Reinforcing Cybersecurity Hands-on Training With Adaptive Learning

This Research To Practice Full Paper presents how learning experience influences students' capability to learn and their motivation for further learning. Although each student is different, standard instruction methods do not adapt to individual students. Adaptive learning reverses this practice and attempts to improve the student experience. While adaptive learning is well-established in programming, it is rarely used in cybersecurity education. This paper is one of the first works investigating adaptive learning in cybersecurity training. First, we analyze the performance of 95 students in 12 training sessions to understand the limitations of the current training practice. Less than half of the students (45 out of 95) completed the training without displaying any solution, and only in two sessions, all students completed all phases. Then, we simulate how students would proceed in one of the past training sessions if it would offer more paths of various difficulty. Based on this simulation, we propose a novel tutor model for adaptive training, which considers students' proficiency before and during an ongoing training session. The proficiency is assessed using a pre-training questionnaire and various in-training metrics. Finally, we conduct a case study with 24 students and new training using the proposed tutor model and adaptive training format. The results show that the adaptive training does not overwhelm students as the original static training format. In particular, adaptive training enables students to enter several alternative training phases with lower difficulty than the phases in the original training. The proposed adaptive format is not restricted to particular training used in our case study. Therefore, it can be applied to practicing any cybersecurity topic or even in other related computing fields, such as networking or operating systems. Our study indicates that adaptive learning is a promising approach for improving the student experience in cybersecurity education. We also highlight diverse implications for educational practice that improve students' experience.

[1]  Dragan Gasevic,et al.  Development and Adoption of an Adaptive Learning System: Reflections and Lessons Learned , 2020, SIGCSE.

[2]  Jaime R. Carbonell,et al.  AI in CAI : An artificial intelligence approach to computer-assisted instruction , 1970 .

[3]  G. Spanoudakis,et al.  Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees , 2020, Applied Sciences.

[4]  Nasir Memon,et al.  Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool , 2017, Comput. Secur..

[5]  Marc P. Johnston Assessment for Excellence: The Philosophy and Practice of Assessment and Evaluation in Higher Education (2nd ed.) by Alexander W. Astin and Anthony Lising Antonio (review) , 2014 .

[6]  Jan Vykopal,et al.  Scalable Learning Environments for Teaching Cybersecurity Hands-on , 2021, 2021 IEEE Frontiers in Education Conference (FIE).

[7]  Daniyal M. Alghazzawi,et al.  A Survey of Artificial Intelligence Techniques Employed for Adaptive Educational Systems within E-Learning Platforms , 2017, J. Artif. Intell. Soft Comput. Res..

[8]  Elvinia Riccobene,et al.  A Model Driven Approach for Cyber Security Scenarios Deployment , 2019, IOSec/MSTEC/FINSEC@ESORICS.

[9]  Arthur C. Graesser,et al.  Design Recommendations for Intelligent Tutoring Systems: Volume 4-Domain Modeling , 2016 .

[10]  Jan Vykopal,et al.  On the Design of Security Games: From Frustrating to Engaging Learning , 2016, ASE @ USENIX Security Symposium.

[11]  Su Xue,et al.  Dynamic Difficulty Adjustment for Maximized Engagement in Digital Games , 2017, WWW.

[12]  Yi Li,et al.  A "Content-Behavior" Learner Model for Adaptive Learning System , 2014, ICIC.

[13]  Kaie Maennel,et al.  Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises , 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[14]  José Paladines,et al.  A Systematic Literature Review of Intelligent Tutoring Systems With Dialogue in Natural Language , 2020, IEEE Access.

[15]  Choi Chi Hyun,et al.  Impact of the COVID-19 pandemic on online home learning: An explorative study of primary schools in Indonesia , 2020 .

[16]  Jelena Mirkovic,et al.  Class Capture-the-Flag Exercises , 2014, 3GSE.

[17]  Peter Beike,et al.  Teaching Today A Practical Guide , 2016 .

[18]  Jacqueline Bourdeau,et al.  Advances in Intelligent Tutoring Systems , 2010 .

[19]  Vincent Aleven,et al.  Students' Understanding of Their Student Model , 2011, AIED.

[20]  Jan Vykopal,et al.  Challenges Arising from Prerequisite Testing in Cybersecurity Games , 2017, SIGCSE.

[21]  Radek Pelánek,et al.  Measuring Students' Performance on Programming Tasks , 2019, L@S.

[22]  Madjid Merabti,et al.  Cybersecurity Curriculum Design: A Survey , 2019, Trans. Edutainment.

[23]  Günter Daniel Rey,et al.  Competitive Agents and Adaptive Difficulty Within Educational Video Games , 2020, Frontiers in Education.

[24]  Jugal K. Kalita,et al.  Intelligent Tutoring Systems: A Comprehensive Historical Survey with Recent Developments , 2018, International Journal of Computer Applications.