ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICIMP 2010 - The Fifth International Conference on Internet Monitoring and Protection

Date2010-05-09

Deadline2009-12-20

VenueBarcelona, Spain Spain

Keywords

Websitehttps://www.iaria.org/conferences.html

Topics/Call fo Papers

The International Conference on Internet Monitoring and Protection (ICIMP 2010) continues a series of special events targeting security, performance, vulnerabilities in Internet, as well as disaster prevention and recovery. Dedicated events focus on measurement, monitoring and lessons learnt in protecting the user.

The design, implementation and deployment of large distributed systems are subject to conflicting or missing requirements leading to visible and/or hidden vulnerabilities. Vulnerability specification patterns and vulnerability assessment tools are used for discovering, predicting and/or bypassing known vulnerabilities.

Vulnerability self-assessment software tools have been developed to capture and report critical vulnerabilities. Some of vulnerabilities are fixed via patches, other are simply reported, while others are self-fixed by the system itself. Despite the advances in the last years, protocol vulnerabilities, domain-specific vulnerabilities and detection of critical vulnerabilities rely on the art and experience of the operators; sometimes this is fruit of hazard discovery and difficult to be reproduced and repaired.

System diagnosis represent a series of pre-deployment or post-deployment activities to identify feature interactions, service interactions, behavior that is not captured by the specifications, or abnormal behavior with respect to system specification. As systems grow in complexity, the need for reliable testing and diagnosis grows accordingly. The design of complex systems has been facilitated by CAD/CAE tools. Unfortunately, test engineering tools have not kept pace with design tools, and test engineers are having difficulty developing reliable procedures to satisfy the test requirements of modern systems. Therefore, rather than maintaining a single candidate system diagnosis, or a small set of possible diagnoses, anticipative and proactive mechanisms have been developed and experimented. In dealing with system diagnosis data overload is a generic and tremendously difficult problem that has only grown. Cognitive system diagnosis methods have been proposed to cope with volume and complexity.

Attacks against private and public networks have had a significant spreading in the last years. With simple or sophisticated behavior, the attacks tend to damage user confidence, cause huge privacy violations and enormous economic losses.

The CYBER-FRAUD track focuses on specific aspects related to attacks and counterattacks, public information, privacy and safety on cyber-attacks information. It also targets secure mechanisms to record, retrieve, share, interpret, prevent and post-analyze of cyber-crime attacks.

Current practice for engineering carrier grade IP networks suggests n-redundancy schema. From the operational perspective, complications are involved with multiple n-box PoP. It is not guaranteed that this n-redundancy provides the desired 99.999% uptime. Two complementary solutions promote (i) high availability, which enables network-wide protection by providing fast recovery from faults that may occur in any part of the network, and (ii) non-stop routing. Theory on robustness stays behind the attempts for improving system reliability with regard to emergency services and containing the damage through disaster prevention, diagnosis and recovery.

Highly reliable emergency communications are required by public safety and disaster relief agencies to perform recovery operations or associated with disasters or serious network events. Future advanced network development and evolution should take into consideration these requirements through solutions:

?Identification of suitable technologies, i.e., narrowband and broadband aspects,
?Interoperability and interworking between emergency communications capabilities and public networks,
?Preferential access to communications resources capabilities, applications, and facilities,
?Preferential use of remaining operational resources.
We solicit both academic, research, and industrial contributions. ICIMP 2010 will offer tutorials, plenary sessions, and panel sessions. A best paper award will be granted by the IARIA’s award selection committee. The Advisory Committee will periodically report special events relating to our community.

The conference has the following specialized events:

TRASI: Internet traffic surveillance and interception

IPERF: Internet performance

RTSEC: Security for Internet-based real-time systems

DISAS: Disaster prevention and recovery

EMERG: Networks and applications emergency services

MONIT: End-to-end sampling, measurement, and monitoring

REPORT: Experiences & lessons learnt in securing networks and applications

USSAF: User safety, privacy, and protection over Internet

SYVUL: Systems vulnerabilities

SYDIA: Systems diagnosis

CYBER-FRAUD: Cyber fraud

BUSINESS: Business continuity

RISK: Risk assessment

TRUST: Privacy and trust in pervasive communications

RIGHT: Digital rights management

BIOTEC: Biometric techniques

EMDRM: Enterprise & Media DRM

We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.

Last modified: 2010-06-04 19:32:22