We present in this paper how to assess a VPN (Virtual Private Network) security implemented over the Multi Protocol Label Switching (MPLS) protocol. This assessment is based on the definition of a MPLS/VPN security policy and on a reverse-engineering process performed on the network routers configurations. This paper details the algorithms as well as their asymptotic time complexity required to assess this security policy. Moreover, this paper also suggests an approach to rank a VPN perimeter. © 2007 International Federation for Information Processing.
CITATION STYLE
Llorens, C., & Serhrouchni, A. (2007). Security verification of a virtual private network over MPLS. IFIP International Federation for Information Processing, 229, 339–353. https://doi.org/10.1007/978-0-387-49690-0_27
Mendeley helps you to discover research relevant for your work.