This book attempts to identify information that is unintentionally offered to a network attacker when SDN is used within a small network, and demonstrates the feasibility of uniquely identifying the software managing the SDN environment. With positive identification of the software controlling the SDN environment (a process knownas fingerprinting), an attacker can then search for existing vulnerabilities or attempt to develop custom attacks against...