[LWN Logo]
[Timeline]
Date:         Fri, 16 Jun 2000 16:31:03 +0200
From: Herve Debar <deb@ZURICH.IBM.COM>
Subject:      Call For Participation - Raid 2000
To: BUGTRAQ@SECURITYFOCUS.COM

I am sending you the call  for participation for Raid 2000, in October
in Toulouse,  France. Advanced  registration deadline is  August 16th,
2000.  I  would appreciate  if you  could distribute  it as  widely as
possible.

Thanks for your help.

Herve


-----------------------------------------------------------------------

        	Call For Participation - RAID 2000

		Third International Workshop on the
		Recent Advances in Intrusion Detection

		Dates: October 2-4, 2000
                Toulouse, France
		in conjunction with ESORICS 2000



This  workshop, the  third in  an  ongoing annual  series, will  bring
together leading  figures from  academia, government, and  industry to
discuss state-of-the-art  intrusion detection technologies  and issues
from the research and commercial perspectives.


The RAID International Workshop series is intended to further progress
in intrusion detection  by promoting the exchange of  ideas in a broad
range   of   topics   among   researchers,   system   developers   and
users. RAID'98,  held in Louvain-la-Neuve, Belgium, was  hosted by the
Université Catholique  de Louvain and welcomed  130 participants, with
nearly 50% from outside Europe, reflecting the international nature of
the meeting.  RAID'99,  held in Purdue, Indiana, was  hosted by CERIAS
and welcomed more than  180 participants from academia, government and
industry.


RAID 2000 is being locally  organized by ONERA in Toulouse, France, in
conjunction with  ESORICS 2000 (http://www.cert.fr/esorics2000/).  The
program committee invites submission of extended abstracts, to be made
available  on the  RAID website.   This year,  we are  emphasizing the
following topic areas:


o Assessing, measuring and classifying intrusion-detection systems:
  - Accuracy and reliability measurements, requirements, and technologies
  - Benchmarking techniques and technologies
  - Relations to Risk Assessment and Risk Management Plans
  - Quantitative assessment of IDSes and IDS combinations
  - Suitability of IDSes as a countermeasure to insider misuse

o IDS in High Performance and Real-Time Environments:
  - Large-scale/enterprise IDS
  - High-Speed networks
  - Managing high-volume data
  - Highly distributed and heterogeneous environments
  - Deployment/cooperation of IDSes in multiple-organisation environments
  - Mission-critical intrusion-detection systems

o Vulnerabilities and Attacks
  - New vulnerability or attack databases
  - Vulnerability or attack taxonomies
  - Using vulnerability databases
  - IDS Security issues and solutions

o IDS Integration
   - IDS interoperability Standards and Standardization
   - Integration with the system/network management framework
   - Combining different "styles" of IDS

o Innovative Approaches
   - Adaptive IDS solutions
   - Survivability and Dependability
   - Data mining, intelligent agents
   - New IDS methodologies and technologies
   - Automated responses
   - Combining IDS and system/network management
   - Intrusion-detection using application logs

o Practical Considerations
   - Case studies
   - IDS in heterogeneous environments
   - Unique/emerging IDS operating environments
   - Legal issues (IDS reports as "evidence")
   - Commercial intrusion detection systems and their directions
   - Real-time versus Post-mortem IDS
   - IDS integration with business process


Registration is available online at
http://www.raid-symposium.org/raid2000/registration.html. A
preliminary program is available at
http://www.raid-symposium.org/raid2000/program.html.