I. Ahmad, Security in Software Defined Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2317-2346, 2015.
DOI : 10.1109/COMST.2015.2474118

S. Scott-hayward, S. Natarajan, and S. Sezer, A Survey of Security in Software Defined Networks, IEEE Communications Surveys & Tutorials, vol.18, issue.1, 2015.
DOI : 10.1109/COMST.2015.2453114

N. Https, Zed Attack Proxy Project. https://www.owasp.org/index.php/OWASP Zed Attack Proxy Project [6] Open Networking Foundation Software-Defined Networking " . https://www.opennetworking.org/sdn-resources/sdn-definition. [7] Open Networking Foundation

S. Shin and G. Gu, Attacking software-defined networks, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, 2013.
DOI : 10.1145/2491185.2491220

R. Bifulco, Fingerprinting Software-Defined Networks, 2015 IEEE 23rd International Conference on Network Protocols (ICNP), 2015.
DOI : 10.1109/ICNP.2015.26

URL : http://arxiv.org/abs/1512.06585

J. Leng, An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in softwaredefined network, 2015.

N. Gude, NOX, ACM SIGCOMM Computer Communication Review, vol.38, issue.3, pp.105-110, 2008.
DOI : 10.1145/1384609.1384625

D. Erickson, The beacon openflow controller, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, pp.13-18, 2013.
DOI : 10.1145/2491185.2491189

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.413.5176