Date: Thu, 11 Mar 1999 19:38:17 +0100 From: Marc Dacier <dac@ZURICH.IBM.COM> Subject: CFP: RAID99 - Recent Advances in Intrusion Detection To: BUGTRAQ@NETSPACE.ORG Call For Participation - RAID'99 Second International Workshop on the Recent Advances in Intrusion Detection Dates: September 7-9, 1999 West Lafayette, Indiana, USA an html version of this CFP is available at http://www.zurich.ibm.com/pub/Other/RAID This workshop, the second in an ongoing annual series, will bring together leading figures from academia, government, and industry to discuss state-of-the-art intrusion detection technologies, and paradigms and issues from the research and commercial perspectives. The RAID International Workshop series is intended to further progress in intrusion detection by promoting the exchange of ideas in a broad range of topics among researchers, system developers, and users and by encouraging links between these groups. RAID'98, held in Louvain-la-Neuve, Belgium, was the first in an anticipated annual series of international workshops that has brought together leading figures from academia, government, and industry to ponder the current state of intrusion detection technologies and paradigms from the research and commercial perspectives. More than 130 participants attended RAID'98, with nearly 50% from outside Europe, reflecting the international nature of the meeting. RAID'99 is being hosted by the Purdue University CERIAS, in West Lafayette, Indiana, USA. The program committee invites submission of both technical and general interest papers and panels from those interested in formally presenting their ideas during the workshop. This year, we are emphasizing following topic areas: Assessing IDS Accuracy and reliability measurements, requirements, and technologies Benchmarking techniques and technologies Relations to Risk Assessment and Risk Management Plans IDS in High Performance and Real-Time Environments Large-scale/enterprise IDS High-Speed networks Managing high-volume data Highly distributed and heterogeneous environments Vulnerabilities and Attacks New vulnerability or attack databases Vulnerability or attack taxonomies Using vulnerability databases IDS Integration IDS interoperability Standards and Standardization - progress and assessment Integration with the system/network management framework Combining different "styles" of IDS Innovative Approaches Adaptive IDS solutions Survivability and Dependability Data mining, intelligent agents New results related to innovative ways of thinking about IDS, new IDS methodologies and technologies Automated responses Combining IDS and system/network management Practical Considerations Case studies IDS in heterogeneous environments Unique/emerging IDS operating environments, including CORBA, NT, X.509 and VPN. Legal issues (IDS reports as "evidence") Commercial intrusion detection systems and their directions Real-time versus Post-mortem IDS IDS integration with business process Program Committee ***************** General Chair: Gene Spafford (Purdue University, USA) Program Chair: Deborah Frincke (University of Idaho, USA) Program Co-Chair: Ming-Yuh Huang (Boeing Applied Research and Technology, USA) Executive Committee ******************* Marc Dacier (IBM Zurich Research Laboratory, Switzerland) Kathleen Jackson (Los Alamos National Laboratory, USA) Committee Members ***************** Matt Bishop (University of California at Davis, USA) Dick Brackney (National Security Agency, USA) Yves Deswarte (LAAS-CNRS & INRIA, France) Terry Escamilla (IBM, USA) Rowena Chester (University of Tennessee, USA) Tim Grance (National Institute of Standards and Technology, USA) Sokratis Katsikas (University of the Aegean, Greece) Baudouin Le Charlier (Universite de Namur, Belgium) Abdelaziz Mounji (Universite de Namur, Belgium) Jean-Jacques Quisquater (Universite Catholique de Louvain, Belgium) Marv Schaefer (Arca Systems, USA) Mark Schneider (National Security Agency, USA) Steve Smaha (Free Agent, USA) Peter Sommer (London School of Economics & Political Science, England) Stuart Staniford-Chen (Silicon Defense, USA) Chris Wee (University of California at Davis, USA) Kevin Ziese (Cisco/Wheelgroup, USA) SUBMISSIONS =========== Papers and panels which fall into the topic areas outlined above are particularly welcome, although contributions outside those topics may also be of interest. Each submission must contain: 1. A separate title page with: The type of submission, The title or topic, The topic category most appropriate for the subject matter; The name(s) of the speaker or panel chair and probable panelists, with their organizational affiliation(s), telephone and FAX numbers, postal address, and Internet electronic mail address. 2. A brief biography of each author or panel participant as appropriate 3. The subject category (see topic list) most appropriate for the paper or panel Paper submissions must include an abstract that is a maximum of 600 words in length on a separate page. This abstract may be accompanied by a lengthier paper, which should be no more than ten pages (12 point font). Although encouraged, it is not necessary to submit a full paper for consideration as a speaker or for inclusion in the proceedings; however, potential speakers providing full paper submissions will be given preference in cases of equal quality. The program committee will allocate each accepted presenter up to 30 minutes for the talk, based on the complexity and interest of the proposed topic and the wishes of the speaker. The presenter will be informed of the presentation slot length when notified of acceptance. Panel submissions must include a description that is a maximum of 300 words. The description should include both an outline of the format of the panel and a short rationale for the panel. The program committee will allocate one to two-hour time slots to each panel, based on the proposed topic, the number of panelists, and the wishes of the panel chair. The panel chair will be informed of the slot length when notified of acceptance. Panels which include time for general discussion and questions/answers for the panelists and the attendees are preferred to those which do not. All proposals must be in English. Plan to give all panels and talks in English. All submissions must be received on or before May 21. We strongly prefer they be submitted electronically to raid99@zurich.ibm.com or raid99@cs.uidaho.edu using one of these formats: ASCII, postscript, Word, or LaTex. All abstracts will be made available on the web. For those submitting full papers, these submissions should be in a format which can be translated to PDF . Full papers will also be made available on the web, and possibly by CD-ROM. If necessary, hardcopy may be sent to the nearest of the following locations (please allow sufficient time for arrival by May 21): European Collection Site Marc Dacier Global Security Analysis Lab IBM Zurich Research Laboratory Saeumerstrasse 4 CH-8803 Rueschlikon Switzerland North/South American Collection Site Ming-Yuh Huang The Boeing Company P.O. Box 3707 MC 7L-20 Seattle WA 98124-2207 U.S.A. Each submission will be acknowledged by e-mail. If acknowledgment is not received within seven days, please contact raid99@cs.uidaho.edu. A preliminary program will be available at the RAID web site, http://www.zurich.ibm.com/pub/Other/RAID/, by July 21, 1999. Last year's proceedings are available online as well. CORPORATE SPONSORS ================== We solicit interested organizations to become sponsors for RAID '99, particularly in sponsorship of student travel and other expenses for RAID. Please contact Deborah Frincke for information regarding corporate sponsorship of RAID. REGISTRATION ============ Detailed registration information (including fees, suggested hotels, and travel directions) will be provided at the RAID'99 web site. PROCEEDINGS =========== On-line workshop proceedings will be posted on the RAID web site immediately following the workshop. It will include: The final program; A list of corporate sponsors; A list of attendees (subject to each attendee's approval); The submitted abstract and slides used by each speaker; The submitted description and rationale for each panel; The slides used by each panelist; and, Written position statements from each panelist. Last year's most outstanding workshop participants were invited to submit an analogous formal paper to a special RAID edition of the refereed journal "Computer Networks and ISDN Systems." Proceedings from last year may be found at online at http://www.zurich.ibm.com/pub/Other/RAID/. IMPORTANT DATES =============== Deadline for paper, panel submissionMay 21, 1999 Notification of acceptance or rejection July 7, 1999 Registration opens July 15, 1999 Preliminary program posted to web July 15, 1999 Final full paper due (optional)August 7, 1999 On-time Registration closes August 21, 1999 .RAID dates September 7-9, 1999 FOR MORE INFORMATION ==================== For further information: On-site arrangements: contact Gene Spafford (spaf@cs.purdue.edu) General program information or corporate sponsorship: contact Deborah Frincke (frincke@cs.uidaho.edu) Paper and panel submission: contact Ming-Yuh Huang (huang@bcstec.ca.boeing.com)