{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:52:26Z","timestamp":1776354746013,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,27]]},"DOI":"10.1145\/3803525.3804992","type":"proceedings-article","created":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T14:54:47Z","timestamp":1776351287000},"page":"67-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Sanxia: A Stratified In-Network Framework for High-Coverage Flow-Level Malicious Traffic Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0552-865X","authenticated-orcid":false,"given":"Qingyang","family":"Li","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8883-9865","authenticated-orcid":false,"given":"Yunpeng","family":"Tan","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0700-8299","authenticated-orcid":false,"given":"Mingxin","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4944-9621","authenticated-orcid":false,"given":"Zongming","family":"Guo","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0484-5951","authenticated-orcid":false,"given":"Xinggong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2026,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3649473"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3727115"},{"key":"e_1_3_2_1_3_1","volume-title":"Fernando MV Ramos, and Andr\u00e9 Madeira","author":"Barradas Diogo","year":"2021","unstructured":"Diogo Barradas, Nuno Santos, Lu\u00eds Rodrigues, Salvatore Signorello, Fernando MV Ramos, and Andr\u00e9 Madeira. 2021. FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications. In NDSS."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720741"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14209\/sbrt.2010.18"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3223420"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3696397"},{"key":"e_1_3_2_1_8_1","unstructured":"Canadian Institute for Cybersecurity. 2017. Intrusion detection evaluation dataset (CIC-IDS2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html."},{"key":"e_1_3_2_1_9_1","volume-title":"FENIX: Enabling In-Network DNN Inference with FPGA-Enhanced Programmable Switches. arXiv preprint arXiv:2507.14891","author":"Gao Xiangyu","year":"2025","unstructured":"Xiangyu Gao, Tong Li, Yinchao Zhang, Ziqiang Wang, Xiangsheng Zeng, Su Yao, and Ke Xu. 2025. FENIX: Enabling In-Network DNN Inference with FPGA-Enhanced Programmable Switches. arXiv preprint arXiv:2507.14891 (2025)."},{"key":"e_1_3_2_1_10_1","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Hsieh Kevin","year":"2024","unstructured":"Kevin Hsieh, Mike Wong, Santiago Segarra, Sathiya Kumaran Mani, Trevor Eberl, Anatoliy Panasyuk, Ravi Netravali, Ranveer Chandra, and Srikanth Kandula. 2024. {NetVigil}: Robust and {Low-Cost} Anomaly Detection for {East-West} Data Center Security. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). 1771\u20131789."},{"key":"e_1_3_2_1_11_1","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Huang Qun","year":"2021","unstructured":"Qun Huang, Siyuan Sheng, Xiang Chen, Yungang Bao, Rui Zhang, Yanwei Xu, and Gong Zhang. 2021. Toward {Nearly-Zero-Error} sketching via compressive sensing. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). 1027\u20131044."},{"key":"e_1_3_2_1_12_1","volume-title":"Dollm: How large language models understanding network flow data to detect carpet bombing ddos. arXiv preprint arXiv:2405.07638","author":"Li Qingyang","year":"2024","unstructured":"Qingyang Li, Yihang Zhang, Zhidong Jia, Yannan Hu, Lei Zhang, Jianrong Zhang, Yongming Xu, Yong Cui, Zongming Guo, and Xinggong Zhang. 2024. Dollm: How large language models understanding network flow data to detect carpet bombing ddos. arXiv preprint arXiv:2405.07638 (2024)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TON.2025.3636509"},{"key":"e_1_3_2_1_14_1","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Yan Jinzhu","year":"2024","unstructured":"Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, and Jianping Wu. 2024. { Brain-on-Switch} : Towards advanced intelligent network data plane via {NN-Driven} traffic analysis at {Line-Speed}. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). 419\u2013440."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"e_1_3_2_1_16_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zhou Guangmeng","year":"2023","unstructured":"Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, and Ke Xu. 2023. An efficient design of intelligent network data plane. In 32nd USENIX Security Symposium (USENIX Security 23). 6203\u20136220."}],"event":{"name":"EuroSys '26: 21st European Conference on Computer Systems","location":"Edinburgh Scotland Uk","acronym":"EuroSec '26","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 19th European Workshop on Systems Security"],"original-title":[],"deposited":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T14:54:51Z","timestamp":1776351291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3803525.3804992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,26]]},"references-count":16,"alternative-id":["10.1145\/3803525.3804992","10.1145\/3803525"],"URL":"https:\/\/doi.org\/10.1145\/3803525.3804992","relation":{},"subject":[],"published":{"date-parts":[[2026,4,26]]},"assertion":[{"value":"2026-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}