Security verification of a virtual private network over MPLS

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present in this paper how to assess a VPN (Virtual Private Network) security implemented over the Multi Protocol Label Switching (MPLS) protocol. This assessment is based on the definition of a MPLS/VPN security policy and on a reverse-engineering process performed on the network routers configurations. This paper details the algorithms as well as their asymptotic time complexity required to assess this security policy. Moreover, this paper also suggests an approach to rank a VPN perimeter. © 2007 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Llorens, C., & Serhrouchni, A. (2007). Security verification of a virtual private network over MPLS. IFIP International Federation for Information Processing, 229, 339–353. https://doi.org/10.1007/978-0-387-49690-0_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free