Special Session on Novel Technologies for Intrusion DetectionSpecial Session on Novel Technologies for Intrusion Detectionat the Third International Conference on Emerging Security Technologies (EST-2012)September 6, 2012Lisbon, PortugalChairs:Nacira Ghoualmi-Zine and Hassina BensefiaNetworks and Systems LaboratoryBadji Mokhtar University, AlgeriaCALL FOR PAPERSIntrusion Detection Systems (IDS) are defense systems dedicated to permanent inspection of computing environments, information technology (IT) infrastructure and related assets, such as networks, hosts, databases, application and information servers. Their objective consists of identifying ongoing attacks in real time and establishing an active or passive response in order to prevent successful attacks. Intrusion Detection (ID) is an active research area in the field of computer security that has long influenced ID technology results and prototypes. However, current ID technology often does not mature fully because of constant changes in computing environments and the general evolution of information technology. Today’s intrusion detection system capabilities are challenged by the increasing frequency of creative attacks, changing network topologies, complex designs of high speed networks and their technological diversity, heterogeneous and distributed systems, dynamic nature of applications, mobile code (e.g., Java applets, ActiveX objects, etc), as well as data encryption. These challenges make it difficult to operate standard IDS effectively in these dynamic, complex environments. Many improvements, from different perspectives, should be considered in IDS technology, so that the challenging nature of the requirements for the current and future computing environments can be accommodated. Promising methodologies and technologies are required for the design and development of effective IDS. New IDS features and functionalities are proposed, but still need validation in a real-time configuration using case scenarios. This special session will address issues and approaches covering the new intrusion detection technologies, including, but not limited to, the following topics:•Application based IDS•Artificial Intelligence based IDS•Attack signatures recognition•Cooperative Intrusion Detection•Data Mining based IDS•Fusion based IDS•Game Theory based IDS•IDS interoperability•IDS self-adaptation•IDS self-protection•Machine Learning based IDS•Real time intrusion detection•Scalability of intrusion detection architectures•Wireless based IDSIMPORTANT DATESDeadline for paper submission:April 30, 2012Notification of acceptance:May 15, 2012Final manuscript submission:June 31, 2012Papers are due on April 25, 2012, and should be 4 pages long in the CPS two-column styled format. Publication templates are available for LaTeX and MS Word. For paper instructions and submission, please visit the conference website at http://www.est-2012.info/submissions.htm. Workshop papers will be submitted, reviewed, and published in the same way as regular conference papers. VENUEThe workshop will take place at Hotel Sofitel Lisbon Liberdade, Lisbon, Portugal, on September 6, in association with the Third International Conference on Emerging Security Technologies, which will take place at the same venue, from September 5th to the 7th, 2012.