![]() | Only 14 pages are availabe for public view |
Abstract ,t 1 The World Wide Web (WWW) is a critical enabling technology for electronic commerce, building application and business on the Internet. Its basic protocol, HTTP (Hyper Text Transfer Protocol), has been widely used for building different technologies and components for great effect in web environments. War game is one of the most important military applications, which is used for training commanders. Carrying out war game on the web will solve many problems existing in the typical war game system but it needs a strong security mechanism. In this research, we search in how to export the war game system to the web and how to secure it using a combination of security tools and mechanisms. Our research focuses on Intrusion Detection (10) implementation since some computer security breaches cannot be prevented using access and information flow control techniques. These breaches may be a consequence of system software bugs, hardware or software failures, incorrect system administration procedures, or failure of the system authentication module. 10 techniques can have a significant role in the detection of computer abuse in such cases. We introduced building of Effective Adaptive Extensive Intrusion Detection System (EAEIDS). Using EAEIDS, raw audit data is first preprocessed into connection records with a set of intrinsic features. Then, classification rules are inductively learned from audit records using Genetic Programming (GP). These classification rules with the support of the administrator defined misuse rules can be used together as 10 models. A critical requirement for the rules to be effective detection models is that an appropriate set of features needs to be first constructed and included in the audit records using data mining. The effectiveness and advantages of our algorithms have been objectively evaluated using the 1999 DARPA data set. d |