{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:3VMMDVXNHX6WHDFTYDSMKY54WB","short_pith_number":"pith:3VMMDVXN","schema_version":"1.0","canonical_sha256":"dd58c1d6ed3dfd638cb3c0e4c563bcb0434639fac23d7dacc7f684cb7a221127","source":{"kind":"arxiv","id":"1703.06992","version":3},"attestation_state":"computed","paper":{"title":"A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.NI","authors_text":"AbdelRahman Abdou, Paul C. van Oorschot, Tao Wan","submitted_at":"2017-03-20T22:49:21Z","abstract_excerpt":"Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural difference implies a different design for control functions necessary for essential network properties, e.g., loop prevention and link redundancy. We explore how such differences redefine the security weaknesses in the SDN control plane and provide a framework for comparative analysis which focuses on essential network properties required by typical production networks. This enables analysis of how these properties are del"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1703.06992","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-03-20T22:49:21Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"cba291553817c74ad8aeb082f9bc3245a2c7964733ca5bb6913c6abfb6aec1e0","abstract_canon_sha256":"a2979fce8efb13bcf3f4f1e8226c0b27c3d3d0a29922b4955287c463320998e5"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:28:41.019168Z","signature_b64":"lU0yvldnplCMi9QZqD5Qzto9QiMV2GeYkGQM7c8wjcTa9uiSDWsdzvrkvO4QDwWUkXH3su7/p2OXEvl+iVRKBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"dd58c1d6ed3dfd638cb3c0e4c563bcb0434639fac23d7dacc7f684cb7a221127","last_reissued_at":"2026-05-18T00:28:41.018670Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:28:41.018670Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.NI","authors_text":"AbdelRahman Abdou, Paul C. van Oorschot, Tao Wan","submitted_at":"2017-03-20T22:49:21Z","abstract_excerpt":"Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural difference implies a different design for control functions necessary for essential network properties, e.g., loop prevention and link redundancy. We explore how such differences redefine the security weaknesses in the SDN control plane and provide a framework for comparative analysis which focuses on essential network properties required by typical production networks. This enables analysis of how these properties are del"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.06992","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1703.06992","created_at":"2026-05-18T00:28:41.018761+00:00"},{"alias_kind":"arxiv_version","alias_value":"1703.06992v3","created_at":"2026-05-18T00:28:41.018761+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.06992","created_at":"2026-05-18T00:28:41.018761+00:00"},{"alias_kind":"pith_short_12","alias_value":"3VMMDVXNHX6W","created_at":"2026-05-18T12:30:58.224056+00:00"},{"alias_kind":"pith_short_16","alias_value":"3VMMDVXNHX6WHDFT","created_at":"2026-05-18T12:30:58.224056+00:00"},{"alias_kind":"pith_short_8","alias_value":"3VMMDVXN","created_at":"2026-05-18T12:30:58.224056+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB","json":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB.json","graph_json":"https://pith.science/api/pith-number/3VMMDVXNHX6WHDFTYDSMKY54WB/graph.json","events_json":"https://pith.science/api/pith-number/3VMMDVXNHX6WHDFTYDSMKY54WB/events.json","paper":"https://pith.science/paper/3VMMDVXN"},"agent_actions":{"view_html":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB","download_json":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB.json","view_paper":"https://pith.science/paper/3VMMDVXN","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1703.06992&json=true","fetch_graph":"https://pith.science/api/pith-number/3VMMDVXNHX6WHDFTYDSMKY54WB/graph.json","fetch_events":"https://pith.science/api/pith-number/3VMMDVXNHX6WHDFTYDSMKY54WB/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/action/timestamp_anchor","attest_storage":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/action/storage_attestation","attest_author":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/action/author_attestation","sign_citation":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/action/citation_signature","submit_replication":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/action/replication_record"}},"created_at":"2026-05-18T00:28:41.018761+00:00","updated_at":"2026-05-18T00:28:41.018761+00:00"}