International Conference on Internet Surveillance and Protection

ICISP 2006

August 26 - 29, 2006
Cap Esterel, Côte d’Azur, France
(between Cannes and St. Tropez)


Call for Papers

The International Conference on Internet Surveillance and Protection (ICISP 2006) initiates a series of special events targeting security, performance, vulnerabilities in Internet, as well as disaster prevention and recovery. Dedicated events focus on measurement, monitoring and lessons learnt in protecting the user.

We solicit both academic, research, and industrial contributions. ICISP 2006 will offer tutorials, plenary sessions, and panel sessions. The ICISP 2006 Proceedings will be published by IEEE Computer Society and posted on Xplore IEEE system. A best paper award will be granted by the IARIA’s award selection committee. The Advisory Committee will periodically report special events relating to our community.

The conference has the following specialized events:

TRASI 2006: Internet traffic surveillance and interception

IPERF 2006: Internet performance      

RTSEC 2006: Security for Internet-based real-time systems

SYNEV 2006: Systems and networks vulnerabilities                                 

DISAS 2006:  Disaster prevention and recovery                           

EMERG 2006: Networks and applications emergency services 

MONIT 2006: End-to-end sampling, measurement, and monitoring                     

REPORT 2006: Experiences & lessons learnt in securing networks and applications

USSAF 2006: User safety, privacy, and protection over Internet             

We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

The topics suggested by the conference can be discussed in term of concepts, state of the art, standards, implementations, running experiments and applications. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited topic areas. Industrial presentations are not subject to these constraints. Tutorials on specific related topics and panels on challenging areas are encouraged. 

The following track topics are expected to be covered:

TRASI 2006: Internet traffic surveillance and interception

Methods and context to classify legal and illegal traffic
Methods and procedure to classify wanted and undesired traffic
Overloads, attacks, and failures
Detection of attacks via protocols and applications
Undesired traffic evaluation
Traffic identification caused by malicious code (spam, virii, and worms, etc.)
Traffic profile during disaster recovery,
Traffic during active emergency services
Early warning on growing undesired traffic
Access control and audit detection points
Denial of service
Spoofing
Lawful interception
Multi-modal undesired traffic detection
Measurements and data mining correlation
Countermeasures on undesired traffic

IPERF 2006: Internet performance

Performance-oriented design
Active and passive performance monitoring
Performance metrics and measurements
Measurement-based performance evaluation in Internet
System measurement and monitoring
Performance model verification and validation
Stochastic modeling (queues,  Petri nets, etc.)
Statistical performance
Performance of Internet routing
Performance optimization
Internet performance prediction
Internet performance evaluation studies
Internet performance testbeds
Performance evaluation of Web search engines
Performance evaluation of P2P systems

RTSEC 2006: Security for real-time systems

Security and availability of Web Services
Security/Performance trade-off
Distributed systems security           
Language-based security  
Formalisms for security and protocol verification
Performance on firewall protected real-time systems
Security management in real-time systems
Metrics and techniques for security risk assessment
Internet monitoring and response security service
Protecting emergency communications from misuse and exploitation
Maintaining security in the face of disaster
Intrusion prevention and detection systems
Secure networks from web-based threats

SYNEV 2006: Systems and networks vulnerabilities

Vulnerability specification languages
Web service vulnerability
Vulnerabilities by self-managed sensors
Errors and configurations leading to vulnerabilities
Incident reports and handling
Networks resiliency methods
Capacity planning for resilience and emergency
Operational resilience
Theory of disaster-tolerant systems
Recovery by disruption resource procedures
Formal methods for safety-critical systems
Cost models and vulnerability business impact

DISAS 2006:  Disaster prevention and recovery   

Survivable networks on chips
Intrusion detection and defense
Alerting systems based on outstanding network events
Recovery methods in various networks
Disaster diagnosis and continuity plans
Fighting mechanisms for disaster of networks and applications
Global positioning systems
Vehicle localization and navigation systems
Disaster relief agencies to perform recovery operations
Survivability-driven defense and do-it-yourself disaster recovery
Security during disaster recovery
Budgeting disaster recovery

EMERG 2006: Networks and applications emergency services 

Survivability architecture for e-commerce
Emergency and non-emergency services,
Emergency coverage and intermittent services
PSAPs and emergency services
Future 911 PSAP message interfaces
Reliable emergency communications
Next generation of emergency communications
Response to the networks emergency services
Voice emergency notification services

MONIT 2006: End-to-end sampling, measurement, and monitoring                     

Internet monitoring techniques and procedures
Monitoring tools, functions, and metrics
Combining, filtering, and reporting monitoring metrics
Theory and practice on sampling/inversion problem (accuracy, complexity, etc.)
Distributed and adaptive sampling techniques
Sampling & inverting traffic with passive and active systems
Internet end-to-end measurements from a sampling perspective
Impact of sampling on anomaly detection
Mechanisms for sampling the Internet traffic or collected traces
On-line and off-line metrics and measurements
Incident estimation and monitoring
Internet access monitoring                          
Spy software
Internet monitoring, filtering and blocking software
Monitoring Internet traffic to optimize network bandwidth
Remote monitoring

REPORT 2006: Experiences & lessons learnt in securing networks and applications

Platforms for electronic distribution of plane tickets
Platforms for electronic distribution of hotel booking
Data accuracy
E-trade strengths and weaknesses
Malicious spyware
Blocking without quarantining the systems/networks
Out-of-band intrusion prevention
Antivirus e-mail gateways software
Security and vulnerability engineering

USSAF 2006: User safety, privacy and protection over Internet

Countermeasures on fraud prevention
Trust, trust estimators, and trust mitigation in public e-business
Customer protection and serviceability perception
Privacy impacts of emergency presence services
Authentication/authorization
Biometric methodologies and ID Cards
Security on hardware and smart cards
Identity management
Automated security analysis
Electronic Privacy
Anonymity and pseudo-anonymity
Security compliance
Public safety, Instance messages
Presence protocols
Priority user service

INSTRUCTION FOR THE AUTHORS

The ICISP 2006 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index the papers with major indexes.

Important deadlines:

Submission deadline April 5, 2006 April 15, 2006
Notification April 25, 2006 May 5, 2006
Camera ready May 15, 2006 May 20, 2006

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via the EDAS system.

Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page.

Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference’s CD collection, together with the regular papers. Please send your presentations to petre@iaria.org.

Tutorials

Tutorials provide overviews of current high interest topics. Proposals can be for half or full day tutorials. Please send your proposals to petre@iaria.org

Panel proposals:

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies.

For more information, petre@iaria.org

Workshop proposals

We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre@iaria.org .

 
 

Copyright (c) 2006, IARIA