IPDS 2011 - The First International Workshop for Innovative Methods for Intrusion Prevention and Detection Systems IPDS 2011
Topics/Call fo Papers
Recognition of the intrusion problem is causing organisations to come under increasing pressure to protect confidential data on their computer networks from external risks. Both private and public sector firms have a duty to their stake holders to ensure that the data held on their systems remains uncompromised and secure. However, recorded incidents of system breaches are on the increase with malicious hackers now more focused on commercial gain than notoriety.
http://ww.iaria.org/conferences2011/IPDS.html
Intrusion Prevention and Detection Systems (IPDS) are now becoming established as the primary countermeasure to such attacks. By identifying attacks at the initial stages and either alerting, or taking an active response to prevent them, they are becoming part of many organizations standard defense policies. However with the number of attacks and their level of innovation increasing it is becoming increasing difficult find effective IPDS protection solutions. The problem is being further exacerbated through the development and subsequent use of “point and shoot” tools which allow highly sophisticated attacks to be performed with little to no understanding of the attack concepts they utilize. With this in mind, it is essential that the high level of creativity being demonstrated by malicious hackers is matched by that of the IDPS community.
In response to this challenge, Intrusion Prevention and Detection Systems have now grown in prominence to such an extent that they are now considered a vital component for any enterprise organisation serious about network defence. However the numerous recorded attacks against high profile organizations is continuing evidence that many of these controls are not, at present, a panacea for dealing with the threats. Having themselves learnt the mechanisms employed by IPDS malicious parties are becoming particularly adept at evading them through inventive obfuscation techniques. These challenges need to be addressed using increasingly more innovative, creative and measurable IPDS mechanisms and methods.
We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.
Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.
Tutorials on specific related topics and panels on challenging areas are encouraged.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions.
Topics:
Reducing false positives and improving true positives
Automating IPDS responses
Innovative signature writing and processing
Improving IPDS usability
Successful approaches to Anomaly IPDS (Statistical; Fuzzy logic; Bayesian; Neural networks, etc.)
Inventive behavioural based IPDS methods
Inventive host based IPDS methods
Improving the performance of IPDS
Multiple sensor IPDS
Tuning IPDS
The business cases supporting IPDS
Network traffic normalization techniques
Cost/Benefit of IPDS
Combining IPDS with other hardware e.g. firewalls, routers etc.
Inventive methods of using IPDS to counter specific attack types (Web attacks; Buffer overflow attacks; Brute force attacks, etc.)
Comparisons of different IPDS mechanisms
Combining multiple IPDS approaches
INSTRUCTION FOR THE AUTHORS
Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.
Publisher: XPS (Xpert Publishing Services)
Archived: ThinkMindTM Digital Library (free access)
Submitted for indexing:
- ISI Thompson Conference Proceedings Citation Index (CPCI)
- Elsevier's EI Compendex Database, EI’s Engineering Information Index
- DBLP, IET INSPEC, and other relevant specialized indexes.
- Other indexes are being considered
Important deadlines:
Submission (full paper) October 5, 2010 October 15, 2010
Notification November 20, 2010
Registration December 5, 2010
Camera ready December 7, 2010
Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.
Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.
Your paper should also comply with the additional editorial rules.
Once you receive the notification of paper acceptance, you will be provided by the Conference Publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.
Poster Forum
Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.
For more details, see the Poster Forum explanation page.
Work in Progress
Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.
For more details, see the Work in Progress explanation page
Technical marketing/business/positioning presentations
The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre-AT-iaria.org.
http://ww.iaria.org/conferences2011/IPDS.html
Intrusion Prevention and Detection Systems (IPDS) are now becoming established as the primary countermeasure to such attacks. By identifying attacks at the initial stages and either alerting, or taking an active response to prevent them, they are becoming part of many organizations standard defense policies. However with the number of attacks and their level of innovation increasing it is becoming increasing difficult find effective IPDS protection solutions. The problem is being further exacerbated through the development and subsequent use of “point and shoot” tools which allow highly sophisticated attacks to be performed with little to no understanding of the attack concepts they utilize. With this in mind, it is essential that the high level of creativity being demonstrated by malicious hackers is matched by that of the IDPS community.
In response to this challenge, Intrusion Prevention and Detection Systems have now grown in prominence to such an extent that they are now considered a vital component for any enterprise organisation serious about network defence. However the numerous recorded attacks against high profile organizations is continuing evidence that many of these controls are not, at present, a panacea for dealing with the threats. Having themselves learnt the mechanisms employed by IPDS malicious parties are becoming particularly adept at evading them through inventive obfuscation techniques. These challenges need to be addressed using increasingly more innovative, creative and measurable IPDS mechanisms and methods.
We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.
Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.
Tutorials on specific related topics and panels on challenging areas are encouraged.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions.
Topics:
Reducing false positives and improving true positives
Automating IPDS responses
Innovative signature writing and processing
Improving IPDS usability
Successful approaches to Anomaly IPDS (Statistical; Fuzzy logic; Bayesian; Neural networks, etc.)
Inventive behavioural based IPDS methods
Inventive host based IPDS methods
Improving the performance of IPDS
Multiple sensor IPDS
Tuning IPDS
The business cases supporting IPDS
Network traffic normalization techniques
Cost/Benefit of IPDS
Combining IPDS with other hardware e.g. firewalls, routers etc.
Inventive methods of using IPDS to counter specific attack types (Web attacks; Buffer overflow attacks; Brute force attacks, etc.)
Comparisons of different IPDS mechanisms
Combining multiple IPDS approaches
INSTRUCTION FOR THE AUTHORS
Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.
Publisher: XPS (Xpert Publishing Services)
Archived: ThinkMindTM Digital Library (free access)
Submitted for indexing:
- ISI Thompson Conference Proceedings Citation Index (CPCI)
- Elsevier's EI Compendex Database, EI’s Engineering Information Index
- DBLP, IET INSPEC, and other relevant specialized indexes.
- Other indexes are being considered
Important deadlines:
Submission (full paper) October 5, 2010 October 15, 2010
Notification November 20, 2010
Registration December 5, 2010
Camera ready December 7, 2010
Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.
Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.
Your paper should also comply with the additional editorial rules.
Once you receive the notification of paper acceptance, you will be provided by the Conference Publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.
Poster Forum
Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.
For more details, see the Poster Forum explanation page.
Work in Progress
Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.
For more details, see the Work in Progress explanation page
Technical marketing/business/positioning presentations
The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre-AT-iaria.org.
Other CFPs
- 7th Jordanian International Electrical and Electronics Engineering Conference, (JIEEEC 2011
- 1st World Congress on Obstetrics, Gynaecology and Andrology: Psychosomatic and Biological Perspectives on Clinical Controversies
- World Professional Association for Transgender Health (WPATH) XXII Biennial Symposium
- The 22nd International Conference on Pattern Recognition ICPR 2014
- The 7th IEEE Tokyo Young Researchers Workshop
Last modified: 2010-10-09 14:05:21