Security in Software Defined Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2317-2346, 2015. ,
DOI : 10.1109/COMST.2015.2474118
A Survey of Security in Software Defined Networks, IEEE Communications Surveys & Tutorials, vol.18, issue.1, 2015. ,
DOI : 10.1109/COMST.2015.2453114
Zed Attack Proxy Project. https://www.owasp.org/index.php/OWASP Zed Attack Proxy Project [6] Open Networking Foundation Software-Defined Networking " . https://www.opennetworking.org/sdn-resources/sdn-definition. [7] Open Networking Foundation ,
Attacking software-defined networks, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, 2013. ,
DOI : 10.1145/2491185.2491220
Fingerprinting Software-Defined Networks, 2015 IEEE 23rd International Conference on Network Protocols (ICNP), 2015. ,
DOI : 10.1109/ICNP.2015.26
URL : http://arxiv.org/abs/1512.06585
An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in softwaredefined network, 2015. ,
NOX, ACM SIGCOMM Computer Communication Review, vol.38, issue.3, pp.105-110, 2008. ,
DOI : 10.1145/1384609.1384625
The beacon openflow controller, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, pp.13-18, 2013. ,
DOI : 10.1145/2491185.2491189
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.413.5176