Focus on IDS
Extended deadline: Monday, July 6th. Workshop on the Analysis of System Logs (WASL) 2009 Jul 01 2009 06:40PM
Greg Bronevetsky (greg bronevetsky com)
Due to multiple requests, the paper submission deadline for the Workshop
on the
Analysis of System Logs has been moved to Monday, July 6th.

Workshop on the Analysis of System Logs (WASL) 2009
http://www.systemloganalysis.com Call for Papers

===============================
October 14, 2009
Big Sky, MT
(at SOSP)
===============================

FULL PAPER SUBMISSION: Monday, July 6th, 2009
AUTHOR NOTIFICATION: Monday, August 3rd, 2009
FINAL PAPERS DUE: Monday, September 14, 2009
------------------------------------------------------------------------
--

System logs contain a wide variety of information about system status
and health,
including events from various applications, daemons and drivers, as well
as sampled
information such as resource utilization statistics. As such, these logs
represent a
rich source of information for the analysis and diagnosis of system
problems and
prediction of future system events. However, their lack of organization
and the general
lack of semantic consistency between information from various software
and hardware
vendors means that most of this information content is wasted. Indeed,
today's
most popular log analysis technique is to use regular expressions to
either detect
events of interest or to filter the log so that a human operator can
examine it manually.
Clearly, this captures only a fraction of the information available in
these logs and
does not scale to the large systems common in business and
supercomputing environments.

This workshop will focus on novel techniques for extracting
operationally useful
information from existing logs and methods to improve the information
content of future
logs. Topics include but are not limited to:
o Reports on publicly available sources of sample log data.
o Log anonymization
o Log feature detection and extraction
o Prediction of malfunction or misuse based on log data
o Statistical techniques to characterize log data
o Applications of Natural-Language Processing (NLP) to logs
o Scalable log compression
o Log comparison techniques
o Methods to enhance astandardize log semantics
o System diagnostic techniques
o Log visualization
o Analysis of services (problem ticket) logs
o Applications of log analysis to system administration

Papers limited to 6 2-column pages using >=10pt font.

Workshop Chair:
Greg Bronevetsky (Lawrence Livermore National Laboratory)
greg (at) bronevetsky (dot) com [email concealed]

Program Committee:
Jon Stearley, Sandia National Laboratory
Bianca Schroeder, University of Toronto
Sébastien Tricaud, INL
Sapan Bhatia, Princeton University
Risto Vaarandi, CCD CoE
Jim Jansen, Penn State University
Wei Xu, University of California, Berkeley
Anton Chuvakin, Qualys
Hugh Njemanze, ArcSight
Kara Nance, University of Alaska, Fairbanks
Raffael Marty, PixlCloud

-----------------------------------------------------------------
Securing Your Online Data Transfer with SSL.
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a
17f194

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus