[15367] in bugtraq
Call For Participation - Raid 2000
daemon@ATHENA.MIT.EDU (Herve Debar)
Fri Jun 16 13:14:03 2000
Message-Id: <0006161431.AA54844@zupo.zurich.ibm.com>
Date: Fri, 16 Jun 2000 16:31:03 +0200
Reply-To: Herve Debar <deb@ZURICH.IBM.COM>
From: Herve Debar <deb@ZURICH.IBM.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
I am sending you the call for participation for Raid 2000, in October
in Toulouse, France. Advanced registration deadline is August 16th,
2000. I would appreciate if you could distribute it as widely as
possible.
Thanks for your help.
Herve
-----------------------------------------------------------------------
Call For Participation - RAID 2000
Third International Workshop on the
Recent Advances in Intrusion Detection
Dates: October 2-4, 2000
Toulouse, France
in conjunction with ESORICS 2000
This workshop, the third in an ongoing annual series, will bring
together leading figures from academia, government, and industry to
discuss state-of-the-art intrusion detection technologies and issues
from the research and commercial perspectives.
The RAID International Workshop series is intended to further progress
in intrusion detection by promoting the exchange of ideas in a broad
range of topics among researchers, system developers and
users. RAID'98, held in Louvain-la-Neuve, Belgium, was hosted by the
Universiti Catholique de Louvain and welcomed 130 participants, with
nearly 50% from outside Europe, reflecting the international nature of
the meeting. RAID'99, held in Purdue, Indiana, was hosted by CERIAS
and welcomed more than 180 participants from academia, government and
industry.
RAID 2000 is being locally organized by ONERA in Toulouse, France, in
conjunction with ESORICS 2000 (http://www.cert.fr/esorics2000/). The
program committee invites submission of extended abstracts, to be made
available on the RAID website. This year, we are emphasizing the
following topic areas:
o Assessing, measuring and classifying intrusion-detection systems:
- Accuracy and reliability measurements, requirements, and technologies
- Benchmarking techniques and technologies
- Relations to Risk Assessment and Risk Management Plans
- Quantitative assessment of IDSes and IDS combinations
- Suitability of IDSes as a countermeasure to insider misuse
o IDS in High Performance and Real-Time Environments:
- Large-scale/enterprise IDS
- High-Speed networks
- Managing high-volume data
- Highly distributed and heterogeneous environments
- Deployment/cooperation of IDSes in multiple-organisation environments
- Mission-critical intrusion-detection systems
o Vulnerabilities and Attacks
- New vulnerability or attack databases
- Vulnerability or attack taxonomies
- Using vulnerability databases
- IDS Security issues and solutions
o IDS Integration
- IDS interoperability Standards and Standardization
- Integration with the system/network management framework
- Combining different "styles" of IDS
o Innovative Approaches
- Adaptive IDS solutions
- Survivability and Dependability
- Data mining, intelligent agents
- New IDS methodologies and technologies
- Automated responses
- Combining IDS and system/network management
- Intrusion-detection using application logs
o Practical Considerations
- Case studies
- IDS in heterogeneous environments
- Unique/emerging IDS operating environments
- Legal issues (IDS reports as "evidence")
- Commercial intrusion detection systems and their directions
- Real-time versus Post-mortem IDS
- IDS integration with business process
Registration is available online at
http://www.raid-symposium.org/raid2000/registration.html. A
preliminary program is available at
http://www.raid-symposium.org/raid2000/program.html.