{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:3VMMDVXNHX6WHDFTYDSMKY54WB","short_pith_number":"pith:3VMMDVXN","canonical_record":{"source":{"id":"1703.06992","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-03-20T22:49:21Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"cba291553817c74ad8aeb082f9bc3245a2c7964733ca5bb6913c6abfb6aec1e0","abstract_canon_sha256":"a2979fce8efb13bcf3f4f1e8226c0b27c3d3d0a29922b4955287c463320998e5"},"schema_version":"1.0"},"canonical_sha256":"dd58c1d6ed3dfd638cb3c0e4c563bcb0434639fac23d7dacc7f684cb7a221127","source":{"kind":"arxiv","id":"1703.06992","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.06992","created_at":"2026-05-18T00:28:41Z"},{"alias_kind":"arxiv_version","alias_value":"1703.06992v3","created_at":"2026-05-18T00:28:41Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.06992","created_at":"2026-05-18T00:28:41Z"},{"alias_kind":"pith_short_12","alias_value":"3VMMDVXNHX6W","created_at":"2026-05-18T12:30:58Z"},{"alias_kind":"pith_short_16","alias_value":"3VMMDVXNHX6WHDFT","created_at":"2026-05-18T12:30:58Z"},{"alias_kind":"pith_short_8","alias_value":"3VMMDVXN","created_at":"2026-05-18T12:30:58Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:3VMMDVXNHX6WHDFTYDSMKY54WB","target":"record","payload":{"canonical_record":{"source":{"id":"1703.06992","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-03-20T22:49:21Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"cba291553817c74ad8aeb082f9bc3245a2c7964733ca5bb6913c6abfb6aec1e0","abstract_canon_sha256":"a2979fce8efb13bcf3f4f1e8226c0b27c3d3d0a29922b4955287c463320998e5"},"schema_version":"1.0"},"canonical_sha256":"dd58c1d6ed3dfd638cb3c0e4c563bcb0434639fac23d7dacc7f684cb7a221127","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:28:41.019168Z","signature_b64":"lU0yvldnplCMi9QZqD5Qzto9QiMV2GeYkGQM7c8wjcTa9uiSDWsdzvrkvO4QDwWUkXH3su7/p2OXEvl+iVRKBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"dd58c1d6ed3dfd638cb3c0e4c563bcb0434639fac23d7dacc7f684cb7a221127","last_reissued_at":"2026-05-18T00:28:41.018670Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:28:41.018670Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1703.06992","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:28:41Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3dv8JkJyLIJhnfdjhhvCZQ/5gxnV9MbINoLJYgtis3Dkp6tXCp83uYxMP3GlmH7ShmqoW1SjhVbTKa/TbJBSBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T11:28:45.859115Z"},"content_sha256":"d9507a26a5b1854f25188dcd5076434b9bd9d378dd512bd1f1b73e8607b9f48c","schema_version":"1.0","event_id":"sha256:d9507a26a5b1854f25188dcd5076434b9bd9d378dd512bd1f1b73e8607b9f48c"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:3VMMDVXNHX6WHDFTYDSMKY54WB","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.NI","authors_text":"AbdelRahman Abdou, Paul C. van Oorschot, Tao Wan","submitted_at":"2017-03-20T22:49:21Z","abstract_excerpt":"Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural difference implies a different design for control functions necessary for essential network properties, e.g., loop prevention and link redundancy. We explore how such differences redefine the security weaknesses in the SDN control plane and provide a framework for comparative analysis which focuses on essential network properties required by typical production networks. This enables analysis of how these properties are del"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.06992","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:28:41Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"SupaxE5FNZcURHwkF8kecT0Xi85veTtwkgUj1b6fq9gOcEiRcnobctYppvHddwTT88P2zPw/GmCcmzbsjjkkAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T11:28:45.859759Z"},"content_sha256":"ad16d307f4b1b8589c4f293a8c061923326adecea2f90bba11bf72bec6feb5d2","schema_version":"1.0","event_id":"sha256:ad16d307f4b1b8589c4f293a8c061923326adecea2f90bba11bf72bec6feb5d2"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/bundle.json","state_url":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T11:28:45Z","links":{"resolver":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB","bundle":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/bundle.json","state":"https://pith.science/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/state.json","well_known_bundle":"https://pith.science/.well-known/pith/3VMMDVXNHX6WHDFTYDSMKY54WB/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:3VMMDVXNHX6WHDFTYDSMKY54WB","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"a2979fce8efb13bcf3f4f1e8226c0b27c3d3d0a29922b4955287c463320998e5","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-03-20T22:49:21Z","title_canon_sha256":"cba291553817c74ad8aeb082f9bc3245a2c7964733ca5bb6913c6abfb6aec1e0"},"schema_version":"1.0","source":{"id":"1703.06992","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.06992","created_at":"2026-05-18T00:28:41Z"},{"alias_kind":"arxiv_version","alias_value":"1703.06992v3","created_at":"2026-05-18T00:28:41Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.06992","created_at":"2026-05-18T00:28:41Z"},{"alias_kind":"pith_short_12","alias_value":"3VMMDVXNHX6W","created_at":"2026-05-18T12:30:58Z"},{"alias_kind":"pith_short_16","alias_value":"3VMMDVXNHX6WHDFT","created_at":"2026-05-18T12:30:58Z"},{"alias_kind":"pith_short_8","alias_value":"3VMMDVXN","created_at":"2026-05-18T12:30:58Z"}],"graph_snapshots":[{"event_id":"sha256:ad16d307f4b1b8589c4f293a8c061923326adecea2f90bba11bf72bec6feb5d2","target":"graph","created_at":"2026-05-18T00:28:41Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural difference implies a different design for control functions necessary for essential network properties, e.g., loop prevention and link redundancy. We explore how such differences redefine the security weaknesses in the SDN control plane and provide a framework for comparative analysis which focuses on essential network properties required by typical production networks. This enables analysis of how these properties are del","authors_text":"AbdelRahman Abdou, Paul C. van Oorschot, Tao Wan","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-03-20T22:49:21Z","title":"A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.06992","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:d9507a26a5b1854f25188dcd5076434b9bd9d378dd512bd1f1b73e8607b9f48c","target":"record","created_at":"2026-05-18T00:28:41Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"a2979fce8efb13bcf3f4f1e8226c0b27c3d3d0a29922b4955287c463320998e5","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-03-20T22:49:21Z","title_canon_sha256":"cba291553817c74ad8aeb082f9bc3245a2c7964733ca5bb6913c6abfb6aec1e0"},"schema_version":"1.0","source":{"id":"1703.06992","kind":"arxiv","version":3}},"canonical_sha256":"dd58c1d6ed3dfd638cb3c0e4c563bcb0434639fac23d7dacc7f684cb7a221127","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"dd58c1d6ed3dfd638cb3c0e4c563bcb0434639fac23d7dacc7f684cb7a221127","first_computed_at":"2026-05-18T00:28:41.018670Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:28:41.018670Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"lU0yvldnplCMi9QZqD5Qzto9QiMV2GeYkGQM7c8wjcTa9uiSDWsdzvrkvO4QDwWUkXH3su7/p2OXEvl+iVRKBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:28:41.019168Z","signed_message":"canonical_sha256_bytes"},"source_id":"1703.06992","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:d9507a26a5b1854f25188dcd5076434b9bd9d378dd512bd1f1b73e8607b9f48c","sha256:ad16d307f4b1b8589c4f293a8c061923326adecea2f90bba11bf72bec6feb5d2"],"state_sha256":"f137b7d28751e8e2b86ec9ce6861b5dbb7cd0a0b27a6b0501aaa5f2d2f7b525e"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"MpisshuQXXgewK/t1XA8kiI4f6iExIXtzWHn47UxPOvFY098yA1qvVhC8E7Vlbra23NcNnKGTqKG1fi+VetBDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T11:28:45.862412Z","bundle_sha256":"cf2f7e05cbc11ac2142aca3539828d437033f31bb537b4ebb9a3449e52c0ff93"}}