Is it easy or difficult for an attacker with a compromised SDN switch (e.g., whitebox switch, traditional switch+Openflow interface) to perform flow table analysis (flow rules analysis) and packet analysis (e.g., header analysis, packet drop) within that compromised switch?