[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Call for Papers: USENIX Workshop on Intrusion Detection



1st USENIX Workshop on
Intrusion Detection and Network Monitoring

        April 11-12, 1999
        Santa Clara, California, USA

Sponsored by USENIX, the Advanced Computing Systems Association

----------------------------------------------------------
Please find the Call for Submissions at
   http://www.usenix.org/events/detection99/
----------------------------------------------------------

Important Due Dates for Refereed Paper Submissions

 Extended abstracts due:  November 1, 1998
 Notification to authors:  November 23, 1998
 Full papers for editorial review:  December 12, 1998
 Camera-ready full papers:  February 20, 1999

Intrusion detection offers the promise of automatic detection and
notification of break-ins or unauthorized use of computers. Better
techniques for detecting abuse from within and without are becoming
mandatory.

The goal of this workshop is to bring together network managers, engineers
and researchers interested in deploying and developing intrusion detection
systems (IDS) and network monitoring technologies for security, traffic
analysis, or forensics. The emphasis is on practical results, case studies,
and real-world large-scale deployment.  This will be a two-day workshop,
consisting of refereed papers, invited talks, and work-in-progress reports.
Opportunities to get together informally will include a Sunday evening
hosted reception, a lunch on Monday with Marcus Ranum hosting, and
Birds-of-a-Feather sessions on Sunday.

The Program Committee, chaired by Marcus J. Ranum of Network Flight
Recorder seeks original work concerning the design, implementation, and
real-world application of intrusion detection and network monitoring
technologies. Besides mature work, we encourage submissions describing
exceptionally promising prototypes, or enlightening negative results. Case
studies and experience papers are particularly of interest. Share your
results, share your pain, share your ideas.

Authors will, where appropriate, be able to demonstrate their applications
during their presentation using systems that will be fed with packets
captured at "live" sites, which contain various intrusion attempts.

Topics of interest include, but are not limited to:
               Case studies of IDS in practice
               Statistical models for IDS
               Anomaly detection systems
               Misuse detection systems
               Host based approaches to IDS
               Network based approaches to IDS
               Application based approaches to IDS
               IDS in cryptographically protected networks
               Distributed IDS in large networks
               Correlation techniques
               Event thresholding
               Reducing false positives
               Alternative approaches

Authors must submit an extended abstract by November 1, 1998.  The full
papers resulting from accepted abstracts will go through an editorial
review cycle with a member of the program committee, and should end up
about 10-12 pages long.

=============================================================
USENIX <http://www.usenix.org> is the not-for-profit Advanced Computing
Systems Association with an international membership of technical
professionals.  USENIX's refereed conferences are recognized for bridging
leading-edge research and the practical.