Skip to main content

Table 2 Analysis results from two special cases with an attacker positioned on the Internet

From: Load balancing of renewable energy: a cyber security analysis

Scenarios

1st & 2nd RTUs

DER RTU

SCADA servers

Special case: Model variant A HMI Web Server

17 days

18 days

17 days

Special case: Model variant A Diode from SCADA to DMZ

200 days (18%)

200 days (18%)

200 days (18%)