VizSEC 2008 Call For Participation

VizSEC 2008 Workshop on Visualization for Cyber Security
http://vizsec.org/workshop2008/
September 15, 2008 / Cambridge, MA USA
In conjunction with RAID 2008

The 5th International Workshop on Visualization for Cyber Security will provide a forum for new research in visualization for computer security. We are pleased to be holding this year's meeting in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection. The VizSEC Workshop will be held at MIT in Cambridge, Massachusetts USA on Monday, September 15, 2008.

As a result of previous VizSEC workshops, we have seen both the application of existing visualization techniques to security problems and the development of novel security visualization approaches. However, VizSEC research has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense. Other communities, led by researchers from the RAID Symposia, have researched automated methods for detecting anomalies and malicious activity.

The theme for this year's workshop, which will be held in conjunction with RAID 2008, will be on bridging the gap between visualization and automation, such as leveraging the power of visualization to create rules for intrusion detection and defense systems. We hope that VizSEC participants will stay for the RAID Symposium and RAID participants will consider coming a day early to participate in VizSEC.

We also solicit papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including:

* Visualization of Internet routing
* Visualization of packet traces and network flows
* Visualization of intrusion detection alerts
* Visualization of attack tracks
* Visualization of security vulnerabilities
* Visualization of attack paths
* Visualization of application processes
* Visualization for forensic analysis
* Visualization for correlating events
* Visualization for computer network defense training
* Visualization for offensive information operations
* Visualization for building rules
* Visualization for feature selection
* Visualization for cryptology
* Visualization for detecting anomalous activity
* Deployment and field testing of VizSEC systems
* Evaluation and user testing of VizSEC systems
* User and design requirements for VizSEC systems
* Lessons learned from development and deployment of VizSEC systems

All submitted papers will be peer-reviewed. Full and short papers from the workshop will be published in an edited book (details to follow).

Full Papers
Full papers should present mature research results. (We will release page count and formatting instructions when we confirm the details of publishing the proceedings.)

Short Papers
Short papers can be used to present less mature research results than full papers, or late-breaking results. (We will release page count and formatting instructions when we confirm the details of publishing the proceedings.)

Demos
Demonstrations can be used to show new or updated development efforts. Demo submissions should consist of a 2 page abstract.

Posters
Posters can be used to describe work in progress or updates to previously published VizSEC research or R&D. Poster submissions should consist of a 2 page abstract.

Deadlines
April 11, 2008 : Deadline for full paper submission
May 9, 2008 : Deadline for short paper submissions
July 11, 2008 : Deadline for poster and demo abstracts

http://vizsec.org/workshop2008/