IPDS 2011 - The First International Workshop for Innovative Methods for Intrusion Prevention and Detection Systems IPDS 2011
View: 1094
Website |
Edit Freely
Category IPDS 2011
Deadline: October 15, 2010 | Date: February 23, 2011-February 28, 2011
Venue/Country: Gosier, France
Updated: 2010-10-09 14:05:21 (GMT+9)
Call For Papers - CFP
Recognition of the intrusion problem is causing organisations to come under increasing pressure to protect confidential data on their computer networks from external risks. Both private and public sector firms have a duty to their stake holders to ensure that the data held on their systems remains uncompromised and secure. However, recorded incidents of system breaches are on the increase with malicious hackers now more focused on commercial gain than notoriety.http://ww.iaria.org/conferences2011/IPDS.html
Intrusion Prevention and Detection Systems (IPDS) are now becoming established as the primary countermeasure to such attacks. By identifying attacks at the initial stages and either alerting, or taking an active response to prevent them, they are becoming part of many organizations standard defense policies. However with the number of attacks and their level of innovation increasing it is becoming increasing difficult find effective IPDS protection solutions. The problem is being further exacerbated through the development and subsequent use of “point and shoot” tools which allow highly sophisticated attacks to be performed with little to no understanding of the attack concepts they utilize. With this in mind, it is essential that the high level of creativity being demonstrated by malicious hackers is matched by that of the IDPS community.In response to this challenge, Intrusion Prevention and Detection Systems have now grown in prominence to such an extent that they are now considered a vital component for any enterprise organisation serious about network defence. However the numerous recorded attacks against high profile organizations is continuing evidence that many of these controls are not, at present, a panacea for dealing with the threats. Having themselves learnt the mechanisms employed by IPDS malicious parties are becoming particularly adept at evading them through inventive obfuscation techniques. These challenges need to be addressed using increasingly more innovative, creative and measurable IPDS mechanisms and methods.We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.Tutorials on specific related topics and panels on challenging areas are encouraged.The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.All tracks are open to both research and industry contributions.Topics:Reducing false positives and improving true positives Automating IPDS responses Innovative signature writing and processing Improving IPDS usability Successful approaches to Anomaly IPDS (Statistical; Fuzzy logic; Bayesian; Neural networks, etc.) Inventive behavioural based IPDS methods Inventive host based IPDS methods Improving the performance of IPDS Multiple sensor IPDSTuning IPDS The business cases supporting IPDS Network traffic normalization techniques Cost/Benefit of IPDS Combining IPDS with other hardware e.g. firewalls, routers etc. Inventive methods of using IPDS to counter specific attack types (Web attacks; Buffer overflow attacks; Brute force attacks, etc.) Comparisons of different IPDS mechanisms Combining multiple IPDS approachesINSTRUCTION FOR THE AUTHORSAuthors of selected papers will be invited to submit extended versions to one of the IARIA Journals.Publisher: XPS (Xpert Publishing Services)Archived: ThinkMindTM Digital Library (free access)Submitted for indexing:- ISI Thompson Conference Proceedings Citation Index (CPCI)- Elsevier's EI Compendex Database, EI’s Engineering Information Index- DBLP, IET INSPEC, and other relevant specialized indexes.- Other indexes are being consideredImportant deadlines:Submission (full paper) October 5, 2010 October 15, 2010Notification November 20, 2010Registration December 5, 2010Camera ready December 7, 2010Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.Your paper should also comply with the additional editorial rules.Once you receive the notification of paper acceptance, you will be provided by the Conference Publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.Poster ForumPosters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.For more details, see the Poster Forum explanation page.Work in ProgressWork-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.For more details, see the Work in Progress explanation pageTechnical marketing/business/positioning presentationsThe conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre
iaria.org.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.