Skip to main content

Advertisement

Table 5 Analysis results with an attacker positioned at the Energy Supplier

From: Load balancing of renewable energy: a cyber security analysis

Variants 1st & 2nd RTUs DER RTU SCADA servers
Model variant A (no DMZ / less secure) 18 days 12 days 24 days
Model variant B (no DMZ / more secure) 26 days 17 days 38 days
Model variant C (DMZ / less secure) 18 days 12 days 25 days
Model variant D (DMZ / more secure) 26 days 17 days 36 days