Detailed Information on Publication Record
2023
Automated Feedback for Participants of Hands-on Cybersecurity Training
ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA and Ján DOVJAKBasic information
Original name
Automated Feedback for Participants of Hands-on Cybersecurity Training
Authors
ŠVÁBENSKÝ, Valdemar (703 Slovakia, guarantor, belonging to the institution), Jan VYKOPAL (203 Czech Republic, belonging to the institution), Pavel ČELEDA (203 Czech Republic, belonging to the institution) and Ján DOVJAK (703 Slovakia, belonging to the institution)
Edition
Education and Information Technologies, Springer, 2023, 1360-2357
Other information
Language
English
Type of outcome
Článek v odborném periodiku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
United States of America
Confidentiality degree
není předmětem státního či obchodního tajemství
References:
Impact factor
Impact factor: 5.500 in 2022
RIV identification code
RIV/00216224:14330/23:00131829
Organization unit
Faculty of Informatics
UT WoS
001091913600002
Keywords in English
cybersecurity education; interactive learning environments; hands-on training; virtual labs; shell commands
Tags
International impact, Reviewed
Změněno: 16/3/2024 14:22, doc. Ing. Pavel Čeleda, Ph.D.
Abstract
V originále
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates data that can be employed to support learning. This paper investigates innovative methods for leveraging the trainee data to provide automated feedback about the performed actions. We proposed and implemented feedback software with four modules that are based on analyzing command-line data captured during the training. The modules feature progress graphs, conformance analysis, activity timeline, and error analysis. Then, we performed field studies with 58 trainees who completed cybersecurity training, used the feedback modules, and rated them in a survey. Quantitative evaluation of responses from 45 trainees showed that the feedback is valuable and supports the training process, even though some features are not fine-tuned yet. The graph visualizations were perceived as the most understandable and useful. Qualitative evaluation of trainees' comments revealed specific aspects of feedback that can be improved. We publish the software as an open-source component of the KYPO Cyber Range Platform. Moreover, the principles of the automated feedback generalize to different learning contexts, such as operating systems, networking, databases, and other areas of computing. Our results contribute to applied research, the development of learning technologies, and the current teaching practice.
Links
101087529, interní kód MU |
|