posted by system || 5058 views || tracked by 10 users: [display]

SAIPD_CRC 2013 : The State of the Art in Intrusion Prevention and Detection

FacebookTwitterLinkedInGoogle

Link: http://staff.iium.edu.my/sakib/CRC_Intrusion/crcintrusion.html
 
When N/A
Where USA
Abstract Registration Due Jan 31, 2013
Submission Deadline Apr 5, 2013
Notification Due May 5, 2013
Final Version Due Jun 5, 2013
Categories    intrusion   networks   security   communications
 

Call For Papers

BOOK TITLE: The State of the Art in Intrusion Prevention and Detection
To be published by CRC Press, USA
URL: http://staff.iium.edu.my/sakib/CRC_Intrusion/crcintrusion.html

Overview

Most of the security threats in various communications networks and systems are posed by the illegitimate entities that enter or intrude within the network perimeter, which could commonly be termed as "intruders". Sometimes a legitimate entity in a system could also be compromised in some way so that an attacker-intended task could be performed for breaching security of the system. To tackle intrusion of various kinds, we commonly hear about Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), or a combination of both called, IDPS (Intrusion Detection and Prevention System). The main task of an IDS is to defend a computer system or computer network by detecting an attack and possibly repealing it. Successful detection of hostile attacks depends on the number and types of appropriate actions. On the other hand, Intrusion prevention requires a well-selected combination of ‘baiting and trapping’ aimed at the investigations of threats. Diverting the intruder’s attention from protected resources is another task. Both the real system and a possible trap system are constantly monitored. Various tasks and functionalities can be thought of under intrusion related topics in computer, communications, or networking fields:

- regular checking the data in computers and systems;
- monitoring and analyzing network traffic;
- analyzing network configuration and vulnerabilities;
- assessing network and data integrity;
- ability to recognize patterns typical to attacks;
- tracking the network policy violations;
- analysis of abnormal activities;
- outside influence and its impact on a system’s security, and so on.

Recommended topics include, but are not limited to, the following:

- Intrusion detection schemes
- Intrusion prevention schemes
- Tracing back mobile attackers
- Secure routing with intrusion prevention
- Access control
- Authentication mechanisms
- Resource efficient intrusion detection & prevention
- Anomaly detection
- Specification based detection
- Misuse detection
- Intrusion detection vs Intrusion prevention
- Artificial Intelligence (AI) based intrusion techniques
- Game theory based intrusion detection techniques
- Physical intrusion in wired and wireless networks
- Cross-layer based intrusion detection
- Agent based intrusion surveillance, detection and prevention
- Multimedia security issues for tackling intruders

A tentative structure of the book is:

PART 1: Intrusion in Various Wired Networks
PART 2: Intrusion in Various Wireless Networks
PART 3: Intrusion in Next-Generation & Converged Networks
PART 4: Intrusion in Social Networks

Submission Guidelines

Manuscripts from all spheres of networking, computing, and communications related to intrusion are welcome. Each manuscript must be written in a tutorial style with minimum number of mathematical equations or notations (depends on the subject topic and specific focus). Each manuscript should be within 9000 to 12000 words including references. The authors should submit an initial proposal to the editor at sakib.pathan@gmail.com with the word "CRC_Intrusion" in the email subject.

Please strictly follow the deadlines mentioned below.

Manuscripts submitted for the book must be original, must not be previously published or currently under review anywhere. Please follow A4 page format, single column with 11 point Times New Roman font with 1.5 line spacing while submitting your manuscript as MS-Office (i.e., doc or docx) document. Use the number referencing style as usually used for regular research papers, NOT the APA style. That means, mention the reference numbers within the texts and in the references section, mention all the references with sequential numbers; [1], [2], [3] ...

A proposal for each chapter is needed as soon as possible before submitting the full chapter. The abstract/proposal could be within 500 words.

Target Audience

The target audience of this book are the graduate students, university teachers, professionals, and researchers working in the fields of intrusion detection, prevention, or tackling. Moreover, the book is expected to include some chapters written for the general readers so that they could be able to easily grasp some of the concepts in this area.

Important Dates

Proposal Submission Due: January 31, 2013
Full Manuscript Due: April 05, 2013
Acceptance/Revision Notification: May 05, 2013
Final/Revised Chapter Submission June 05, 2013
Publication Time: 2nd half of 2013 (tentative)

Inquiries and submissions can be forwarded electronically (Word document) or by postal mail to:

EDITOR'S CONTACT DETAILS

Al-Sakib Khan Pathan, Ph.D.
Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +603-61964000 Ext. 5653, Cell: +60163910754
E-Mails: sakib.pathan@gmail.com, sakib@iium.edu.my
URL: http://staff.iium.edu.my/sakib/

Related Resources

ICDP 2019   9th International Conference on Imaging for Crime Detection and Prevention
SP 2020   IEEE Symposium on Security and Privacy
MDPI Information 2019   MDPI OA Journal of Information Science, Technology and Engineering --SI on Machine Learning for Cyber-Security
SIPRO 2020   6th International Conference on Signal and Image Processing
DIMVA 2019   16th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment
CCCIOT 2020   International Conference on Cloud Computing and IOT (CCCIOT 2020)
DISSECT 2019   IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)
NCWMC 2020   5th International Conference on Networks, Communications, Wireless and Mobile Computing
DSIDDF 2019   Data Science for Intrusion Detection and Digital Forensics
CyberTIM 2019   International Workshop on Cyber Threat Intelligence Management