1st International Workshop on Self-Protecting Systems

SPS 2019


Computer Security & Cryptography Security & Trust & Testing



1st IEEE International Workshop on Self-Protecting Systems
in conjunction with IEEE International Conference on Autonomic Computing
(ICAC 2019) and 13th International Conference on Self-Adaptive and
Self-Organizing Systems (SASO 2019)
June 16 - 20, Umeå, Sweden
Web site: https://sites.google.com/view/sps19/
CALL FOR PAPER
Effectively protecting computer systems from cyber-attacks is a
challenging task due to their large scale and the heterogeneity of the
underlying hardware and software components. Furthermore, when trying to
defend from an attack, the time factor is critical and any non-guided
human resolution attempt could introduce a significant stress and delay
to the execution of the proper response. This situation provides the
attackers more time to accomplish their objectives.
Several organizations, including the National Institute of Standards and
Technology (NIST), have released guidelines and best practices to manage
cyber-security related risk (e.g., the NIST Cybersecurity Framework
1.1). However, despite a growing interest in the area in the last 4-5
years, automation of cyber-security operations is still at its early stages.
Automatically defending a computer system encompasses a large number of
activities, that range from data capture, management and analysis, to
automated decision making and automated system operations.
In this workshop, we solicit high quality contributions that fit with
the overarching idea of creating a fully automated protection system
based on the Monitor, Analyze, Plan, Execute (MAPE) loop for autonomic
systems. The aim of the workshop is to share new findings, exchange
ideas and discuss research challenges on the following topics (not an
exhaustive list):
- Monitor
|- Distributed and secure data collection and storage
|- Automated Feature Selection approaches to reduce data
dimensionality on cyber-security relevant data
- Analyze
|- Techniques for automatic correlation of data streams
|- Self-Evolving Anomaly-Based and Signature-Based Network/Host
Intrusion Detection Systems
|- Attack and defense modeling for threats detection and risk management
- Plan
|- Self-Evolving Model-based and Model-free Intrusion response
|- Attack and defense modeling for reactive and proactive intrusion
response
- Execute
|- Implementation of prototypes that integrate cutting edge
technologies, e.g., Software Defined Networks, Container-Based systems,
applications based on micro-services
Furthermore, we solicit submissions that examine the self-protection
problem from an holistic perspective, that is, that will consider the
overall picture and propose novel software architectures, frameworks and
technologies to ease the realization of self-protecting systems.
DEADLINES
Paper submission: March 15th, 2019 (strict)
Acceptance notification: April 15th, 2019
Camera-ready papers: April 20th, 2019
CO-CHAIRS
Emiliano Casalicchio, Sapienza University of Rome, Italy and Blekinge
Institute of Technology, Sweden
Stefano Iannucci, Mississippi State University, MS ,USA
Byron J. Williams, University of Florida, FL, USA