ABSTRACT
Concept maps are a well-known pedagogical tool for organizing and representing knowledge and developing a deep understanding of concepts. Unfortunately, the grading of concept maps tends to be manual and tedious thereby, posing serious limitation for an instructor to use them in class efficiently. To automate the assessment and grading, the topology and structural features of concept maps are utilized. However, they have never been explored for cybersecurity education. This paper evaluates the effectiveness of topological scoring of the concept maps for two cybersecurity courses: digital forensics, and SCADA system security. We create a dataset of 41 high-quality concept maps developed with expert knowledge. We utilize waterloo rubric to manually validate the quality of the concept maps based-on their contents and further compare the rubric outcome (obtained via manual analysis) with the automated topological scoring of the maps. The evaluation results show that the topological scoring is promising. However, it is not equally effective and warrants for advanced techniques to better utilize the topology of the maps. The dataset is made publicly available for further research on this topic.
- 2016. Rubric for Assessing Concept Maps (Centre for Teaching Excellence, University of Waterloo). https://uwaterloo.ca/ centre-for-teaching-excellence/sites/ca.centre-for-teaching-excellence/ ?les/uploads/?les/rubric for assessing concept maps.pdf. (2016).Google Scholar
- I. Ahmed, S. Obermeier, S. Sudhakaran, and V. Roussev. 2017. Programmable Logic Controller Forensics. IEEE Security Privacy 15, 6 (November 2017), 18--24.Google ScholarDigital Library
- Irfan Ahmed, Golden G. Richard, Aleksandar Zoranic, and Vassil Roussev. 2015. Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection. In Information Security, Yvo Desmedt (Ed.). Springer International Publishing, Cham, 3--19. Google ScholarDigital Library
- Irfan Ahmed and Vassil Roussev. 2018. Peer Instruction Teaching Methodology for Cybersecurity Education. IEEE Security Privacy 16, 4 (July 2018).Google ScholarCross Ref
- Irfan Ahmed, Vassil Roussev, and Aisha Ali Gombe. 2015. Robust Fingerprinting for Relocatable Code. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY '15). ACM, New York, NY, USA, 219--229. Google ScholarDigital Library
- Irfan Ahmed, Vassil Roussev, William Johnson, Saranyan Senthivel, and Sneha Sudhakaran. 2016. A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy. In Proceedings of the 2Nd Annual Industrial Control System Security Workshop (ICSS '16). ACM, New York, NY, USA, 1--9. Google ScholarDigital Library
- Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden Richard, and Vassil Roussev. 2013. Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments. In Advances in Digital Forensics IX, Gilbert Peterson and Sujeet Shenoi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 305--328.Google Scholar
- Williams M. Akinsanya, C. 2004. Concept mapping for meaningful learning. Report. 41--46 pages.Google Scholar
- Sajal Bhatia, Sunny Behal, and Irfan Ahmed. 2018. Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions. Springer International Publishing, Cham, 55--97.Google Scholar
- Manish Bhatt and Irfan Ahmed. 2018. Leveraging relocations in ELF-binaries for Linux kernel version identification. Digital Investigation 26 (2018), S12 -- S20.Google ScholarCross Ref
- Manish Bhatt, Irfan Ahmed, and Zhiqiang Lin. 2018. Using Virtual Machine Introspection for Operating Systems Security Education. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education. ACM, 396--401. Google ScholarDigital Library
- Alberto J Canas, Larry Bunch, Joseph D Novak, and Priit Reiska. 2013. Cmapanalysis: An extensible concept map analysis tool. Journal for Educators, Teachers and Trainers (2013).Google Scholar
- A. Canas. 2003. A Summary of Literature Pertaining to the Use of Concept Mapping Techniques and Technologies for Education and Performance Support. Report.Google Scholar
- Pranita Deshpande and Irfan Ahmed. 2018 (accessed July 23, 2018). Concept Map Datasets for Cybersecurity Courses. https://gitlab.com/iahmed4/ concept-map-datasets-for-cybersecurity-coursesGoogle Scholar
- Pranita Deshpande and Irfan Ahmed. 2019. Evaluation of Peer Instruction for Cybersecurity Education. In Proceeding of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE '19). Google ScholarDigital Library
- J. Dexter. 2002. Th e Cyber Security Management System: A Conceptual Mapping. Report. SANS Institute.Google Scholar
- Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt, and ManPyo Hong. 2018. Automatic Mitigation of Kernel Rootkits in Cloud Environments. In Information Security Applications, Brent ByungHoon Kang and Taesoo Kim (Eds.). Springer International Publishing, Cham, 137--149.Google Scholar
- David Hay, Ian Kinchin, and Simon Lygo-Baker. 2008. Making learning visible: the role of concept mapping in higher education. Studies in Higher Education 33, 3 (2008), 295--311.Google ScholarCross Ref
- Salman Javaid, Aleksandar Zoranic, Irfan Ahmed, and Golden G Richard III. 2012. Atomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment. In Proceedings of the 6th Layered Assurance Workshop (ACSAC'12).Google Scholar
- William Johnson, Irfan Ahmed, Vassil Roussev, and Cynthia B. Lee. 2017. Peer Instruction for Digital Forensics. In 2017 USENIX Workshop on Advances in Security Education (ASE 17). USENIX Association, Vancouver, BC.Google Scholar
- William E. Johnson, Allison Luzader, Irfan Ahmed, Vassil Roussev, Golden G. Richard III, and Cynthia B. Lee. 2016. Development of Peer Instruction questions for Cybersecurity Education. In 2016 USENIX Workshop on Advances in Security Education (ASE 16). USENIX Association, Austin, TX. https: //www.usenix.org/conference/ase16/workshop-program/presentation/johnsonGoogle Scholar
- Paul Kim and Claudia Olaciregui. 2008. The effects of a concept map-based information display in an electronic portfolio system on information processing and retention in a fifth-grade science class covering the Earth's atmosphere. 39, 4 (2008), 700--714.Google ScholarCross Ref
- Vassil Roussev. 2016. Digital forensic science: issues, methods, and challenges. Synthesis Lectures on Information Security, Privacy, & Trust 8, 5 (2016), 1--155. Google ScholarDigital Library
- Vassil Roussev, Irfan Ahmed, and Thomas Sires. 2014. Image-based Kernel Fingerprinting. Digit. Investig. 11, S2 (Aug. 2014), S13--S21. Google ScholarDigital Library
- Vassil Roussev, Andres Barreto, and Irfan Ahmed. 2016. API-Based Forensic Acquisition of Cloud Drives. In Advances in Digital Forensics XII, Gilbert Peterson and Sujeet Shenoi (Eds.). Springer International Publishing, Cham, 213--235.Google Scholar
- Saranyan Senthivel, Irfan Ahmed, and Vassil Roussev. 2017. SCADA network forensics of the PCCC protocol. Digital Investigation 22 (2017), S57 -- S65. Google ScholarDigital Library
- Saranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed, and Vassil Roussev. 2018. Denial of Engineering Operations Attacks in Industrial Control Systems. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (CODASPY '18). ACM, New York, NY, USA, 319--329. Google ScholarDigital Library
- April Tanner and David Dampier. 2009. Concept Mapping for Digital Forensic Investigations. In Advances in Digital Forensics V, Gilbert Peterson and Sujeet Shenoi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 291--300. 7Google Scholar
Index Terms
- Topological Scoring of Concept Maps for Cybersecurity Education
Recommendations
Enhancing Cybersecurity Education Using POGIL (Abstract Only)
SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science EducationThis poster presents our NSF collaborative project "Enhancing Cybersecurity Education Using POGIL". Although the POGIL (Process Oriented Guided Inquiry Learning) instructional approach has been used and evaluated in science and engineering disciplines, ...
Blending Concept Maps with Online Labs (OLabs): Case Study with Biological Science
WCI '15: Proceedings of the Third International Symposium on Women in Computing and InformaticsExperimental learning combined with theoretical learning enhances the conceptual understanding of a subject. Therefore, the Online Labs (OLabs) that hosts science experiments was developed. OLabs uses interactive simulations with theory, procedure, ...
Fostering Concept Maps Awareness as a Means to Learning
CGC '13: Proceedings of the 2013 International Conference on Cloud and Green ComputingA concept map is a visual representation of concepts as nodes and of relationships between concepts as edges as a diagram consisting of nodes linked with each other. Concept maps support the learning process inasmuch that they make learners aware of ...
Comments