Program
9:00 AM - 10:30 AM
|
Session 1: SDN/NFV-based Automated Network Security (Session chair: Teryl Taylor)
|
(F)
|
Machine Learning-Based Detection of Ransomware using SDN
|
Greg Cusack (University of Colorado Boulder); Oliver Michel (University of Colorado Boulder); Eric Keller (University of Colorado Boulder)
|
|
(F)
|
Identifying Anomalies in GridFTP transfers for Data-Intensive Science
|
Deepak Nadig (University of Nebraska-Lincoln); Byrav Ramamurthy (University of Nebraska-Lincoln); Brian Bockelman (University of Nebraska-Lincoln); David Swanson (University of Nebraska-Lincoln) | |
(F) |
Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control |
Yanfeng Qu (Illinois Institute of Technology); Xin Liu (Illinois Institute of Technology); Dong Jin (Illinois Institute of Technology); Yuan Hong (Illinois Institute of Technology); Chen Chen (Argonne National Laboratory)
|
|
(S) |
Internet Security Liberated via Software Defined Exchanges |
Kuang-Ching Wang (Clemson University); Richard Brooks (Clemson University); Geddings Barrineau (Clemson University); Jon Oakley (Clemson University); Lu Yu (Clemson University); Qing Wang (Clemson University)
|
|
10:30 AM - 10:45 AM
|
Coffee Break
|
10:45 AM - 12:05 PM
|
Session 2: SDN/NFV-enabled Security Mechanism (Session chair: Greg Cusack)
|
(F)
|
Dressed up: baiting attackers through endpoint service projection
|
Marc Ph. Stoecklin (IBM Research); Jialong Zhang (IBM Research); Frederico Araujo (IBM Research); Teryl Taylor (IBM Research)
|
|
(F)
|
Challenges and Preparedness of SDN-based Firewalls
|
Vaibhav Hemant Dixit (Arizona State University); Sukwha Kyung (Arizona State University); Ziming Zhao (Arizona State University); Adam Doupé (Arizona State University); Yan Shoshitaishvili (Arizona State University); Gail-Joon Ahn (Arizona State University)
|
|
(S)
|
Cybersecurity challenges and opportunities in the new "Edge Computing + IoT" world
|
Jianli Pan (University of Missouri - St. Louis); Zhicheng Yang (UC Davis)
|
|
(S)
|
Challenges Towards Protecting VNF with SGX
|
Juan Wang (Wuhan University); Chengyang Fan (Wuhan University); Jie Wang (Wuhan University); Shirong hao (Wuhan University); Yi li (Wuhan University); Hongxin Hu (Clemson University)
|
|
12:05 PM - 1:45 PM
|
Lunch Break
|
1:45 PM - 2:45 PM
|
Session 3: Keynote Address
|
Title: Differential Privacy in Local Setting
|
|
Speaker: Ninghui Li (Purdue University)
|
|
2:25 PM - 3:00 PM
|
Coffee Break
|
3:00 PM - 4:05 PM
|
Session 4: SDN/NFV Security Architecture (Session chair: Jianli Pan)
|
(F)
|
MTD Analysis and evaluation framework in Software Defined Network (MASON)
|
Ankur Chowndary (Arizona State University); Adel Alshamrani (Arizona State University); Dijiang Huang (Arizona State University)
|
|
(F)
|
Database Criteria for Network Policy Chain
|
Anduo Wang (Temple University)
|
|
(S)
|
Towards Efficient Traffic Monitoring for Science DMZ with Side-channel Based Traffic Winnowing
|
Hongda Li (Clemson University); Fuqiang Zhang (Clemson University); Lu Yu (Clemson University); Jon Oakley (Clemson University); Hongxin Hu (Clemson University); Richard Brooks (Clemson University)
|
|
Presentation time: 25 minutes for full papers (F) and 15 minutes for short position papers (S)