Skip to main content

Table 5 Analysis results with an attacker positioned at the Energy Supplier

From: Load balancing of renewable energy: a cyber security analysis

Variants

1st & 2nd RTUs

DER RTU

SCADA servers

Model variant A (no DMZ / less secure)

18 days

12 days

24 days

Model variant B (no DMZ / more secure)

26 days

17 days

38 days

Model variant C (DMZ / less secure)

18 days

12 days

25 days

Model variant D (DMZ / more secure)

26 days

17 days

36 days