symposium, the eighth in an annual series, brings together leading
researchers and practitioners from academia, government, and industry
to discuss intrusion detection technologies and issues from the
research and commercial perspectives. The RAID International Symposium
series is intended to further advances in intrusion defense by
promoting the exchange of ideas in a broad range of topics.
For RAID 2005, we are expanding our historical scope from a focus on
intrusion detection to the broader field of intrusion defense. Of
particular interest are intrusion tolerant systems and systems for
which detection triggers an adaptive response. As in 2004, we welcome
papers that address issues related to intrusion defense, including
information gathering and monitoring, as a part of a larger, not
necessarily purely technical, perspective. For example, the implication
of information gathering and detection technologies on enterprises,
organisations and authorities, as well as legislative and governing
bodies is within scope, but also the impact and restrictions from those
bodies on the design and technology. This would include issues such as
privacy, risk and emergency management, crisis management, security
policies, standardisation and legal issues. We also encourage
contributions addressing intrusion defense from more than an enterprise
perspective, as well as contributions dealing with securing critical
2005 Program Committee invites four types of submissions:
papers presenting mature research results. Papers accepted for
presentation at the Symposium will be included in the RAID 2005
proceedings published by Springer Verlag in its Lecture Notes in
Computer Science (LNCS) series. Full papers are limited to 20 pages
when formatted according
to the instructions provided by Springer Verlag. Papers must
include an abstract and a list of keywords.
experience reports describing a valuable experience or a case study,
such as the design and deployment of a system or actual experience from
intrusion detection or network monitoring. These reports are reviewed
differently from full papers and do not necessarily include fundamental
scientific contributions or new research ideas. Practical experience
reports are limited to 12 pages when formatted
according to the instructions provided by Springer Verlag. They
must include an abstract and a list of keywords.
proposals for presenting and discussing hot topics in the field of
intrusion detection systems. The panel proposals should include both an
outline of the format of the panel and a short rationale for the panel.
Panels that include time for general discussion and questions/answers
between the panelists and the Symposium attendees are preferred.
- Poster sessions
describing work in progress. Perspective presenters are to submit a
brief abstract by August 15, 2005.
topics related to Intrusion Detection Systems and Technologies are
within scope, including their design, use and maintenance, integration,
correlation and self-protection, just to mention a few.
With reference to this year's theme and extended scope we also invite
papers on the following topics, as they bear on intrusion detection and
the general problem of information security:
assessment and risk management
Deception systems and honeypots
Vulnerability analysis and management
Data mining techniques
Critical infrastructure protection (CIP)
|(NTT Data, Japan)
|Sungdeok (Steve) Cha
|(Korea Advanced Institute of Science and
Lincoln Laboratory, USA)
|(McAfee Inc., USA)
of Michigan, USA)
|(University of Wisconsin, USA)
|(IBM Reserach, Switzerland)
University of Vienna, Austria)
Mellon University, USA)
University of Technology, Australia)
||(North Carolina State University, Raleigh,
and LBNL, USA)
of California, Davis, USA)
of Illinois, Urbana-Champaign, USA)
|(Carnegie Mellon University, USA)
|(Columbia University, USA)
|(Carnegie Mellon University, USA)
|(Florida State University, USA)
for full papers and practical experience reports:
8, 2005, 19:00, PST, extended
for panel proposals:
30, 2005, 19:00, PST
of acceptance or rejection:
4, 2005, 19:00, PST
paper camera ready copy:
1, 2005, 19:00, PST
|Deadline for poster session abstracts:
|August 15, 2005, 19:00, PST
Submissions must not substantially
duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
other conference or workshop with proceedings. The full papers must
list all authors and their affiliations; in case of multiple authors,
the contact author must be indicated (note that RAID does not require
Authors are invited to submit their papers electronically. All submissions are to be made via web submission interface.
Questions on submission process may be sent to email@example.com.
We solicit interested organizations to serve as sponsors for RAID 2005,
particularly in sponsorship of student travel and other expenses for
RAID. Please contact the Sponsorship Chair, Jim Alves-Foss, for
regarding corporate sponsorship of RAID 2005.
Detailed registration information (including fees, suggested hotels,
and travel directions) will be provided at the RAID 2005 web site.
Accepted papers will be published by Springer Verlag in its Lecture
Notes in Computer Science (LNCS) series. Instructions for authors are
available at Springer Verlag.
Telecom R&D, France)
Northwest National Lab,
Boeing Company, USA)
Institute of Technology, USA)
information, please contact the Program Chair (Alfonso Valdes) or the General
Chair (Ming-Yuh Huang).