Date: Fri, 16 Jun 2000 16:31:03 +0200 From: Herve Debar <deb@ZURICH.IBM.COM> Subject: Call For Participation - Raid 2000 To: BUGTRAQ@SECURITYFOCUS.COM I am sending you the call for participation for Raid 2000, in October in Toulouse, France. Advanced registration deadline is August 16th, 2000. I would appreciate if you could distribute it as widely as possible. Thanks for your help. Herve ----------------------------------------------------------------------- Call For Participation - RAID 2000 Third International Workshop on the Recent Advances in Intrusion Detection Dates: October 2-4, 2000 Toulouse, France in conjunction with ESORICS 2000 This workshop, the third in an ongoing annual series, will bring together leading figures from academia, government, and industry to discuss state-of-the-art intrusion detection technologies and issues from the research and commercial perspectives. The RAID International Workshop series is intended to further progress in intrusion detection by promoting the exchange of ideas in a broad range of topics among researchers, system developers and users. RAID'98, held in Louvain-la-Neuve, Belgium, was hosted by the Université Catholique de Louvain and welcomed 130 participants, with nearly 50% from outside Europe, reflecting the international nature of the meeting. RAID'99, held in Purdue, Indiana, was hosted by CERIAS and welcomed more than 180 participants from academia, government and industry. RAID 2000 is being locally organized by ONERA in Toulouse, France, in conjunction with ESORICS 2000 (http://www.cert.fr/esorics2000/). The program committee invites submission of extended abstracts, to be made available on the RAID website. This year, we are emphasizing the following topic areas: o Assessing, measuring and classifying intrusion-detection systems: - Accuracy and reliability measurements, requirements, and technologies - Benchmarking techniques and technologies - Relations to Risk Assessment and Risk Management Plans - Quantitative assessment of IDSes and IDS combinations - Suitability of IDSes as a countermeasure to insider misuse o IDS in High Performance and Real-Time Environments: - Large-scale/enterprise IDS - High-Speed networks - Managing high-volume data - Highly distributed and heterogeneous environments - Deployment/cooperation of IDSes in multiple-organisation environments - Mission-critical intrusion-detection systems o Vulnerabilities and Attacks - New vulnerability or attack databases - Vulnerability or attack taxonomies - Using vulnerability databases - IDS Security issues and solutions o IDS Integration - IDS interoperability Standards and Standardization - Integration with the system/network management framework - Combining different "styles" of IDS o Innovative Approaches - Adaptive IDS solutions - Survivability and Dependability - Data mining, intelligent agents - New IDS methodologies and technologies - Automated responses - Combining IDS and system/network management - Intrusion-detection using application logs o Practical Considerations - Case studies - IDS in heterogeneous environments - Unique/emerging IDS operating environments - Legal issues (IDS reports as "evidence") - Commercial intrusion detection systems and their directions - Real-time versus Post-mortem IDS - IDS integration with business process Registration is available online at http://www.raid-symposium.org/raid2000/registration.html. A preliminary program is available at http://www.raid-symposium.org/raid2000/program.html.