Applications of Educational Data Mining and Learning Analytics on Data
From Cybersecurity Training
- URL: http://arxiv.org/abs/2307.08582v1
- Date: Thu, 13 Jul 2023 19:05:17 GMT
- Title: Applications of Educational Data Mining and Learning Analytics on Data
From Cybersecurity Training
- Authors: Valdemar \v{S}v\'abensk\'y, Jan Vykopal, Pavel \v{C}eleda, Lydia Kraus
- Abstract summary: This paper surveys publications that enhance cybersecurity education by leveraging trainee-generated data from interactive learning environments.
We identified and examined 3021 papers, ultimately selecting 35 articles for a detailed review.
Our contribution is a systematic literature review of relevant papers and their categorization according to the collected data, analysis methods, and application contexts.
- Score: 0.5735035463793008
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cybersecurity professionals need hands-on training to prepare for managing
the current advanced cyber threats. To practice cybersecurity skills, training
participants use numerous software tools in computer-supported interactive
learning environments to perform offensive or defensive actions. The
interaction involves typing commands, communicating over the network, and
engaging with the training environment. The training artifacts (data resulting
from this interaction) can be highly beneficial in educational research. For
example, in cybersecurity education, they provide insights into the trainees'
learning processes and support effective learning interventions. However, this
research area is not yet well-understood. Therefore, this paper surveys
publications that enhance cybersecurity education by leveraging
trainee-generated data from interactive learning environments. We identified
and examined 3021 papers, ultimately selecting 35 articles for a detailed
review. First, we investigated which data are employed in which areas of
cybersecurity training, how, and why. Second, we examined the applications and
impact of research in this area, and third, we explored the community of
researchers. Our contribution is a systematic literature review of relevant
papers and their categorization according to the collected data, analysis
methods, and application contexts. These results provide researchers,
developers, and educators with an original perspective on this emerging topic.
To motivate further research, we identify trends and gaps, propose ideas for
future work, and present practical recommendations. Overall, this paper
provides in-depth insight into the recently growing research on collecting and
analyzing data from hands-on training in security contexts.
Related papers
- Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments [0.37729165787434493]
This paper develops automated tools to predict when a student is having difficulty.
In a potential application, such models can aid instructors in detecting struggling students and providing targeted help.
arXiv Detail & Related papers (2024-08-16T04:57:54Z) - Research and Practice of Delivering Tabletop Exercises [0.2796197251957245]
Since tabletop exercises train competencies required in the workplace, they have been introduced into computing courses at universities as an innovation.
To help computing educators adopt this innovative method, we surveyed academic publications that deal with tabletop exercises.
Our review provides researchers, tool developers, and educators with an orientation in the area, a synthesis of trends, and implications for further work.
arXiv Detail & Related papers (2024-04-16T01:12:20Z) - Combatting Human Trafficking in the Cyberspace: A Natural Language
Processing-Based Methodology to Analyze the Language in Online Advertisements [55.2480439325792]
This project tackles the pressing issue of human trafficking in online C2C marketplaces through advanced Natural Language Processing (NLP) techniques.
We introduce a novel methodology for generating pseudo-labeled datasets with minimal supervision, serving as a rich resource for training state-of-the-art NLP models.
A key contribution is the implementation of an interpretability framework using Integrated Gradients, providing explainable insights crucial for law enforcement.
arXiv Detail & Related papers (2023-11-22T02:45:01Z) - Systemization of Knowledge (SoK)- Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives [25.181087776375914]
This paper presents a comprehensive survey of transfer learning applications in cybersecurity.
The survey highlights the significance of transfer learning in addressing critical issues in cybersecurity.
The paper identifies future research directions and challenges that require community attention.
arXiv Detail & Related papers (2023-09-12T00:26:38Z) - Student Assessment in Cybersecurity Training Automated by Pattern Mining
and Clustering [0.5249805590164902]
This paper explores a dataset from 18 cybersecurity training sessions using data mining and machine learning techniques.
We employed pattern mining and clustering to analyze 8834 commands collected from 113 trainees.
Our results show that data mining methods are suitable for analyzing cybersecurity training data.
arXiv Detail & Related papers (2023-07-13T18:52:58Z) - Recent Advancements in Machine Learning For Cybercrime Prediction [2.38324507743994]
This paper aims to comprehensively survey the latest advancements in cybercrime prediction.
We reviewed more than 150 research articles and discussed 50 most recent and appropriate ones.
This paper presents a holistic view of cutting-edge developments and publicly available datasets.
arXiv Detail & Related papers (2023-04-10T19:00:29Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
and Defenses [150.64470864162556]
This work systematically categorizes and discusses a wide range of dataset vulnerabilities and exploits.
In addition to describing various poisoning and backdoor threat models and the relationships among them, we develop their unified taxonomy.
arXiv Detail & Related papers (2020-12-18T22:38:47Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Human Trajectory Forecasting in Crowds: A Deep Learning Perspective [89.4600982169]
We present an in-depth analysis of existing deep learning-based methods for modelling social interactions.
We propose two knowledge-based data-driven methods to effectively capture these social interactions.
We develop a large scale interaction-centric benchmark TrajNet++, a significant yet missing component in the field of human trajectory forecasting.
arXiv Detail & Related papers (2020-07-07T17:19:56Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.