[ISN] RAID98: Recent Advances in Intrusion Detection

From: mea culpa (jerichoat_private)
Date: Tue Aug 04 1998 - 12:12:13 PDT

  • Next message: mea culpa: "[ISN] Low-tech break-ins a big problem"

    Forwarded From: dacat_private (Marc Dacier)
    		   Call For Registration - RAID'98
    		 First International Workshop on the
    		Recent Advances in Intrusion Detection
    			     Sponsored by
    		  the IBM Emergency Response Service
    		 the Joint Research Centre of the EC
    	   (Institute for Systems, Informatics and Safety)
    			September 14-16, 1998
    		      Louvain-la-Neuve, Belgium
    			  Visit our web site
        for on-line information regarding the preliminary program, the
    	    registration forms, accommodations, maps, etc..
    RAID'98 is the first in an anticipated annual series of international
    workshops that will bring together leading figures from academia,
    government, and industry to ponder the current state of intrusion
    detection1 technologies and paradigms from the research and commercial
    perspectives.  Its aim is to further progress in intrusion detection
    by promoting the exchange of ideas among researchers, system
    developers, and users and by encouraging links between these groups.
    RAID'98 will be held in Louvain-la-Neuve, Belgium, on 14-16 September
    1998. RAID'98 will be held in the same location as CARDIS'98
    (http://www.dice.ucl.ac.be/cardis98) and ESORICS'98
    (http://www.dice.ucl.ac.be/esorics98), at the same time as the former
    and just prior to the latter. A registration discount is available to
    those attending both the ESORICS conference and the RAID workshop.
    Registration is now open, and will continue until 21 August 1998. Late
    registration will continue until 4 September 1998, but only on a
    space-available basis, and will include a penalty of 2000 BEF. If you
    need more information regarding registration or accommodations, please
    take contact with Catherine Rouyer
    E-mail: Rouyerat_private
    RAID Secretariat
    UCL/TELE (Mrs. Catherine Rouyer)
    Place du Levant, 2
    B-1348 Louvain-la-Neuve
    ************************** PRELIMINARY PROGRAM *************************
    **** html version available:  http://www.zurich.ibm.com/~dac/RAID98 ****
    8:00  9:00
    Transfers from hotels, coffee service and participant check-in
    Session 1 (Session Chair: Kathleen Jackson)
    9:00 - 9:20
      Welcome and Introduction
          Marc Dacier (IBM ZRL, Switzerland), Jean-Jacques
          Quisquater (UCL, Belgium).
    9:20 - 9:40
      The Rome Labs Experience
          Kevin Ziese (Cisco Systems, Inc., USA)
    9:40 - 10:00
      Intrusion Detection and Legal Proceedings
          Peter Sommer (London School of Economics and Political Science, UK)
    10:00 - 10:20
      Lessons Learned in the Implementation of a
      Multi-Location Network Based Real Time Intrusion Detection System
          Michael Puldy (IBM Emergency Response Service, USA)
    10:20 - 10:40
      Break - Coffee service
    Session 2 (Session Chair:  Baudouin Le Charlier)
    10:40 - 11:00
      GASSATA, A Genetic Algorithm as an Alternative Tool for
      Security Audit Trails Analysis
          Ludovic Me (SUPELEC, France)
    11:00 - 11:20
      Using Bottleneck Verification to Find Novel New Attacks
      with a Low False Alarm Rate
          Richard Lippmann (MIT Lincoln Laboratory, USA)
    11:20 - 11:40
      The Use of Information Retrieval Techniques for Intrusion Detection
          Ross Anderson (University of Cambridge, UK)
    11:40 - 12:00
      Tools for Intrusion detection: Results and Lessons
      Learned from the ASAX Project
          Abdelaziz. Mounji (Computer Science Institute, Belgium)
    12:00 - 13:30
    Session 3   (Session Chair:  Yves Deswarte)
    13:30 - 13:50
      Dependability of Large-scale Infrastructures and
      Challenges for Intrusion Detection 
          Marc Wilikens (Institute for Systems, Informatics and Safety, Italy)
    13:50 - 14:10
      How Re(Pro)active Should An IDS Be?
          Richard Overill (King's College London, UK)
    14:10 - 14:30
      Contribution of Quantitative Security Evaluation to Intrusion Detection
          Yves Deswarte (LAAS-CNRS & INRIA, France)
    14:30 - 14:50
      Intrusion Detection in Telecommunication
          Hai-Ping Ko (GTE Laboratories Incorporated, USA)
    14:50 - 15:10
    Break - Beverages
    Session 4   (Session Chair:  TBD)
    15:10 - 15:30
      Problems with Network­based Intrusion Detection for Enterprise Computing
          Thomas Daniels (Purdue University, USA)
    15:30 - 15:50
      Transitioning IDS Research Into a Viable Product
         Mark Crosbie (Hewlett-Packard Corporation, USA)
    15:50 - 16:10
      Enhanced Network Intrusion Detection in a Smart Enterprise Environment
          Ricci Ieong (Hong Kong University of Science and Technology, Hong Kong)
    16:10 - 16:30
      Integrating Intrusion Detection into the Network/Security Infrastructure
          Mark Wood (Internet Security Systems, Inc, USA)
    16:30 - 16:50
    Break - Refreshments
    Session 5 (Panel Chair: Rowena Chester)
    16:50 - 18:00 
      The Nature and Utility of Standards Organizations
      for the Intrusion Detection Developers Community
            Dick Brackney (NSA)
            Rowena Chester (Chair NCITS (ANSI) T4 Committee)
            Roger French (Compaq)
            Walter Fumy (Chair ISO SC27)
            Larry Nelson (AT&T)
            Vern Paxson (LBNL)
            Gene Spafford (Purdue University)
            Mark Zalewski (Chair TC68)
    18:00 - 19:30
    Transfers to and from hotels
    19:30 - 22:00
    Transfers to hotels  
    8:00  9:00
    Transfers from hotels and coffee service
    Session 6   (Session Chair:  Timothy Grance)
    9:00 - 9:20
      Measuring Intrusion Detection Systems
          Roy Maxion (Carnegie Mellon University, USA)
    9:20 - 9:40
      The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation
          Richard Lippmann (MIT Lincoln Laboratory, USA)
    9:40 - 10:00
      Securing Network Audit Logs on Untrusted Machines
          Bruce Schneier (Counterpane Systems, USA)
    10:00 - 10:20
      Intrusion Detection and User Privacy - A Natural Contradiction?
          Roland Bueschkes (Aachen University of Technology, Germany)
    10:20 - 10:40
    Break - Coffee Service
    Session 7  (Session Chair:  Marc Dacier)
    10:40 - 11:00
      Design and Implementation of an Intrusion Detection System
      for OSPF Routing Networks
          Y. Frank Jou (MCNC, USA)
    11:00 - 11:20
      Designing IDLE: The Intrusion Data Library Enterprise
          Ulf Lindqvist (Chalmers University of Technology, Sweden)
    11:20 - 11:40
      Design and Implementation of a Sniffer Detector
          Stephane Grundschober (IBM Zurich Research Laboratory, Switzerland)
    11:40 - 12:00
      The Application of Artificial Neural Networks to Misuse Detection:
      Initial Results
          James Cannady (Georgia Tech Research Institute, USA)
    12:00 - 13:30
    Session 8   (Session Chair:  Deborah Frincke)
    13:30 - 13:50
      AAFID: Autonomous Agents for Intrusion Detection
          Diego Zamboni (Purdue University, USA)
    13:50 - 14:10
      Research Issues in Cooperative Intrusion Detection Between Multiple Domains
          Deborah Frincke (University of Idaho, USA)
    14:10 - 14:30
      A Large-scale Distributed Intrusion Detection Framework
      Based on Attack Strategy Analysis
          Ming-Yuh Huang (The Boeing Company, USA)
    14:30 - 14:50
      NIDAR: The Design and Implementation of an Intrusion Detection System 
          Ong Tiang Hwee (DSO National Laboratories, Singapore)
    14:50 - 15:10
    Break - Beverages
    Session 9   (Session Chair:  Peter Sommer)
    15:10 - 15:30
      A UNIX Anomaly Detection System using Self-Organising Maps
          Albert Hoeglund (Nokia Research Center, Finland)
    15:30 - 15:50
      Evaluating a Real-time Anomaly-based Intrusion Detection System
          Tobias Ruighaver (University of Melbourne, Australia)
    15:50 - 16:10
      Audit Trail Pattern Analysis for Detecting Suspicious Process Behavior
          Andreas Wespi (IBM Zurich Research Laboratory, Switzerland)
    16:10 - 16:30
      An Immunological Approach to Distributed Network Intrusion Detection
          Steven A. Hofmeyr (University of New Mexico, USA)
    16:30 - 16:50
    Break - Refreshments
    Session 10 (Session Chair:  Kevin Ziese)
    16:50 - 17:10
      The Limitations of Intrusion Detection Systems on High Speed Networks
          Joe Kleinwaechter (Internet Security Systems, Inc, USA)
    17:10 - 17:30
      CERN Network Security Monitor
          Paolo Moroni (CERN, Switzerland)
    17:30 - 17:50
      HAXOR - A Passive Network Monitor/Intrusion Detection Sensor
          Alan Boulanger (IBM Watson Research Center, USA)
    17:50 - 18:10
      Using Bro to detect network intruders: experiences and status
          Vern Paxson (Lawrence Berkeley National Laboratory, USA)
    18:10 - 19:30
    Transfers to hotels  
    8:00 - 8:40
    Transfers from hotels and  coffee service
    Session 11 (Panel Chair:  Gene Spafford)
    8:40 - 10:00
      Intrusion Detection in the Large
          Dick Brackney (NSA)
          Deborah Frincke (University of Idaho)
          Michel Miqueu (CNES)
          Jean-Jacques Quisquater (UCL, Belgium)
          Gene Spafford (Purdue University)
          Marc Wilikens (Institute for Systems, Informatics and Safety)
          Kevin Ziese (Cisco/Wheelgroup)
    Subscribe: mail majordomoat_private with "subscribe isn".
    Today's ISN Sponsor: New Dimensions International [www.newdimensions.net]

    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:00:17 PDT