Show simple item record

dc.contributor.authorRowe, Neil C.
dc.contributor.authorSchiavo, Sandra
dc.date.accessioned2012-07-11T15:49:41Z
dc.date.available2012-07-11T15:49:41Z
dc.date.issued1998-00-00
dc.identifier.citationComputers and Education, pp. 395-404, 1998
dc.identifier.urihttp://hdl.handle.net/10945/7188
dc.descriptionComputers and Education, pp. 395-404, 1998en_US
dc.description.abstractIntrusion detection is the process of identifying unauthorized usage of a computer system. It an important skill for computer-system administrators. It is difficult to learn on the job because it is needed only occasionally but can be critical. We describe a tutor incorporating two programs. The first program uses artificial-intelligence planning methods to generate realistic audit files reporting actions of a variety of simulated users (including intruders) of a Unix computer system. The second program simulates the system afterwards, and asks the student to inspect the audit and fix the problems caused by the intruders. This program uses intrusion-recognition rules to itself infer the problems, planning methods to figure how best to fix them, plan-inference methods to track student actions, and tutoring rules to tutor intelligently. Experiments show that students using the tutor learn a significant amount in a short time.en_US
dc.format.extentneeded only occasionally but can be critical. We describe a tutor incorporating two programs. The first program uses artificial-intelligence planning methods to generate realistic audit files reporting actions of a variety of simulated users (including intruders) of a Unix computer system. The second program simulates the system afterwards, and asks the student to inspect the audit and fix the problems caused by the intruders. This program uses intrusion-recognition rules to itself infer the problems, planning methods to figure how best to fix them, plan-inference methods to track student actions, and tutoring rules to tutor intelligently. Experiments show that students using the tutor learn a significant amount in a short time.en_US
dc.publisherComputers and Educationen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleAn Intelligent Tutor for Intrusion Detection on Computer Systemsen_US
dc.typeArticleen_US
dc.contributor.departmentComputer Science (CS)
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record