BEGIN:VCALENDAR
VERSION:2.0
PRODID:Linklings LLC
BEGIN:VTIMEZONE
TZID:America/New_York
X-LIC-LOCATION:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:19700308T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:19701101T020000
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250626T234542Z
LOCATION:B305
DTSTART;TZID=America/New_York:20241118T144000
DTEND;TZID=America/New_York:20241118T150000
UID:submissions.supercomputing.org_SC24_sess750_ws_indis106@linklings.com
SUMMARY:Leveraging In-band Network Telemetry for Automated DDoS Detection 
 in Production Programmable Networks: The AmLight Use Case
DESCRIPTION:Hadi Sahin, Jeronimo Bezerra, and Italo Brito (Florida Interna
 tional University, CIARA); Renata Frez (Rede Nacional de Ensino e Pesquisa
 ); and Vasilka Chergova, Luis Fernandez Lopez, and Julio Ibarra (Florida I
 nternational University, CIARA)\n\nProgrammable data planes have provided 
 great flexibility in defining the behaviors of packet forwarding switches,
  routers, and network interface cards (NICs). The In-band\nNetwork Telemet
 ry (INT) technology further increased network operators’ potential to mana
 ge packet flows by enabling realtime and customizable monitoring of packet
 s without creating much overhead on the network. These recent advancements
  in networking technology have generated significant research interest and
  activity, including studies on INT-based DDoS detection and mitigation me
 chanisms. However, in practice, INT technology has not been fully realized
  yet, especially in detecting network anomalies in real-time. In this pape
 r, we aim to implement a holistic real-time INT-based DDoS detection mecha
 nism. The proposed mechanism will retrieve INT data from the network, anal
 yze it using machine learning (ML) models in real-time, and send the infor
 mation to the control plane. We will also compare the performance of using
  INT to detect DDoS attacks against sFlow-based detection.\n\nTag: Archite
 cture, Data-Intensive, Network, Performance Optimization, System Administr
 ation\n\nRegistration Category: Workshop Reg Pass\n\nSession Chairs: Akbar
  Kara (Ciena, SCinet); Anees Al-Najjar (Oak Ridge National Laboratory (ORN
 L), SCinet); and Nik Sultana (Illinois Institute of Technology, SCinet)\n\
 n
END:VEVENT
END:VCALENDAR
