“…Attacks Reference Network connection auditing using authentication, authorization, and accounting servers, role-based access control, authentication-based MAC address white-listing, unused port hardening MAC Spoofing, MAC Flooding, DoS, MitM, SYN flooding [34], [38] IP header (Sequence number) inclusion in TCP, cryptographically enhanced address resolution protocols (ARP), secure key distribution and exchange schemes Packet Replay, DoS, MitM, SYN flooding [43], [38] Firewalls, intrusion detection/prevention systems (ID/IPS), traceback and push-back services, cryptographic hashing and stack tweaking Mac Flooding, DoS, MitM, SYN flooding [43], [44], [34] Password management systems, access restriction after multiple failed log-in attempts, hardened operating system kernels, roll-back firmware updates Brute force attacks, DoS, Packet Replay, Eavesdropping [125] Personal security and privacy practises (e.g., security updates, password managers, encryption, ephemeral keys, etc.) Packet Replay, Eavesdropping [131] standardization and policy-making procedures can strengthen the cybersecurity posture of DERs and prevent vulnerabilities from materializing into treats and attacks. However, if the discussed practices fail to prevent or detect DER attacks, risk metrics, detailed system modeling, and mitigation plans can orchestrate available resources to inhibit or overcome undesirable grid conditions, thus enhancing EPS resilience.…”