15 September 2017 4 5K Report

Is it easy or difficult for an attacker with a compromised SDN switch (e.g., whitebox switch, traditional switch+Openflow interface) to perform flow table analysis (flow rules analysis) and packet analysis (e.g., header analysis, packet drop) within that compromised switch?

More Zuochao Dou's questions See All
Similar questions and discussions