Forwarded From: Cynthia Deno <cynthiaat_private> 1st USENIX Workshop on Intrusion Detection and Network Monitoring April 11-12, 1999 Santa Clara, California, USA Sponsored by USENIX, the Advanced Computing Systems Association ---------------------------------------------------------- Please find the Call for Submissions at http://www.usenix.org/events/detection99/ ---------------------------------------------------------- Important Due Dates for Refereed Paper Submissions Extended abstracts due: November 1, 1998 Notification to authors: November 23, 1998 Full papers for editorial review: December 12, 1998 Camera-ready full papers: February 20, 1999 Intrusion detection offers the promise of automatic detection and notification of break-ins or unauthorized use of computers. Better techniques for detecting abuse from within and without are becoming mandatory. The goal of this workshop is to bring together network managers, engineers and researchers interested in deploying and developing intrusion detection systems (IDS) and network monitoring technologies for security, traffic analysis, or forensics. The emphasis is on practical results, case studies, and real-world large-scale deployment. This will be a two-day workshop, consisting of refereed papers, invited talks, and work-in-progress reports. Opportunities to get together informally will include a Sunday evening hosted reception, a lunch on Monday with Marcus Ranum hosting, and Birds-of-a-Feather sessions on Sunday. The Program Committee, chaired by Marcus J. Ranum of Network Flight Recorder seeks original work concerning the design, implementation, and real-world application of intrusion detection and network monitoring technologies. Besides mature work, we encourage submissions describing exceptionally promising prototypes, or enlightening negative results. Case studies and experience papers are particularly of interest. Share your results, share your pain, share your ideas. Authors will, where appropriate, be able to demonstrate their applications during their presentation using systems that will be fed with packets captured at "live" sites, which contain various intrusion attempts. Topics of interest include, but are not limited to: Case studies of IDS in practice Statistical models for IDS Anomaly detection systems Misuse detection systems Host based approaches to IDS Network based approaches to IDS Application based approaches to IDS IDS in cryptographically protected networks Distributed IDS in large networks Correlation techniques Event thresholding Reducing false positives Alternative approaches Authors must submit an extended abstract by November 1, 1998. The full papers resulting from accepted abstracts will go through an editorial review cycle with a member of the program committee, and should end up about 10-12 pages long. ============================================================= USENIX <http://www.usenix.org> is the not-for-profit Advanced Computing Systems Association with an international membership of technical professionals. USENIX's refereed conferences are recognized for bridging leading-edge research and the practical. -o- Subscribe: mail majordomoat_private with "subscribe isn". Today's ISN Sponsor: New Dimensions International [www.newdimensions.net]
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:00:53 PDT