From: dac@zurich.ibm.com (Marc Dacier)
To: cypherpunks@toad.com
Message Hash: 3a6ce3fe4cd1fd0904b03f91a0a00ed5b017d9558dcb9d5cd9f6362e51faec09
Message ID: <9807311401.AA36670@selun.zurich.ibm.com>
Reply To: N/A
UTC Datetime: 1998-07-31 14:02:07 UTC
Raw Date: Fri, 31 Jul 1998 07:02:07 -0700 (PDT)
From: dac@zurich.ibm.com (Marc Dacier)
Date: Fri, 31 Jul 1998 07:02:07 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RAID98: Call For Registration
Message-ID: <9807311401.AA36670@selun.zurich.ibm.com>
MIME-Version: 1.0
Content-Type: text/plain
Call For Registration - RAID'98
First International Workshop on the
Recent Advances in Intrusion Detection
Sponsored by
the IBM Emergency Response Service
(http://www.ers.ibm.com)
and
the Joint Research Centre of the EC
(Institute for Systems, Informatics and Safety)
(http://ntsta.jrc.it)
September 14-16, 1998
Louvain-la-Neuve, Belgium
***********************************************************************
Visit our web site
http://www.zurich.ibm.com/~dac/RAID98
for on-line information regarding the preliminary program, the
registration forms, accommodations, maps, etc..
***********************************************************************
RAID'98 is the first in an anticipated annual series of international
workshops that will bring together leading figures from academia,
government, and industry to ponder the current state of intrusion
detection1 technologies and paradigms from the research and commercial
perspectives. Its aim is to further progress in intrusion detection
by promoting the exchange of ideas among researchers, system
developers, and users and by encouraging links between these groups.
RAID'98 will be held in Louvain-la-Neuve, Belgium, on 14-16 September
1998. RAID'98 will be held in the same location as CARDIS'98
(http://www.dice.ucl.ac.be/cardis98) and ESORICS'98
(http://www.dice.ucl.ac.be/esorics98), at the same time as the former
and just prior to the latter. A registration discount is available to
those attending both the ESORICS conference and the RAID workshop.
Registration is now open, and will continue until 21 August 1998. Late
registration will continue until 4 September 1998, but only on a
space-available basis, and will include a penalty of 2000 BEF. If you
need more information regarding registration or accommodations, please
take contact with Catherine Rouyer
E-mail: Rouyer@tele.ucl.ac.be
RAID Secretariat
UCL/TELE (Mrs. Catherine Rouyer)
Place du Levant, 2
B-1348 Louvain-la-Neuve
Belgium
************************** PRELIMINARY PROGRAM *************************
**** html version available: http://www.zurich.ibm.com/~dac/RAID98 ****
MONDAY SEPTEMBER 14,1998
========================
8:00 9:00
Transfers from hotels, coffee service and participant check-in
Session 1 (Session Chair: Kathleen Jackson)
-------------------------------------------
9:00 - 9:20
Welcome and Introduction
Marc Dacier (IBM ZRL, Switzerland), Jean-Jacques
Quisquater (UCL, Belgium).
9:20 - 9:40
The Rome Labs Experience
Kevin Ziese (Cisco Systems, Inc., USA)
9:40 - 10:00
Intrusion Detection and Legal Proceedings
Peter Sommer (London School of Economics and Political Science, UK)
10:00 - 10:20
Lessons Learned in the Implementation of a
Multi-Location Network Based Real Time Intrusion Detection System
Michael Puldy (IBM Emergency Response Service, USA)
10:20 - 10:40
Break - Coffee service
Session 2 (Session Chair: Baudouin Le Charlier)
------------------------------------------------
10:40 - 11:00
GASSATA, A Genetic Algorithm as an Alternative Tool for
Security Audit Trails Analysis
Ludovic Me (SUPELEC, France)
11:00 - 11:20
Using Bottleneck Verification to Find Novel New Attacks
with a Low False Alarm Rate
Richard Lippmann (MIT Lincoln Laboratory, USA)
11:20 - 11:40
The Use of Information Retrieval Techniques for Intrusion Detection
Ross Anderson (University of Cambridge, UK)
11:40 - 12:00
Tools for Intrusion detection: Results and Lessons
Learned from the ASAX Project
Abdelaziz. Mounji (Computer Science Institute, Belgium)
12:00 - 13:30
Lunch
Session 3 (Session Chair: Yves Deswarte)
-------------------------------------------
13:30 - 13:50
Dependability of Large-scale Infrastructures and
Challenges for Intrusion Detection
Marc Wilikens (Institute for Systems, Informatics and Safety, Italy)
13:50 - 14:10
How Re(Pro)active Should An IDS Be?
Richard Overill (King's College London, UK)
14:10 - 14:30
Contribution of Quantitative Security Evaluation to Intrusion Detection
Yves Deswarte (LAAS-CNRS & INRIA, France)
14:30 - 14:50
Intrusion Detection in Telecommunication
Hai-Ping Ko (GTE Laboratories Incorporated, USA)
14:50 - 15:10
Break - Beverages
Session 4 (Session Chair: TBD)
---------------------------------
15:10 - 15:30
Problems with Networkbased Intrusion Detection for Enterprise Computing
Thomas Daniels (Purdue University, USA)
15:30 - 15:50
Transitioning IDS Research Into a Viable Product
Mark Crosbie (Hewlett-Packard Corporation, USA)
15:50 - 16:10
Enhanced Network Intrusion Detection in a Smart Enterprise Environment
Ricci Ieong (Hong Kong University of Science and Technology, Hong Kong)
16:10 - 16:30
Integrating Intrusion Detection into the Network/Security Infrastructure
Mark Wood (Internet Security Systems, Inc, USA)
16:30 - 16:50
Break - Refreshments
Session 5 (Panel Chair: Rowena Chester)
---------------------------------------
16:50 - 18:00
The Nature and Utility of Standards Organizations
for the Intrusion Detection Developers Community
Participants
Dick Brackney (NSA)
Rowena Chester (Chair NCITS (ANSI) T4 Committee)
Roger French (Compaq)
Walter Fumy (Chair ISO SC27)
Larry Nelson (AT&T)
Vern Paxson (LBNL)
Gene Spafford (Purdue University)
Mark Zalewski (Chair TC68)
18:00 - 19:30
Transfers to and from hotels
19:30 - 22:00
Banquet
22:00
Transfers to hotels
TUESDAY SEPTEMBER 15,1998
=========================
8:00 9:00
Transfers from hotels and coffee service
Session 6 (Session Chair: Timothy Grance)
--------------------------------------------
9:00 - 9:20
Measuring Intrusion Detection Systems
Roy Maxion (Carnegie Mellon University, USA)
9:20 - 9:40
The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation
Richard Lippmann (MIT Lincoln Laboratory, USA)
9:40 - 10:00
Securing Network Audit Logs on Untrusted Machines
Bruce Schneier (Counterpane Systems, USA)
10:00 - 10:20
Intrusion Detection and User Privacy - A Natural Contradiction?
Roland Bueschkes (Aachen University of Technology, Germany)
10:20 - 10:40
Break - Coffee Service
Session 7 (Session Chair: Marc Dacier)
----------------------------------------
10:40 - 11:00
Design and Implementation of an Intrusion Detection System
for OSPF Routing Networks
Y. Frank Jou (MCNC, USA)
11:00 - 11:20
Designing IDLE: The Intrusion Data Library Enterprise
Ulf Lindqvist (Chalmers University of Technology, Sweden)
11:20 - 11:40
Design and Implementation of a Sniffer Detector
Stephane Grundschober (IBM Zurich Research Laboratory, Switzerland)
11:40 - 12:00
The Application of Artificial Neural Networks to Misuse Detection:
Initial Results
James Cannady (Georgia Tech Research Institute, USA)
12:00 - 13:30
Lunch
Session 8 (Session Chair: Deborah Frincke)
---------------------------------------------
13:30 - 13:50
AAFID: Autonomous Agents for Intrusion Detection
Diego Zamboni (Purdue University, USA)
13:50 - 14:10
Research Issues in Cooperative Intrusion Detection Between Multiple Domains
Deborah Frincke (University of Idaho, USA)
14:10 - 14:30
A Large-scale Distributed Intrusion Detection Framework
Based on Attack Strategy Analysis
Ming-Yuh Huang (The Boeing Company, USA)
14:30 - 14:50
NIDAR: The Design and Implementation of an Intrusion Detection System
Ong Tiang Hwee (DSO National Laboratories, Singapore)
14:50 - 15:10
Break - Beverages
Session 9 (Session Chair: Peter Sommer)
------------------------------------------
15:10 - 15:30
A UNIX Anomaly Detection System using Self-Organising Maps
Albert Hoeglund (Nokia Research Center, Finland)
15:30 - 15:50
Evaluating a Real-time Anomaly-based Intrusion Detection System
Tobias Ruighaver (University of Melbourne, Australia)
15:50 - 16:10
Audit Trail Pattern Analysis for Detecting Suspicious Process Behavior
Andreas Wespi (IBM Zurich Research Laboratory, Switzerland)
16:10 - 16:30
An Immunological Approach to Distributed Network Intrusion Detection
Steven A. Hofmeyr (University of New Mexico, USA)
16:30 - 16:50
Break - Refreshments
Session 10 (Session Chair: Kevin Ziese)
----------------------------------------
16:50 - 17:10
The Limitations of Intrusion Detection Systems on High Speed Networks
Joe Kleinwaechter (Internet Security Systems, Inc, USA)
17:10 - 17:30
CERN Network Security Monitor
Paolo Moroni (CERN, Switzerland)
17:30 - 17:50
HAXOR - A Passive Network Monitor/Intrusion Detection Sensor
Alan Boulanger (IBM Watson Research Center, USA)
17:50 - 18:10
Using Bro to detect network intruders: experiences and status
Vern Paxson (Lawrence Berkeley National Laboratory, USA)
18:10 - 19:30
Reception
19:30
Transfers to hotels
WEDNESDAY SEPTEMBER 16,1998
===========================
8:00 - 8:40
Transfers from hotels and coffee service
Session 11 (Panel Chair: Gene Spafford)
----------------------------------------
8:40 - 10:00
Intrusion Detection in the Large
Participants
Dick Brackney (NSA)
Deborah Frincke (University of Idaho)
Michel Miqueu (CNES)
Jean-Jacques Quisquater (UCL, Belgium)
Gene Spafford (Purdue University)
Marc Wilikens (Institute for Systems, Informatics and Safety)
Kevin Ziese (Cisco/Wheelgroup)
10:00
Adjourn
Return to July 1998
Return to “dac@zurich.ibm.com (Marc Dacier)”
1998-07-31 (Fri, 31 Jul 1998 07:02:07 -0700 (PDT)) - RAID98: Call For Registration - dac@zurich.ibm.com (Marc Dacier)