Calls for Participation

Important Dates

Paper submission deadline: April 4, 2008   RAID Book

RAID is published as part of Springer's prestigious Lecture Notes in Computer Science .

Copies can be ordered from Springer.

Papers are also available from Springer.

Paper acceptance or rejection: June 6, 2008  
Final paper camera-ready copy: June 16, 2008  
Poster abstract submission deadline: June 18, 2008  
Poster acceptance or rejection: June 27, 2008  
Early Bird registration closes: August 1, 2008  

RAID 2008 invites poster abstracts describing works in progress, innovative ideas not mature enough for a full paper, or tools useful to intrusion detection research or operations. These 2-page submissions should be formatted as full papers with an abstract. Accepted abstracts will appear in the proceedings and authors will present a corresponding poster at the symposium.

All poster abstract submissions must be formatted according to the instructions (http://www.springer.com/comp/lncs/Authors.html) provided by Springer and then submitted electronically on the conference web site. Abstracts should list all authors and their affiliations, and all titles should end with the phrase "(Extended Abstract)". At least one of the authors of each accepted abstract should attend the conference to present the poster. Further questions on the submission process may be sent to the program chair, Richard Lippmann (MIT Lincoln Laboratory; lippmann@ll.mit.edu).

Archived Call for Poster Abstracts

This symposium, the 11th in an annual series, brings together leading researchers and practitioners from academia, government, and industry to discuss issues and technologies related to intrusion detection and defense. The Recent Advances in Intrusion Detection (RAID) International Symposium series furthers advances in intrusion defense by promoting the exchange of ideas in a broad range of topics. As in previous years, all topics related to intrusion detection, prevention and defense systems and technologies are within scope, including but not limited to the following:

  • Network and host intrusion detection and prevention
  • Anomaly and specification-based approaches
  • IDS cooperation and event correlation
  • Malware prevention, detection, analysis and containment
  • Web application security
  • Insider attack detection
  • Intrusion response, tolerance, and self-protection
  • Operational experience and limitations of current approaches
  • Intrusion detection assessment and benchmarking
  • Attacks against IDS including DoS, evasion, and IDS discovery
  • Formal models, analysis, and standards
  • Deception systems and honeypots
  • Vulnerability analysis, risk assessment, and forensics
  • Adversarial machine learning for security
  • Visualization techniques
  • Special environments, including mobile and sensor networks
  • High-performance intrusion detection
  • Legal, social, and privacy issues
  • Network exfiltration detection
  • Botnet analysis, detection, and mitigation

RAID 2008 invites two types of submissions

  1. Full papers presenting mature research results or summarizing operational experience Full papers presenting mature research results or summarizing operational experience protecting or monitoring large real-world networks. The RAID 2008 program committee plans to accept a higher volume of papers than have historically appeared in the symposium. Accepted papers will be presented and included in the RAID 2008 proceedings published by Springer in its Lecture Notes in Computer Science (http://www.springer.com/lncs) series. Papers must include an abstract and a list of keywords and can be up to 18 pages in total length, including the bibliography and appendices.

  2. Poster abstracts describing works in progress or innovative ideas not mature enough for a full paper. These 2-page submissions should be formatted as full papers with an abstract. Accepted poster abstracts will appear in the proceedings and a corresponding poster will be presented at the symposium.

All submissions (papers and poster abstracts) must be formatted according to the instructions provided by Springer (http://www.springer.com/comp/lncs/Authors.html) and then submitted electronically; details will be provided on the conference web site. Papers should list all authors and their affiliations; in case of multiple authors, the contact author must be indicated (RAID does not require anonymized submissions). For accepted papers, it is required that at least one of the authors attends the conference to present the paper. Further questions on the submission process may be sent to the program chair. Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them.

up

 

Student Scholarships

RAID 2008 will offer student scholarships to reduce symposium attendance costs. Students should visit the web site (http://www.ll.mit.edu/IST/RAID2008/) to learn about availability of scholarships and application deadlines.

Corporate Sponsors

RAID 2008 will be sponsored in part by the I3P, Symantec Corporation, and MIT Lincoln Laboratory. Contact the Sponsorship Chair at aghosh1@gmu.edu for opportunities for your organization to sponsor the symposium.

Calls for Participation (PDF)

A PDF file is available for download.

up