Problem-based cybersecurity lab with knowledge graph as guidance

  • Yuli Deng
  • , Zhen Zeng
  • , Kritshekhar Jha
  • , Dijiang Huang

Research output: Contribution to journalArticlepeer-review

36 Scopus citations

Abstract

Lecture-based teaching paired with laboratory-based exercises is mostly used in cybersecurity instruction. However, it focuses more on theories and models but fails to provide learners with practical problem-solving skills and opportunities to explore real-world cybersecurity challenges. Problem-based learning (PBL) has been identified as an efficient pedagogy for many disciplines, especially engineering education. It provides learners with real-world complex problem scenarios, which encourages learners to collaborate with classmates, ask questions, and develop a deeper understanding of the concepts while solving realworld cybersecurity problems. This article describes the application of the PBL methodology to enhance professional trainingbased cybersecurity education. The authors developed an online laboratory environment to apply PBL with Knowledge Graph (KG)-based guidance for hands-on labs in cybersecurity training. Learners are provided access to a virtual lab environment with KG guidance to simulated real-life cybersecurity scenarios. Thus, they are forced to think independently and apply their knowledge to create cyber attacks and defend approaches to solve problems provided to them in each lab. Our experimental study shows that learners tend to gain more enhanced learning outcomes by leveraging PBL with KG guidance, become more aware of cybersecurity and relevant concepts, and express interest in keep learning of cybersecurity using our system.

Original languageEnglish (US)
Pages (from-to)55-61
Number of pages7
JournalJournal of Artificial Intelligence and Technology
Volume2
Issue number2
DOIs
StatePublished - Jan 25 2022

Keywords

  • Cybersecurity
  • Knowledge graph
  • Laboratory

ASJC Scopus subject areas

  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Problem-based cybersecurity lab with knowledge graph as guidance'. Together they form a unique fingerprint.

Cite this