Skip to main content

Advertisement

Table 2 Analysis results from two special cases with an attacker positioned on the Internet

From: Load balancing of renewable energy: a cyber security analysis

Scenarios 1st & 2nd RTUs DER RTU SCADA servers
Special case: Model variant A HMI Web Server 17 days 18 days 17 days
Special case: Model variant A Diode from SCADA to DMZ 200 days (18%) 200 days (18%) 200 days (18%)