Tuesday,
March 19, 2002 - Morning |
|
|
|
|
8:00 - 8:30 am |
Breakfast |
|
|
8:30 - 8:45 am |
Welcome & Introductory Notes |
|
Anthony Pressley (ARL) & Dr. Vipin
Kumar (AHPCRC-U of Minnesota) |
|
|
|
|
Session 1 - Overview
Talks |
|
|
|
|
8:45 - 9:15 am |
Keynote Address |
|
Dr. N. Radhakrishnan Director,
Computational & Information Sciences Directorate Army Research
Laboratory |
|
|
9:45 - 10:15 am |
Unintentional Consequences of IDS Technology |
|
Dr. Robert Gorrie Deputy
Director, Defense-Wide Information Assurance Program (ASD) C3l |
|
|
10:15 - 10:45 am |
Break |
|
|
|
|
Session 2 -Overview
Talks (Cont.) |
|
|
|
|
10:45 - 11:00 am |
S & T View of IDS |
|
Dr. Eric W. Landree AAAS/DoD S & T
Policy Fellow ODUSD (S & T) Information Systems
Directorate |
|
|
11:00 - 11:15 am |
ARL Information Assurance
Center and the Center for Intrusion Monitoring & Protection |
|
Anthony Pressley (ARL) |
|
|
11:15 - 11:45 am |
Where are the Nuggets in
Network Audit Data? |
|
Dr. Wenke Lee (Georgia
Tech) |
|
|
11:45 - 12:15 pm |
The Usefulness of Network
Intrusion Detection |
|
Dr. Richard Lippmann (MIT-Lincoln
Laboratory) |
|
|
12:15 - 1:30 pm |
Lunch |
|
|
|
|
Tuesday,
March 19, 2002 - Afternoon |
|
|
|
|
Session
3 - Modeling Intrusion Detection Systems |
|
|
|
|
1:30 - 2:00 pm |
Designing a Web of
Highly-Configurable Intrusion Detection Sensors |
|
Dr. Dick Kemmerer (U of
California-Santa Barbara) |
|
|
2:00 - 2:30 pm |
Real Time Intrusion Detection
in High-Speed Data Streams |
|
Dr. Joao B.D. Cabrera (Scientific
Systems Company) |
|
|
2:30 - 3:00 pm |
Lightweight Anomaly Detection |
|
Hajime (Jim) Inoue (U of
New Mexico) |
|
|
3:00 - 3:30 pm |
Break |
|
|
|
|
Session
4 - Data Mining Strategies in Intrusion Detection |
|
|
|
|
3:30 - 4:00 pm |
Data Mining for Network
Intrusion Detection: Experience with KDD '99 Cup Data |
|
Dr. Vipin Kumar (AHPCRC-U
of Minnesota) |
|
|
4:00 - 4:30 pm |
The ADAM Project at GMU: A
Testbed for Data Mining in Intrusion Detection |
|
Dr. Daniel Barbara (George
Mason U) |
|
|
4:30 - 5:00 pm |
Intrusion Detection Research
Using Fuzzy Data Mining and Applied Within a High Performance
Computing Environment |
|
Dr. Susan M. Bridges (Mississippi
State U) |
|
Decision Making for an
Intelligent Intrusion Detection System |
|
Ambareen Siraj (Mississippi
State U) |
|
|
|
|
Wednesday,
March 20, 2002 - Morning |
|
|
|
|
8:00 - 8:30 am |
Breakfast |
|
|
|
|
Session
5 - Applications of Data Mining in Intrusion Detection |
|
|
|
|
8:30 - 9:00 am |
Data Mining Techniques to
Improve Intrusion Detection |
|
Dave DeBarr & Brian
Caswell (MITRE) |
|
|
9:00 - 9:30 am |
Masquerade Detection |
|
Dr. Roy A. Maxion
(Carnegie Mellon U) |
|
|
9:30 - 10:00 am |
PCA for Network Intrusion
Detection |
|
Phil Goetz (Intelligent
Automation, Inc.) |
|
|
10:00 - 10:30 am |
Break |
|
|
|
|
Session
6 - Intrusion Detection in Military Specific Environments |
|
|
|
|
10: 30 - 11:00 am |
Modeling Military Systems |
|
COL John James, PhD (West
Point) |
|
|
11:00 - 11:30 am |
Distributed Intrusion
Detection in Software Decoys |
|
Dr. Neil Rowe (Naval
Postgraduate School) |
|
|
11:30 - 12:00 pm |
Intrusion Detection Technology
for the Lower Tactical Internet |
|
William Blackert (Johns
Hopkins U) |
|
|
12:00 - 1:30 pm |
Lunch |
|
|
1:30 - 3:00 pm |
Panel Discussion: The State of
the Art of Intrusion Detection and Future Directions |
|
|
3:00 pm |
Closing Remarks |