari","year":"1996","unstructured":"N. Baukari and A. Aljane, Security and auditing of VPN, Proceedings of the Third International Workshop on Services in Distributed and Networked Environments, pp. 132\u2013138, 1996."},{"key":"6_CR5","first-page":"1","volume-title":"Proceedings of the Sixteenth International Cryptology Conference","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, R. Canetti and H. Krawczyk, Keying hash functions for message authentication, Proceedings of the Sixteenth International Cryptology Conference, pp. 1\u201315, 1996."},{"key":"6_CR6","unstructured":"R. Brown, Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts (www.masshightech.com\/stories \/2010\/10\/18\/daily19-Stuxnet-worm-causes-industry-concern-for-security-firms.html), October 19, 2010."},{"issue":"10","key":"6_CR7","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","volume":"28","author":"D. Deavours","year":"2002","unstructured":"D. Deavours, G. Clark, T. Courtney, D. Daly, S. Derisavi, J. Doyle, W. Sanders and P. Webster, The Mobius framework and its implementation, IEEE Transactions on Software Engineering, vol. 28(10), pp. 956\u2013969, 2002.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR8","unstructured":"S. Dispensa, How to reduce malware-induced security breaches, eWeek.com, March 31, 2010."},{"issue":"7","key":"6_CR9","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.comnet.2006.01.005","volume":"50","author":"V. Gungor","year":"2006","unstructured":"V. Gungor and F. Lambert, A survey on communication networks for electric system automation, Computer Networks, vol. 50(7), pp. 877\u2013897, 2006.","journal-title":"Computer Networks"},{"key":"6_CR10","first-page":"259","volume-title":"Proceedings of the Thirteenth IEEE International Conference on Network Protocols","author":"H. Hamed","year":"2005","unstructured":"H. Hamed, E. Al-Shaer and W. Marrero, Modeling and verification of IPSec and VPN security policies, Proceedings of the Thirteenth IEEE International Conference on Network Protocols, pp. 259\u2013278, 2005."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"D. Harkins and D. Carrel, The Internet Key Exchange (IKE), RFC 2409, 1998.","DOI":"10.17487\/rfc2409"},{"key":"6_CR12","unstructured":"R. Hills, Common VPN Security Flaws, White Paper, NTA Monitor, Rochester, United Kingdom (www.nta-monitor.com\/posts\/2005\/01\/VPN-Flaws-Whitepaper.pdf), 2005."},{"key":"6_CR13","unstructured":"International Electrotechnical Commission, IEC 61850 Standard, Technical Specification IEC TS 61850, Geneva, Switzerland, 2003."},{"key":"6_CR14","unstructured":"International Electrotechnical Commission, Communication Network and System Security \u2013 Profiles including TCP\/IP, Technical Specification IEC TS 62351-3, Geneva, Switzerland, 2007."},{"key":"6_CR15","unstructured":"International Electrotechnical Commission, Security for IEC 61850, Technical Specification IEC TS 62351-6, Geneva, Switzerland, 2007."},{"key":"6_CR16","unstructured":"International Electrotechnical Commission, Security for IEC 60870-5 and Derivatives, Technical Specification IEC TS 62351-5, Geneva, Switzerland, 2009."},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/NSS.2010.36","volume-title":"Proceedings of the Fourth International Conference on Network and System Security","author":"P. Li","year":"2010","unstructured":"P. Li, W. Zhou and Y. Wang, Getting the real-time precise roundtrip time for stepping stone detection, Proceedings of the Fourth International Conference on Network and System Security, pp. 377\u2013382, 2010."},{"key":"6_CR18","volume-title":"Security Framework for DNP3 and SCADA","author":"M. Majdalawieh","year":"2008","unstructured":"M. Majdalawieh, Security Framework for DNP3 and SCADA, VDM Verlag, Saarbruken, Germany, 2008."},{"key":"6_CR19","unstructured":"Modbus-IDA, Modbus Application Protocol Specification V.1.1b, Hopkinton, Massachusetts (www.modbus.org\/docs\/Modbus_Application_Proto col_V1_1b.pdf), 2006."},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/ICCSIT.2010.5563900","volume-title":"Proceedings of the Third IEEE International Conference on Computer Science and Information Technology","author":"N. Nayak","year":"2010","unstructured":"N. Nayak and S. Ghosh, Different flavors of man-in-the-middle attack: Consequences and feasible solutions, Proceedings of the Third IEEE International Conference on Computer Science and Information Technology, pp. 491\u2013495, 2010."},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/SAINT.2005.57","volume-title":"Proceedings of the Symposium on Applications and the Internet","author":"N. Okabe","year":"2005","unstructured":"N. Okabe, S. Sakane, K. Miyazawa, K. Kamada, A. Inoue and M. Ishiyama, Security architecture for control networks using IPSec and KINK, Proceedings of the Symposium on Applications and the Internet, pp. 414\u2013420, 2005."},{"issue":"7","key":"6_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/1538788.1538820","volume":"52","author":"S. Patel","year":"2009","unstructured":"S. Patel, G. Bhatt and J. Graham, Improving the cyber security of SCADA communication networks, Communications of the ACM, vol. 52(7), pp. 139\u2013142, 2009.","journal-title":"Communications of the ACM"},{"issue":"2","key":"6_CR23","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.istr.2006.03.004","volume":"11","author":"K. Paterson","year":"2006","unstructured":"K. Paterson, A cryptographic tour of the IPSec standards, Information Security Technical Report, vol. 11(2), pp. 72\u201381, 2006.","journal-title":"Information Security Technical Report"},{"key":"6_CR24","unstructured":"R. Pereira and S. Beaulieu, Extended Authentication within ISAKMP \/Oakley (XAUTH), Internet Draft, 1999."},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/3-540-44667-2_9","volume-title":"Lectures on Formal Methods and Performance Analysis","author":"W. Sanders","year":"2001","unstructured":"W. Sanders and J. Meyer, Stochastic activity networks: Formal definitions and concepts, in Lectures on Formal Methods and Performance Analysis (LNCS 2090), E. Brinksma, H. Hermanns and J.-P. Katoen (Eds.), Springer Verlag, Berlin-Heidelberg, Germany, pp. 315\u2013343, 2001."},{"issue":"8","key":"6_CR26","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1016\/j.comcom.2005.07.001","volume":"29","author":"V. Sempere","year":"2006","unstructured":"V. Sempere, T. Albero and J. Silvestre, Analysis of communication alternatives in a heterogeneous network for a supervision and control system, Computer Communications, vol. 29(8), pp. 1133\u20131145, 2006.","journal-title":"Computer Communications"},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/DSN.2003.1209971","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks","author":"S. Singh","year":"2003","unstructured":"S. Singh, M. Cukier and W. Sanders, Probabilistic validation of an intrusion-tolerant replication system, Proceedings of the International Conference on Dependable Systems and Networks, pp. 615\u2013624, 2003."},{"key":"6_CR28","first-page":"23","volume-title":"Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems","author":"D. Wang","year":"2003","unstructured":"D. Wang, B. Madan and K. Trivedi, Security analysis of SITAR intrusion tolerance system, Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, pp. 23\u201332, 2003."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24864-1_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:18:45Z","timestamp":1606187925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24864-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642248634","9783642248641"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24864-1_6","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}