NETSAP 2015 - 5th IEEE International Workshop on Network Technologies for Security, Administration and Protection
Topics/Call fo Papers
This workshop aims to discuss and advance research and development of practical systems to fight against cyber attacks. The workshop focuses on development of practical systems and methodologies including measurement and analysis of real traffic and also privacy issues about network monitoring. The workshop addresses researchers from different disciplines in academia and industry, as well as practitioners, who share interests in countermeasures against cyber attacks.
Because of recent expansion of cyber attacks, many organizations and persons have been affected through their activities on the internet. DDoS attacks to government sites, online trading/shopping sites are typical examples where many people cannot access their desired information. Furthermore, there are many online services that offer DDoS attacks, so that attackers easily intimidate organizations to perform DDoS attacks.
Increase of targeted attacks and variant explosion of malwares make security systems difficult to detect such malicious activities. As a result, incidents of information leakages have silently and frequently occurred in many organizations.
In order to take countermeasures against the attacks, various types of systems have been proposed in literature. Although benchmark results and simulation experiments could show good performance, most methods cannot be practically applicable to the real environment. Basically, this gap between theory and practice is caused by too much benchmark-optimization on algorithms or by unrealistic assumptions on simulation settings.
In this workshop, we focus on practical systems to fight against cyber attacks. Mechanisms, algorithms and strategies that are used in the real field will be discussed. Measurement and analysis of real traffic is also welcomed for aiming at new directions of future research. In addition to practical systems, we would like to discuss privacy issues about network monitoring.
Any submission whose content is relevant to the area of network technologies for security, administration and protection will be considered, but any submission whose subject matter is related to one of the following topics will be particularly welcome:
Intrusion detection and protection
DoS attack detection and protection
Malware analysis
IP Traceback
Computer Forensics
Countermeasures against advanced persistent threats
Privacy in network monitoring
Trusted computing
Cloud security
IoT security
Big data security
Mobile security
Because of recent expansion of cyber attacks, many organizations and persons have been affected through their activities on the internet. DDoS attacks to government sites, online trading/shopping sites are typical examples where many people cannot access their desired information. Furthermore, there are many online services that offer DDoS attacks, so that attackers easily intimidate organizations to perform DDoS attacks.
Increase of targeted attacks and variant explosion of malwares make security systems difficult to detect such malicious activities. As a result, incidents of information leakages have silently and frequently occurred in many organizations.
In order to take countermeasures against the attacks, various types of systems have been proposed in literature. Although benchmark results and simulation experiments could show good performance, most methods cannot be practically applicable to the real environment. Basically, this gap between theory and practice is caused by too much benchmark-optimization on algorithms or by unrealistic assumptions on simulation settings.
In this workshop, we focus on practical systems to fight against cyber attacks. Mechanisms, algorithms and strategies that are used in the real field will be discussed. Measurement and analysis of real traffic is also welcomed for aiming at new directions of future research. In addition to practical systems, we would like to discuss privacy issues about network monitoring.
Any submission whose content is relevant to the area of network technologies for security, administration and protection will be considered, but any submission whose subject matter is related to one of the following topics will be particularly welcome:
Intrusion detection and protection
DoS attack detection and protection
Malware analysis
IP Traceback
Computer Forensics
Countermeasures against advanced persistent threats
Privacy in network monitoring
Trusted computing
Cloud security
IoT security
Big data security
Mobile security
Other CFPs
- 3rd IEEE International Workshop on Consumer Devices and Systems
- 2nd IEEE International Workshop on Medical Computing
- 3rd International Workshop on Architecture, Design, Deployment and Management of Networks and Applications
- 10th IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- 8th IEEE International Workshop on Service Science and Systems
Last modified: 2015-01-17 15:41:50