Date: Thu, 11 Mar 1999 19:38:17 +0100
From: Marc Dacier <dac@ZURICH.IBM.COM>
Subject: CFP: RAID99 - Recent Advances in Intrusion Detection
To: BUGTRAQ@NETSPACE.ORG
Call For Participation - RAID'99
Second International Workshop on the
Recent Advances in Intrusion Detection
Dates: September 7-9, 1999
West Lafayette, Indiana, USA
an html version of this CFP is available at
http://www.zurich.ibm.com/pub/Other/RAID
This workshop, the second in an ongoing annual series, will bring
together leading figures from academia, government, and industry to
discuss state-of-the-art intrusion detection technologies, and
paradigms and issues from the research and commercial perspectives.
The RAID International Workshop series is intended to further progress
in intrusion detection by promoting the exchange of ideas in a broad
range of topics among researchers, system developers, and users and by
encouraging links between these groups. RAID'98, held in
Louvain-la-Neuve, Belgium, was the first in an anticipated annual
series of international workshops that has brought together leading
figures from academia, government, and industry to ponder the current
state of intrusion detection technologies and paradigms from the
research and commercial perspectives. More than 130 participants
attended RAID'98, with nearly 50% from outside Europe, reflecting the
international nature of the meeting.
RAID'99 is being hosted by the Purdue University CERIAS, in West
Lafayette, Indiana, USA. The program committee invites submission of
both technical and general interest papers and panels from those
interested in formally presenting their ideas during the
workshop. This year, we are emphasizing following topic areas:
Assessing IDS
Accuracy and reliability measurements, requirements, and technologies
Benchmarking techniques and technologies
Relations to Risk Assessment and Risk Management Plans
IDS in High Performance and Real-Time Environments
Large-scale/enterprise IDS
High-Speed networks
Managing high-volume data
Highly distributed and heterogeneous environments
Vulnerabilities and Attacks
New vulnerability or attack databases
Vulnerability or attack taxonomies
Using vulnerability databases
IDS Integration
IDS interoperability Standards and Standardization - progress and
assessment
Integration with the system/network management framework
Combining different "styles" of IDS
Innovative Approaches
Adaptive IDS solutions
Survivability and Dependability
Data mining, intelligent agents
New results related to innovative ways of thinking about IDS, new IDS
methodologies and technologies
Automated responses
Combining IDS and system/network management
Practical Considerations
Case studies
IDS in heterogeneous environments
Unique/emerging IDS operating environments, including CORBA, NT,
X.509 and VPN.
Legal issues (IDS reports as "evidence")
Commercial intrusion detection systems and their directions
Real-time versus Post-mortem IDS
IDS integration with business process
Program Committee
*****************
General Chair: Gene Spafford (Purdue University, USA)
Program Chair: Deborah Frincke (University of Idaho, USA)
Program Co-Chair: Ming-Yuh Huang (Boeing Applied Research and Technology, USA)
Executive Committee
*******************
Marc Dacier (IBM Zurich Research Laboratory, Switzerland)
Kathleen Jackson (Los Alamos National Laboratory, USA)
Committee Members
*****************
Matt Bishop (University of California at Davis, USA)
Dick Brackney (National Security Agency, USA)
Yves Deswarte (LAAS-CNRS & INRIA, France)
Terry Escamilla (IBM, USA)
Rowena Chester (University of Tennessee, USA)
Tim Grance (National Institute of Standards and Technology, USA)
Sokratis Katsikas (University of the Aegean, Greece)
Baudouin Le Charlier (Universite de Namur, Belgium)
Abdelaziz Mounji (Universite de Namur, Belgium)
Jean-Jacques Quisquater (Universite Catholique de Louvain, Belgium)
Marv Schaefer (Arca Systems, USA)
Mark Schneider (National Security Agency, USA)
Steve Smaha (Free Agent, USA)
Peter Sommer (London School of Economics & Political Science, England)
Stuart Staniford-Chen (Silicon Defense, USA)
Chris Wee (University of California at Davis, USA)
Kevin Ziese (Cisco/Wheelgroup, USA)
SUBMISSIONS
===========
Papers and panels which fall into the topic areas outlined above are
particularly welcome, although contributions outside those topics may
also be of interest. Each submission must contain:
1. A separate title page with:
The type of submission,
The title or topic,
The topic category most appropriate for the subject matter;
The name(s) of the speaker or panel chair and probable panelists,
with their organizational affiliation(s), telephone and FAX numbers,
postal address, and Internet electronic mail address.
2. A brief biography of each author or panel participant as appropriate
3. The subject category (see topic list) most appropriate for the
paper or panel
Paper submissions must include an abstract that is a maximum of 600
words in length on a separate page. This abstract may be accompanied
by a lengthier paper, which should be no more than ten pages (12 point
font). Although encouraged, it is not necessary to submit a full paper
for consideration as a speaker or for inclusion in the proceedings;
however, potential speakers providing full paper submissions will be
given preference in cases of equal quality. The program committee will
allocate each accepted presenter up to 30 minutes for the talk, based
on the complexity and interest of the proposed topic and the wishes of
the speaker. The presenter will be informed of the presentation slot
length when notified of acceptance.
Panel submissions must include a description that is a maximum of 300
words. The description should include both an outline of the format of
the panel and a short rationale for the panel. The program committee
will allocate one to two-hour time slots to each panel, based on the
proposed topic, the number of panelists, and the wishes of the panel
chair. The panel chair will be informed of the slot length when
notified of acceptance. Panels which include time for general
discussion and questions/answers for the panelists and the attendees
are preferred to those which do not.
All proposals must be in English. Plan to give all panels and talks in
English.
All submissions must be received on or before May 21. We strongly prefer they be submitted electronically to raid99@zurich.ibm.com or raid99@cs.uidaho.edu using one of these formats: ASCII, postscript, Word, or LaTex. All abstracts will be made available on the web. For those submitting full papers, these submissions should be in a format which can be translated to PDF . Full papers will also be made available on the web, and possibly by CD-ROM. If necessary, hardcopy may be sent to the nearest of the following locations (please allow sufficient time for arrival by May 21):
European Collection Site
Marc Dacier
Global Security Analysis Lab
IBM Zurich Research Laboratory
Saeumerstrasse 4 CH-8803
Rueschlikon Switzerland
North/South American Collection Site
Ming-Yuh Huang
The Boeing Company
P.O. Box 3707 MC 7L-20
Seattle WA 98124-2207
U.S.A.
Each submission will be acknowledged by e-mail. If acknowledgment is
not received within seven days, please contact raid99@cs.uidaho.edu.
A preliminary program will be available at the RAID web site,
http://www.zurich.ibm.com/pub/Other/RAID/, by July 21, 1999. Last
year's proceedings are available online as well.
CORPORATE SPONSORS
==================
We solicit interested organizations to become sponsors for RAID '99,
particularly in sponsorship of student travel and other expenses for
RAID. Please contact Deborah Frincke for information regarding
corporate sponsorship of RAID.
REGISTRATION
============
Detailed registration information (including fees, suggested hotels,
and travel directions) will be provided at the RAID'99 web site.
PROCEEDINGS
===========
On-line workshop proceedings will be posted on the RAID web site
immediately following the workshop. It will include:
The final program;
A list of corporate sponsors;
A list of attendees (subject to each attendee's approval);
The submitted abstract and slides used by each speaker;
The submitted description and rationale for each panel;
The slides used by each panelist; and,
Written position statements from each panelist.
Last year's most outstanding workshop participants were invited to
submit an analogous formal paper to a special RAID edition of the
refereed journal "Computer Networks and ISDN Systems." Proceedings
from last year may be found at online at
http://www.zurich.ibm.com/pub/Other/RAID/.
IMPORTANT DATES
===============
Deadline for paper, panel submissionMay 21, 1999
Notification of acceptance or rejection July 7, 1999
Registration opens July 15, 1999
Preliminary program posted to web July 15, 1999
Final full paper due (optional)August 7, 1999
On-time Registration closes August 21, 1999
.RAID dates September 7-9, 1999
FOR MORE INFORMATION
====================
For further information:
On-site arrangements:
contact Gene Spafford (spaf@cs.purdue.edu)
General program information or corporate sponsorship:
contact Deborah Frincke (frincke@cs.uidaho.edu)
Paper and panel submission:
contact Ming-Yuh Huang (huang@bcstec.ca.boeing.com)