Abstract
The recent development of the computer network technology has brought us many benefits including the electronic business. But also, one serious side effect is the explosive increase of the unauthorized computer access, and it becomes a big social problem. Of course, there are many security solutions in the market, but they cannot stop such intrusions or reduce the damages resulting from such accident. Besides, the protection of the system requires significant amount of the budget. Therefore, we need to think of minimizing damages or avoiding from the intrusions. One possible solution might be providing a training system to the system managers who are in charge of maintaining and protecting the servers. In this paper, we are suggesting a simulated security training system in the virtual learning environment. The system is being built based on the ITS structure primarily, and mainly focused on providing the simulated security exercises adaptively. For instance, since the system maintains the solution paths, the student’s problem solving steps are monitored and being interrupted with advising messages when necessary. It is designed as a client/server environment, so the student needs only the web browser to access the system. And the student can execute the selected task in the Java applet-based virtual OS environment according to the learning scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, D., Frivold, T., and Valdes, A.: Next-generation intrusion-detection expert system(NIDES). Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA (1995).
Alpert, S., Singley, K., and Fairweather, P.: Porting a Standalone Intelligent Tutoring System on the Web. Proceedings of ITS’2000 workshop (2000) 1–11.
CERT Advisory CA-1991-18 Active Internet ftp Attacks, http://www.cert.org/advisories/CA-1991-18.html
Farmer, D., and Spafford, E. H.: The COPS Security Checker System. Proceedings of the Summer USENIX Conference (1990) 165–170.
Garvey, T., and Lunt, T.: Model based intrusion detection, Proceedings of the 18th National Information Security Conference. (1995) 372–385.
Kumar, S.: Classification and Detection of Computer Intrusions. PhD thesis, Purdue University (1995)
Lunt, T.: Automated Audit Trail Analysis and Intrusion Detection: A Survey. Proceedings of the 11th National Computer Security Conference (1988) 74–81.
Nakabayashi, K., Maruyama, M., Koike, Y., Kato, Y., Touhei, H., and Fukuhara, Y.: Architecture of an Intelligent Tutoring System on the WWW, Proceedings of AI-ED’97. (1997) 39–46.
Rowe, N. C. and Schiavo, S.: An Intelligent Tutor for Intrusion Detection on Computer Systems. Computers and Education (1998) 395–404.
Understanding system log files on a Solaris 2.x operating system, http://www.cert.org/security-improvement/implementations/i041.12.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Woo, Cw., Choi, Jw. (2002). Web-Based Tutoring System for Computer Security. In: Ishizuka, M., Sattar, A. (eds) PRICAI 2002: Trends in Artificial Intelligence. PRICAI 2002. Lecture Notes in Computer Science(), vol 2417. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45683-X_56
Download citation
DOI: https://doi.org/10.1007/3-540-45683-X_56
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44038-3
Online ISBN: 978-3-540-45683-4
eBook Packages: Springer Book Archive