Exploring Trainees’ Behaviour in Hands-on Cybersecurity Exercises Through Data Mining

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Despite the rising number of cybersecurity professionals, the demand for more experts in this field is still substantial. Cybersecurity professionals must also possess up-to-date knowledge and skills to counter cybersecurity threats’ dynamicity and rapidly evolving nature. Hands-on cybersecurity training is mandatory to practice various tools and improve one’s technical cybersecurity skills. Generally, an interactive learning environment is set, where trainees perform sophisticated tasks by accessing complete operating systems, applications, and networks. One of the main challenges that cybersecurity organizations are facing today is the generation of massive data through practice exercises. So, it becomes a problem to convert this data into knowledge to improve the overall quality of the learning system. The large amount of interaction data and its complexity also limit us to do automated analysis. Thus, these challenges for cybersecurity learners can be addressed through appropriate educational data analysis by having insights or testing hypotheses or models on a proper dataset. Revealing the patterns, rules, item sets and time taken by trainees while using any command line tool could help the trainer to assess the trainees and to provide feedback. Therefore, in this paper we are analyzing the frequency patterns and timing information captured from the trainees’ command line log to reveal their solving techniques, easy and struggling stages, slipups, and individual performance. Through our study, we aim to show how education and training providers can foresee learners who are less likely to succeed in a task or exhibit low performance, which can impede learning proficiency. With this knowledge, organizations and trainers can identify trainees who require additional attention or support. It may also be able to identify elements related to an organization like training aids, training methodology, etc. that need improvement. This study demonstrates the utility of data-mining techniques, specifically rule mining and sequential mining, to empower training designers to delve into datasets derived from cyber security training exercises.

Original languageEnglish (US)
Title of host publicationProceedings of the 23rd European Conference on Cyber Warfare and Security, ECCWS 2024
EditorsMartti Lehto
PublisherCurran Associates Inc.
Pages581-589
Number of pages9
ISBN (Electronic)9781917204071
StatePublished - 2024
Event23rd European Conference on Cyber Warfare and Security, ECCWS 2024 - Jyvaskyla, Finland
Duration: Jun 27 2024Jun 28 2024

Publication series

NameEuropean Conference on Information Warfare and Security, ECCWS
ISSN (Print)2048-8602
ISSN (Electronic)2048-8610

Conference

Conference23rd European Conference on Cyber Warfare and Security, ECCWS 2024
Country/TerritoryFinland
CityJyvaskyla
Period6/27/246/28/24

Keywords

  • Cybersecurity Education
  • Cybersecurity Training
  • Educational Data-Mining
  • Learning Analytics

ASJC Scopus subject areas

  • Information Systems
  • Safety, Risk, Reliability and Quality
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Exploring Trainees’ Behaviour in Hands-on Cybersecurity Exercises Through Data Mining'. Together they form a unique fingerprint.

Cite this