ACM SIGCOMM 2007 Workshop on Large-Scale Attack Defense (LSAD)August 27, 2007 Kyoto, Japan Call For Papers

The paper submission deadline is extended to April 28.

Motivation and rationale for the workshop:

Network Security and attack mitigation is one of the most frequently discussed topics in today's communication research.
Unfortunately, the research in this field is done by two separate communities: the communication research community and the security research community. The goal of this workshop is to unite these two communities and mutually inform each other about topics that are currently discussed in each of the groups.


Monday August 27
9:00 - 10:30 Session 1: Denial of Service
Power to the People: Securing the Internet One-Edge at a Time pdf_logo.gif

Soon Hin Khor (University of Tokyo, JP)
Nicolas Christin (Carnegie Mellon University, US and JP)
Tina Wong (Carnegie Mellon University, US)
Akihiro Nakao (University of Tokyo, JP)

Minimizing Collateral Damage by Proactive Surge Protection pdf_logo.gif

Jerry Chou (University of California at San Diego, US)
Bill Lin (University of California at San Diego, US)
Subhabrata Sen (AT&T Labs, US)
Oliver Spatscheck (AT&T Labs, US)

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations pdf_logo.gif

Jelena Mirkovic (University of Delaware, US)
Maitreya Natu (University of Delaware, US)

10:30 - 11:00 Break
11:00 - 12:00 Session 2: Social Networks
Adaptive E-mail Intention Finding Mechanism based on E-mail Words Social Networks pdf_logo.gif

Che-Fu Yeh (National Taiwan University of Science and Technology, TW)

Davis Social Links: Integrating Social Networks with Internet Routing pdf_logo.gif

Lerone Banks (The University of California, Davis, US)
Shaozhi Ye (The University of California, Davis, US)
Felix Wu (University of California, Davis, US)

12:00 - 13:30 Lunch
13:30 - 15:00 Session 3: Intrusion Detection and Prevention
Security against probe-response attacks in collaborative intrusion detection pdf_logo.gif

Vitaly Shmatikov (UT Austin, US)

Tracking Port Scanners on the IP Backbone pdf_logo.gif

Avinash Sridharan (University of Southern California, US)
Tao Ye (Sprint ATL, US)

Extracting hidden anomalies using Sketch and non Gaussian Multiresolution Statistical Detection pdf_logo.gif

Guillaume Dewaele (ENS Lyon, FR)
Kensuke Fukuda (National Institute of Informatics, JP)
Pierre Borgnat (ENS Lyon, FR)
Patrice Abry (Ecole Normale Superieure, Lyon, FR)
Kenjiro Cho (IIJ, JP)

15:00 - 15:30 Break
15:30 - 16:30 Session 4: DNS, Workshop Concluding Remarks
Zone State Revocation for DNSSEC pdf_logo.gif

Eric Osterweil (UCLA, US)
Vasileios Pappas (IBM Research, US)
Daniel Massey (Colorado State University, US)
Lixia Zhang (University of California at Los Angeles, US)

Large Scale Attack-Defense: Workshop Concluding Remarks

H. Imai (Chuo University, JP)
G. Kesidis (Penn State, US)

17:00 Reception

Technical Area:

In recent years, we have seen an increasing number of large-scale attacks, such as severe worms and DDoS attacks, threatening our systems and networks. Especially, fast spreading attacks present a serious challenge to today's attack defense systems. Speed, frequency, and damage potential of these attacks call for automated response systems. Research in automated defense systems for Internet-wide attacks is focused on large-scale monitoring infrastructures, such as network telescopes and honeynets; intrusion detection approaches, such as memory tainting, network anomaly detection; automated defense strategies, such as signature generation distribution; and identification and analysis of future threats, such as obfuscation methods and novel spreading techniques. The goal of this second SIGCOMM LSAD workshop is to explore new directions in monitoring, analysis, and automated defense systems for existing and future large-scale attacks. We invite experts from academia and industry, to discuss and exchange ideas in a broad range of topics. We are soliciting original papers on topics (including, but not limited to) listed below.

Of particular interest are (i) new solution techniques as well as evaluation of existing approaches, (ii) experiences with monitoring and countermeasures, and (iii) analysis of current and future threats. The workshop will provide a forum for exchange of ideas, challenges, and work-in-progress discussions.

Submission Instructions:

Submissions must be no greater than 8 pages in length, must be a pdf file, and must follow the formatting guidelines at Submissions that deviate from these guidelines will be rejected without consideration. Reviews will be single-blind: authors name and affiliation should be included in the submission. Papers may be submitted at the following URL in four steps:

1. Create a personal account on EDAS (if the author does not already have one) and log into EDAS.
2. Click on the "Submit paper" tab and choose LSAD'07 from from the list.
3. Register the paper (requires a short abstract of up to 150 words).
4. Upload the paper, again only in pdf format.

For help with EDAS please contact the EDAS

Authors of accepted papers are expected to present their papers at the workshop. Submissions must be original work not under review at any other workshop, conference, or journal.

Important Dates:

Technical Program Committee:

Hideki Imai co-chair, Chuo University h-imai
George Kesidis co-chair, Penn State kesidis
Yair Amir Johns Hopkins University
Eric Chen NTT, Japan
Marc Dacier Eurecom, France
Herve Debar France Telecom R&D
Thomas Duebendorfer Google, Switzerland
Sonia Fahmy Purdue University
Teruo Higashino Osaka University
Angelos Keromytis Columbia University
John C.S. Lui Chinese University of Hong Kong
Kanta Matsuura University of Tokyo
Martin May ETH Zurich
Refik Molva Eurecom, France
Philippe Owezarski LAAS-CNRS, France
Niels Provos Google
Shiuhpying Shieh National Chiao Tung University, Taiwan
Hitoshi Tanuma AIST, Japan
Ke Xu Tshinghua University, Beijing, China
Nicholas Weaver ICSI Berkeley
Felix Wu University of California at Davis
Sungwon Yi ETRI, Korea