Search In this Thesis
   Search In this Thesis  
العنوان
Intrusion detection in a war game web based application
الناشر
Ashraf Farouk Tammam
المؤلف
Tammam,Ashraf Farouk
هيئة الاعداد
باحث / أشرف فاروق تمام
مشرف / اسماعيل عبد الغفار فرج
مشرف / أحمد مصطفى الشربينى
مناقش / حسين اسماعيل شاهين
مناقش / ياسر هشام دكرورى
الموضوع
Intermet world wide web
تاريخ النشر
2004
عدد الصفحات
114p.
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2004
مكان الإجازة
جامعة عين شمس - كلية الهندسة - حايبات ونظم
الفهرس
Only 14 pages are availabe for public view

from 164

from 164

Abstract

,t
1
The World Wide Web (WWW) is a critical enabling technology for
electronic commerce, building application and business on the Internet.
Its basic protocol, HTTP (Hyper Text Transfer Protocol), has been widely
used for building different technologies and components for great effect
in web environments.
War game is one of the most important military applications, which
is used for training commanders. Carrying out war game on the web will
solve many problems existing in the typical war game system but it
needs a strong security mechanism.
In this research, we search in how to export the war game system
to the web and how to secure it using a combination of security tools and
mechanisms. Our research focuses on Intrusion Detection (10)
implementation since some computer security breaches cannot be
prevented using access and information flow control techniques. These
breaches may be a consequence of system software bugs, hardware or
software failures, incorrect system administration procedures, or failure
of the system authentication module. 10 techniques can have a
significant role in the detection of computer abuse in such cases.
We introduced building of Effective Adaptive Extensive Intrusion
Detection System (EAEIDS). Using EAEIDS, raw audit data is first
preprocessed into connection records with a set of intrinsic features.
Then, classification rules are inductively learned from audit records
using Genetic Programming (GP). These classification rules with the
support of the administrator defined misuse rules can be used together
as 10 models. A critical requirement for the rules to be effective detection
models is that an appropriate set of features needs to be first
constructed and included in the audit records using data mining.
The effectiveness and advantages of our algorithms have been
objectively evaluated using the 1999 DARPA data set.
d