Cargando…

Student assessment in cybersecurity training automated by pattern mining and clustering

Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During...

Descripción completa

Detalles Bibliográficos
Autores principales: Švábenský, Valdemar, Vykopal, Jan, Čeleda, Pavel, Tkáčik, Kristián, Popovič, Daniel
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8964927/
https://www.ncbi.nlm.nih.gov/pubmed/35370440
http://dx.doi.org/10.1007/s10639-022-10954-4
_version_ 1784678318762622976
author Švábenský, Valdemar
Vykopal, Jan
Čeleda, Pavel
Tkáčik, Kristián
Popovič, Daniel
author_facet Švábenský, Valdemar
Vykopal, Jan
Čeleda, Pavel
Tkáčik, Kristián
Popovič, Daniel
author_sort Švábenský, Valdemar
collection PubMed
description Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows collecting data about trainees’ interactions with the environment, such as their usage of command-line tools. These data contain patterns indicative of trainees’ learning processes, and revealing them allows to assess the trainees and provide feedback to help them learn. However, automated analysis of these data is challenging. The training tasks feature complex problem-solving, and many different solution approaches are possible. Moreover, the trainees generate vast amounts of interaction data. This paper explores a dataset from 18 cybersecurity training sessions using data mining and machine learning techniques. We employed pattern mining and clustering to analyze 8834 commands collected from 113 trainees, revealing their typical behavior, mistakes, solution strategies, and difficult training stages. Pattern mining proved suitable in capturing timing information and tool usage frequency. Clustering underlined that many trainees often face the same issues, which can be addressed by targeted scaffolding. Our results show that data mining methods are suitable for analyzing cybersecurity training data. Educational researchers and practitioners can apply these methods in their contexts to assess trainees, support them, and improve the training design. Artifacts associated with this research are publicly available.
format Online
Article
Text
id pubmed-8964927
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-89649272022-03-30 Student assessment in cybersecurity training automated by pattern mining and clustering Švábenský, Valdemar Vykopal, Jan Čeleda, Pavel Tkáčik, Kristián Popovič, Daniel Educ Inf Technol (Dordr) Article Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows collecting data about trainees’ interactions with the environment, such as their usage of command-line tools. These data contain patterns indicative of trainees’ learning processes, and revealing them allows to assess the trainees and provide feedback to help them learn. However, automated analysis of these data is challenging. The training tasks feature complex problem-solving, and many different solution approaches are possible. Moreover, the trainees generate vast amounts of interaction data. This paper explores a dataset from 18 cybersecurity training sessions using data mining and machine learning techniques. We employed pattern mining and clustering to analyze 8834 commands collected from 113 trainees, revealing their typical behavior, mistakes, solution strategies, and difficult training stages. Pattern mining proved suitable in capturing timing information and tool usage frequency. Clustering underlined that many trainees often face the same issues, which can be addressed by targeted scaffolding. Our results show that data mining methods are suitable for analyzing cybersecurity training data. Educational researchers and practitioners can apply these methods in their contexts to assess trainees, support them, and improve the training design. Artifacts associated with this research are publicly available. Springer US 2022-03-30 2022 /pmc/articles/PMC8964927/ /pubmed/35370440 http://dx.doi.org/10.1007/s10639-022-10954-4 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Švábenský, Valdemar
Vykopal, Jan
Čeleda, Pavel
Tkáčik, Kristián
Popovič, Daniel
Student assessment in cybersecurity training automated by pattern mining and clustering
title Student assessment in cybersecurity training automated by pattern mining and clustering
title_full Student assessment in cybersecurity training automated by pattern mining and clustering
title_fullStr Student assessment in cybersecurity training automated by pattern mining and clustering
title_full_unstemmed Student assessment in cybersecurity training automated by pattern mining and clustering
title_short Student assessment in cybersecurity training automated by pattern mining and clustering
title_sort student assessment in cybersecurity training automated by pattern mining and clustering
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8964927/
https://www.ncbi.nlm.nih.gov/pubmed/35370440
http://dx.doi.org/10.1007/s10639-022-10954-4
work_keys_str_mv AT svabenskyvaldemar studentassessmentincybersecuritytrainingautomatedbypatternminingandclustering
AT vykopaljan studentassessmentincybersecuritytrainingautomatedbypatternminingandclustering
AT celedapavel studentassessmentincybersecuritytrainingautomatedbypatternminingandclustering
AT tkacikkristian studentassessmentincybersecuritytrainingautomatedbypatternminingandclustering
AT popovicdaniel studentassessmentincybersecuritytrainingautomatedbypatternminingandclustering