Abstract
Recently, unauthorized computer access has become becomes a big social problem. Of course, there are many commercial solutions for protecting systems against the intruder. But mostly we tend to rely on the system manager’s field experience for maintaining the system. Therefore, the manager needs to keep up with the existing knowledge, along with any new threats. In the research described here, we have designed and implemented a simulated training environment to combat computer intrusions. The system begins with a menu outlining a curriculum focused on UNIX security, which is generated from the knowledge base dynamically. The selected topic (a goal) from the curriculum is then expanded into several missions (subgoals). The student can complete each mission by entering a sequence of UNIX commands that together provide an appropriate solution to the problem at hand. Since the system keeps track of the solution paths, the student’s problem solving steps can easily be monitored and interrupted with appropriate hints, as needed. The tutor is designed as a client/server system, so the student needs only a web browser to access the system. Moreover, the student can manipulate the tasks in this virtual OS environment, according to the learning scenario.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Alpert, S., Singley, K., and Fairweather, P.: Porting a Standalone Intelligent Tutoring System on the Web. Proceedings of ITS’2000 workshop (2000) 1–11.
Balasubramaniyan, S., Garcia-Fermandez, O., Isacoff, D., Spafford, E., and Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. Technical Report 98-05, COAST Laboratory, Purdue University, West Lafayette, In 47907-1398 (1998).
Brusilovsky, P., Eklund, J., and Schwarz, E.: Web-based education for all: A tool for developing adaptive courseware. The Proceedings of the 7th WWW conference (1998) 291–300.
Farmer, D., and Spafford, E. H.: The COPS Security Checker System. In Proceedings of the Summer USENIX Conference (1990) 165–170.
Hume, G., Michael, J., Rovick, A., and Evens, M.: Hinting as a tactic in one-on-one tutoring. The Journal of Learning Sciences, 5(1) (1996) 23–47.
Kumar, S.: Classification and Detection of Computer Intrusions. PhD thesis, Purdue University (1995)
Reddy, Y., Fox, M., Hussain, N., and McRoberts, M.: The Knowledge-based Simulation System. IEEE Software, Vol 3. No. 2 (1986) 26–37.
Rowe, N. C. and Schiavo, S.: An Intelligent Tutor for Intrusion Detection on Computer Systems. Computers and Education (1998) 395–404.
Sebring, M., Shellhouse, E., Hanna, M. and Whitehurst, R.: Expert Systems in Intrusion Detection: A Case Study. Proceedings of the 11th National Computer Security Conference (1988) 74–81.
Shannon, R. E.: Introduction to Simulation. Proceedings of the 1992 Winter Simulation Conference (1992) 65–73.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Woo, Cw., Choi, Jw., Evens, M. (2002). Web-Based ITS for Training System Managers on the Computer Intrusion. In: Cerri, S.A., Gouardères, G., Paraguaçu, F. (eds) Intelligent Tutoring Systems. ITS 2002. Lecture Notes in Computer Science, vol 2363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47987-2_35
Download citation
DOI: https://doi.org/10.1007/3-540-47987-2_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43750-5
Online ISBN: 978-3-540-47987-1
eBook Packages: Springer Book Archive