Workshops & Conferences Home

Workshop Description

Workshop Schedule

Attendees (Partial)

Poster (html)

Further Information


 

Workshop on

    

March 19 - 20, 2002

 

Workshop Schedule

Tuesday, March 19, 2002 - Morning
       
             
8:00 - 8:30 am Breakfast
   
8:30 - 8:45 am Welcome & Introductory Notes
  Anthony Pressley (ARL)
& Dr. Vipin Kumar (AHPCRC-U of Minnesota)
               
                
Session 1 - Overview Talks
              
             
8:45 - 9:15 am Keynote Address
Dr. N. Radhakrishnan
Director, Computational & Information Sciences Directorate
Army Research Laboratory
            
9:45 - 10:15 am Unintentional Consequences of IDS Technology
  Dr. Robert Gorrie
Deputy Director, Defense-Wide Information Assurance Program (ASD) C3l
   
10:15 - 10:45 am Break
             
             
Session 2 -Overview Talks (Cont.)
           
           
10:45 - 11:00 am S & T View of IDS
  Dr. Eric W. Landree
AAAS/DoD S & T Policy Fellow
ODUSD (S & T)
Information Systems Directorate
        
11:00 - 11:15 am ARL Information Assurance Center and the Center for Intrusion Monitoring & Protection
Anthony Pressley (ARL)
                  
11:15 - 11:45 am Where are the Nuggets in Network Audit Data?
  Dr. Wenke Lee (Georgia Tech)
   
11:45 - 12:15 pm The Usefulness of Network Intrusion Detection
Dr. Richard Lippmann (MIT-Lincoln Laboratory)
         
12:15 - 1:30 pm Lunch
           
          
Tuesday, March 19, 2002 - Afternoon
                                                
                                            
Session 3 - Modeling Intrusion Detection Systems
                                             
                                       
1:30 - 2:00 pm Designing a Web of Highly-Configurable Intrusion Detection Sensors
Dr. Dick Kemmerer (U of California-Santa Barbara)
        
2:00 - 2:30 pm Real Time Intrusion Detection in High-Speed Data Streams
Dr. Joao B.D. Cabrera (Scientific Systems Company)
     
2:30 - 3:00 pm Lightweight Anomaly Detection
Hajime (Jim) Inoue (U of New Mexico)
            
3:00 - 3:30 pm Break
     
          
Session 4 - Data Mining Strategies in Intrusion Detection
     
     
3:30 - 4:00 pm Data Mining for Network Intrusion Detection: Experience with KDD '99 Cup Data
Dr. Vipin Kumar (AHPCRC-U of Minnesota)
       
4:00 - 4:30 pm The ADAM Project at GMU: A Testbed for Data Mining in Intrusion Detection
Dr. Daniel Barbara (George Mason U)
     
4:30 - 5:00 pm Intrusion Detection Research Using Fuzzy Data Mining and Applied Within a High Performance Computing Environment
Dr. Susan M. Bridges (Mississippi State U)
Decision Making for an Intelligent Intrusion Detection System
Ambareen Siraj (Mississippi State U)
     
     
Wednesday, March 20, 2002 - Morning
     
     
8:00 - 8:30 am Breakfast
     
Session 5 - Applications of Data Mining in Intrusion Detection
         
         
8:30 - 9:00 am Data Mining Techniques to Improve Intrusion Detection
Dave DeBarr & Brian Caswell (MITRE)
     
9:00 - 9:30 am Masquerade Detection
Dr. Roy A. Maxion (Carnegie Mellon U)
     
9:30 - 10:00 am PCA for Network Intrusion Detection
Phil Goetz (Intelligent Automation, Inc.)
     
10:00 - 10:30 am  Break
             
             
Session 6 - Intrusion Detection in Military Specific Environments
         
         
10: 30 - 11:00 am Modeling Military Systems
COL John James, PhD (West Point)
     
11:00 - 11:30 am Distributed Intrusion Detection in Software Decoys
Dr. Neil Rowe (Naval Postgraduate School)
     
11:30 - 12:00 pm Intrusion Detection Technology for the Lower Tactical Internet
   William Blackert (Johns Hopkins U)
     
12:00 - 1:30 pm Lunch
     
1:30 - 3:00 pm Panel Discussion: The State of the Art of Intrusion Detection and Future Directions
     
3:00 pm Closing Remarks