Conference PaperPDF Available

Topological Scoring of Concept Maps for Cybersecurity Education

Authors:

Abstract and Figures

Concept maps are a well-known pedagogical tool for organizing and representing knowledge and developing a deep understanding of concepts. Unfortunately, the grading of concept maps tends to be manual and tedious thereby, posing serious limitation for an instructor to use them in class efficiently. To automate the assessment and grading, the topology and structural features of concept maps are utilized. However, they have never been explored for cybersecurity education. This paper evaluates the effectiveness of topological scoring of the concept maps for two cybersecurity courses: digital forensics, and SCADA system security. We create a dataset of 41 high-quality concept maps developed with expert knowledge. We utilize waterloo rubric to manually validate the quality of the concept maps based-on their contents and further compare the rubric outcome (obtained via manual analysis) with the automated topological scoring of the maps. The evaluation results show that the topological scoring is promising. However, it is not equally effective and warrants for advanced techniques to better utilize the topology of the maps. The dataset is made publicly available for further research on this topic.
Content may be subject to copyright.
Topological Scoring of Concept Maps for Cybersecurity
Education
Pranita Deshpande
Department of Computer Science
University of New Orleans
pdeshpa1@my.uno.edu
Irfan Ahmed
Department of Computer Science
Virginia Commonwealth University
iahmed3@vcu.edu
ABSTRACT
Concept maps are a well-known pedagogical tool for organizing
and representing knowledge and developing a deep understanding
of concepts. Unfortunately, the grading of concept maps tends
to be manual and tedious thereby, posing serious limitation for
an instructor to use them in class eciently. To automate the
assessment and grading, the topology and structural features of
concept maps are utilized. However, they have never been explored
for cybersecurity education. is paper evaluates the eectiveness
of topological scoring of the concept maps for two cybersecurity
courses: digital forensics, and SCADA system security. We create
a dataset of 41 high-quality concept maps developed with expert
knowledge. We utilize waterloo rubric to manually validate the
quality of the concept maps based-on their contents and further
compare the rubric outcome (obtained via manual analysis) with
the automated topological scoring of the maps. e evaluation
results show that the topological scoring is promising. However, it
is not equally eective and warrants for advanced techniques to
beer utilize the topology of the maps. e dataset is made publicly
available for further research on this topic.
ACM Reference format:
Pranita Deshpande and Irfan Ahmed. 2019. Topological Scoring of Concept
Maps for Cybersecurity Education. In Proceedings of the 50th ACM Technical
Symposium on Computer Science Education, Minneapolis, MN, USA, February
27-March 2, 2019 (SIGCSE ’19), ACM, New York, NY, 7 pages.
DOI: http://dx.doi.org/10.1145//3287324.3287495
.
1 INTRODUCTION
Concept maps are a visual tool for organizing and representing
knowledge. ey include concepts, represented as text boxes, and
relationships between pairs of concepts indicated by a connecting
link. e most abstract concepts are placed at the top the diagram,
while progressively more specic ones are placed underneath them.
is simple design allows seamless and eective linking and explo-
ration of concept at dierent levels of detail.
Ahmed completed this work while he was at the University of New Orleans
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for prot or commercial advantage and that copies bear this notice and the full citation
on the rst page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permied. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specic permission and/or a
fee. Request permissions from permissions@acm.org.
SIGCSE ’19, February 27-March 2, 2019, Minneapolis, MN, USA.
© 2019 Association of Computing Machinery.
ACM ISBN 978-1-4503-5890-3/19/02...$15.00
DOI: http://dx.doi.org/10.1145//3287324.3287495
Research has shown that concept mapping is benecial for stu-
dent learning, if it is used as an integral, on-going feature of the
learning process, and not as an isolated activity at the beginning
and/or end of a semester [
13
]. Concept maps are eective for stu-
dents to clarify their knowledge structures [
8
]. e students who
learn through concept maps have beer learning outcomes over
traditional approaches [22].
Unfortunately, the grading of concept maps tends to be manual
and tedious thereby, posing serious limitation for an instructor to
use them in class eciently. e topology and structural features of
concept maps are considered promising for automating the assess-
ment and grading of concept maps. However, they have never been
explored for cybersecurity education. e concept maps for cyber-
security can be quite dierent from other areas of computer science
including the frequency of keywords and phrases, interdisciplinary
topics, and dynamic subject area [2, 3, 5–7, 9–11, 17, 19, 24–27].
In this paper, we present a dataset of 41 concept maps for two cy-
bersecurity courses (developed with expert knowledge) to support
research in this direction. e courses are digital forensics, and
supervisory control and data acquisition (SCADA) system security.
We utilize the Waterloo rubric [
1
] to establish the ground truth
about the quality of the maps. e rubric evaluates ve elements
of a concept map i.e., breadth of net, interconnectedness, use of
descriptive links, ecient links, layout and development over the
time, and identies the quality of a map as either Excellent, Good,
Poor, or Fail.
We further utilize the ground-truth to evaluate the eectiveness
of a recent state-of-the-art topological scoring method [
12
]. e
method uses the structural features of a concept map (i.e., branch
point count, average words per concept, concept count, linking
phrase, orphan count, proposition count, Root child count, sub-
map count) and provides a topological score. e evaluation results
show that the topological scoring is promising. However, they are
not equally eective as compared to the Rubric and require more
research in this domain. e dataset is made publicly available at
gitlab for other researchers to use [14]
Contributions.
We summarize the contribution of the paper as
follows:
Concept Map Dataset We develop the rst dataset of con-
cept maps for cybersecurity courses and make it publicly
available for research and education.
Establish the Ground Truth We assess and record the qual-
ity of the maps (ground-truth) in the datasets using the
Waterloo Rubric.
Identify an Open Research Problem We point out (via experi-
mental analysis) that topological scoring requires aention
from education research community to develop eective
Paper Session: Security 1
SIGCSE '19, February 27–March 2, 2019, Minneapolis, MN, USA
731
solutions for automated assessment and grading of con-
cept maps. Our dataset is useful for the research in this
direction.
Roadmap.
e rest of the paper is organized as follows: Section 2
presents the related work. Section 3 discusses the datasets including
steps to create concept maps and guidelines from our experience,
followed by concept map examples in section 4. Sections 5 and 6
presents the evaluation methods and results. Section 7 concludes
the paper.
2 RELATED WORK
Concept mapping has received relatively lile aention in cyber-
security education as compared to other pedagogical techniques
such as peer instruction [4, 15, 20, 21].
Dexter [
16
] uses concept maps to detail required concepts for
cybersecurity management, delving into sub- topics such as ma-
licious behavior (deployment of code and usage of vulnerability
scanners) on an organization’s network targeting their information
assets and perimeter defenses such as rewalls, routers, and IDS
systems. e author also uses the concept maps to highlight policies
and technologies that are key to an organizations cybersecurity
management.
Tanner and Dampier [
28
] highlight the potential use of concept
maps in digital forensic investigations, detailing in concept maps
the six phases of the digital investigative process (identication,
collection, preservation, examination, analysis, and presentation)
as well as important procedures and concepts within each phase
such as chain of custody or soware used in particular phases. e
authors note that the maps could be tailored on a per-investigation
process to display contexts of specic evidence such as a suspect
property and case timeline, and how each piece of evidence was
examined. Tanner and Dampier further detail how case-specic
concept maps may be shared by the law enforcement community
as well as how a concept map could be shown in court in order to
detail a complex investigative process.
Hay et al. [
18
] describe the pedagogical use of concept mapping
in a general higher educational context, and summarize prior use
of concept maps in both the teaching and learning processes. e
authors focus on the usage of concept mapping to measure students
prior knowledge, as well as allowing for the instructor to teach
new material in the context of students prior understanding. ey
suggest that concept mapping be performed both by students and
instructors, and identify several core practice of responsible univer-
sity teaching that could be accomplished through concept mapping
such as measuring the prior knowledge of students, presenting
in a deliberate manner in the context of a known student knowl-
edge base, and measuring change among the student population
so that learning (where it occurs) is identied and the causes of
non-learning are addressed.
3 DEVELOPING A CONCEPT MAP DATASET
Overview.
Concept map is a graphical tool to represent concepts
and the relationships among them on a particular topic. e map-
ping organizes the concepts in a hierarchy, with the most general
ones at the top of the map and the most specic concepts at the
boom. e concepts are connected through arrows (or links) and
propositions—a word or phrase describing the link. Concept map-
ping is a cognitively intensive task that examines the level of a
student’s understanding of concepts. It is particularly useful for
in-class activities and homework assignments, and oers opportu-
nities to improve the eectiveness of the instruction.
Concept mapping can be used to measure the level of a student’s
understanding of cybersecurity concepts throughout the course, via
Concept map-based exercises. In particular, a poorly constructed
(by a student) map that has missing links and gaps in logic, or
incorrect information can allow the instructor to quickly correct
misconceptions developed by a student.
Conversely, instructors can use a correct map in class as the
basis for in-class discussion. e map requires students to actively
build their understanding of foundational concepts, and allow them
to reason about the bigger picture and the connections among
concepts.
Steps to Create a Concept Map.
We use the following systematic
approach to develop a concept map.
(1) Select a target concept.
(2)
Identify keywords that represent some aspect of the con-
cept.
(3)
Recognize any relationships among the keywords in ap-
propriate words and phrases and then,
(4)
Draw the concept map; circle the keywords and connect
them with the relationship words/phrases.
Guidelines of Do’s and Don’ts.
From our experience of devel-
oping and improving concept maps including several revisions,
and reviews and comments from other participants, we develop a
guideline list of Do’s and Don’ts while developing a concept map.
A connection between two nodes should be unidirectional.
A connecting phrase should describe the relationship be-
tween two nodes clearly. Otherwise, avoid such connec-
tions and elaborate them with additional keyword(s) be-
tween them.
A connecting loop across one or multiple nodes tend to
create confusion and should be avoided.
Dataset Details.
We develop the concept maps for two cybersecu-
rity courses: digital forensics, and SCADA system security.
Digital forensics
is dened as the application of scientic tools
and methods to identify, collect, and analyze digital artifacts in sup-
port of legal proceedings [
23
]. We have developed 19 concept maps
for digital forensics investigation course. e course provides an
introduction to digital forensics, and then covers the rst response
and evidence handling, le systems, memory forensics, and tools
for investigation. e maps are divided into six dierent course
modules. e distribution of the concept maps with respect to their
topics are presented in Table 1 and described as follows.
Introduction to digital forensics covers the concept maps on
digital evidence including the location, type and documen-
tation of evidence, types of digital forensics investigation,
and legal aspects.
First response and evidence handling covers the concept
maps on how a digital forensics investigator should re-
spond to a case before starting the investigation, what are
2
Paper Session: Security 1
SIGCSE '19, February 27–March 2, 2019, Minneapolis, MN, USA
732
Topics # of Concept Maps
Introduction to digital forensics 4
First response and evidence handling 2
Investigation steps 3
File systems 5
Memory Forensics 2
Tools for investigation 3
TOTAL 19
Table 1: Concept maps for digital forensics
the necessary steps and procedures which should be taken
care of and how the evidence should be handled.
Investigation steps focus on the steps/tasks that should be
performed during a forensic investigation including the
acquisition and analysis of the evidence, and the reporting
that describes the entire investigation procedure and give
a conclusion to a case.
File systems covers the concept maps on le system investi-
gation including an overview of dierent le systems, le
allocation table, new technology le system, and investi-
gating tips and techniques on le system.
Memory Forensics covers the concept maps on memory anal-
ysis and live forensics including an explanation of volatility
data and how important the data is for investigation.
Tools for investigation covers the concept maps on the usage
of dierent tools and techniques for le system investiga-
tion including sleuth kit, and windows registry and web
browser investigation.
SCADA systems
control major portions of the U.S. critical infras-
tructure — power grid, pipe-lines, water management, etc. — and
protecting their integrity and availability is of primary importance
to national security. We have developed 22 concept maps for the
SCADA security course work. e course is designed for computer
science students who have no understanding of control system
and cover topics from introductory to advance level. e maps are
divided for ve dierent course modules, starting from an intro-
duction to SCADA systems and then, covers PLC programming,
communication protocols, and cyberaacks and security solution.
e distribution of concept maps with respect to their topics are
presented in Table 2 and described as follows.
Introduction to SCADA Systems covers the basic concepts
of a SCADA system, and its components, provides a brief
understanding of some physical processes.
Programming of the Programmable Logic Controllers (PLC)
mainly covers Ladder Logic programming including rules
to write a program and addressing formats of PLC
SCADA communication protocols covers two protocols, Mod-
bus and DNP3 along with the header and message formats.
SCADA Vulnerabilities and Aack covers real-world aacks
and vulnerabilities including the aack taxonomies on
MODBUS and DNP3 protocols.
SCADA security solutions covers security solution for SCADA
systems such as PLC code detection.
Topics # of Concept Maps
Introduction to SCADA Systems 4
PLC Programming 3
SCADA communication protocols 6
SCADA Vulnerabilities and Aack 5
SCADA security solutions 4
TOTAL 22
Table 2: Concept maps for SCADA system security
4 EXAMPLES OF CONCEPT MAPS
is section presents two examples of the concept maps from digital
forensics and SCADA system.
4.1 SCADA System: Working of a Conveyor Belt
e main components of a typical conveyor belt are drives, ac-
tuators, controllers, monitors and sensors. Programmable logic
controller (PLC) receives an input signal from proximity sensor
that shows that an object is placed on the belt. e PLC runs its
control logic and sends an output signal to Servo drive to move the
conveyor belt to make some space for the next object. e whole
conveyor belt physical process can be remotely monitored by using
human-machine-interface (HMI) and the data received by the HMI
is also stored in historian. ere are two types of sensors proximity
sensor and photo eye sensor, which detects the presence of the
object using beam of light and electromagnetic eld respectively.
Figure 1 shows the concept map on the working and components
of a conveyor belt. e map consists of four levels of hierarchy,
and mostly uses succinct phrases to link two nodes. Nodes are also
using short descriptive phrases or long words. To develop this map,
we use our systematic approach as follows:
e target concept addresses a typical working model of
conveyor belt including its components.
We select the keywords including components, sensors
and actuators used and how it was used.
To connect the nodes that can make sucient understand-
ing of their relationships, we mostly use phrases, instead
of words.
4.2 Digital Forensics: Handling Digital Evidence
When a forensic investigator collects an evidence from a crime
scene, it is required that the evidence is handled properly, which
typically involves ve stages i.e., storage of evidence, disposition,
transporting, documentation, and packing of evidence. Storing of
evidence imposes rules and regulation such as access to storage
must be limited and monitored, chain of custody should be main-
tained,login and log out details of who, what, when, where and why.
Transporting the evidence includes protecting portable devices and
media from external corruption, determining if a suspect computer
should remain powered up, what applications and other processes
were active. Documenting the evidence records where the evidence
was found, what state it was in, model number, serial numbers, and
time and date of evidence collection. Aer the investigation is done
evidence must be destroyed or returned.
Figure 2 shows the concept map explaining the stages of evidence
handling. e map consists of three levels of hierarchy. e nodes
3
Paper Session: Security 1
SIGCSE '19, February 27–March 2, 2019, Minneapolis, MN, USA
733
Figure 1: Working of ICS with Conveyor as an example
and connecting links are self explanatory phrases. To develop this
map, we use our systematic approach as follows:
e targeted concept is the concept of handling of digital
evidence.
Key nodes indicated the actions and duties to be performed
in each individual stage.
connecting nodes indicate the dierent stages in digital
evidence handling
5 CONCEPT MAP ASSESSMENT METHODS
We utilize two dierent assessment methods for concept maps: the
Waterloo Rubric [
1
], and Topological Scoring [
12
]. e rubric via
manual analysis established the ground truth for the concept maps
in the datasets. e scoring is an automated method to assess the
quality of the maps.
5.1 Waterloo Rubric (manual analysis)
e Waterloo Rubrics is developed by the University of Waterloo
for the assessment of the concept maps [
1
]. e rubric identies
the quality of the maps at four levels i.e. Excellent,Good,Poor,
and Fail based-on the following six elements i.e., breadth of net,
interconnectedness,use of descriptive links,ecient links,layout, and
development time.
Breadth of net
evaluates the signicance of target concepts and
their description in multiple levels. For excellent, a map includes
important concepts and describe them in multiple levels. However,
for fail, a map misses many important concepts.
Interconnectedness
evaluates the number of concepts interlinked
with other concepts. For excellent, all concepts are interlinked, and
for fail, few concepts are interlinked.
Use of descriptive links
evaluates the quality of description as
accurately dened to vague and incorrectly dened. e rst is
ranked as excellent while the later is fail.
Ecient links
evaluates the uniqueness of the information of the
links and the quality of description of the relationships among the
nodes. For excellent, each link type is distinct and clearly describes
the relationship, while for fail, most links are vaguely described,
and not distinct from each other.
Layout
evaluates the physical layout of a concept map including
its size to be t in one page, and hierarchical structure. For excellent,
maps t in one page and have clear multiple hierarchy, while for fail,
map consists of multiple pages and has no hierarchical organization.
Development over time
evaluates whether a concept map is built
incrementally as therm progress and new concepts are learned. for
excellent, nal map shows considerable cognitive progression from
base map and a signicantly greater depth of understanding of the
domain. while for fail nal map shows no signicant cognitive
profession from the base map and no increase in the understanding
of the domain.
5.2 Topological Scoring (automated analysis)
Topological scoring [
12
] utilizes structural features of a concept
map to compute a score between zero and six, where higher score
indicates higher quality of the map. A brief description of the
features are as follows:
Average Words per Concept
is the total count of words, as sep-
arated by whitespace, in all concepts divided by the number of
concept in a map. Concise concepts are important to the taxonomy
score.
Branch Point Count is the total number of concepts and linking
phrases that have at least one incoming connection and more than
one outgoing connection.
Concept Count is the number of concept in a map.
Linking Phrase Count
is the number of linking phrases in a map.
Orphan Count
is the number of concepts in the map that have no
connections.
4
Paper Session: Security 1
SIGCSE '19, February 27–March 2, 2019, Minneapolis, MN, USA
734
Figure 2: Dierent stages of handling of digital evidence
Proposition Count
is the number of propositions (i.e. concept-
linking phrase-concept) in a map.
Root Child Count
is the number of concepts in a map that has an
incoming connection from a root concept. A root concept is dened
as one that has outgoing connections but no incoming connections.
Sub Map Count is the number of root concepts found in a map.
Taxonomy Score
is the topological taxonomy score computed for
a map.
6 ASSESSMENT RESULTS
We obtain the results of the Waterloo rubric and topological scoring
on the concept maps of both courses and then, compare them to
measure the eectiveness of the automated scoring method.
6.1 Waterloo Rubric
Figure 3 shows the assessment results on the concept maps of
SCADA system security for each element of rubric. e results
show that most of the maps are graded either excellent or good.
For instance, using breadth of net, 14 maps are graded to excellent
where as 7 maps are good. Similarly, using interconnectedness, 8
maps are excellent, where as 12 maps are good.
Figure 3: Rubric Assessment of SCADA system concept
maps
Figure 4 shows the assessment results on the concept maps of
digital forensics. e results validate the high quality of concept
maps using each element separately. For instance, breadth of net
identies 13 and 5 maps as excellent and good; Interconnectedness
identies 11 and 7 maps as excellent and good respectively.
5
Paper Session: Security 1
SIGCSE '19, February 27–March 2, 2019, Minneapolis, MN, USA
735
0" 0" 0" 0" 0" 0"
0"
10"
20"
30"
40"
50"
60"
70"
80"
90"
100"
Breadth"of"Net" Embeddeness"and"
Interconnectedness"
Use"of"DescripAve"
Links"
Efficient"Links" Layout" Devlopment"Over"
Time"
Number'Of'Concept'Maps'(%)'
Assessment'Parameters''
Excellent" Good" Poor" Failing"
Figure 4: Rubric Assessment of Forensics concept maps
Accuracy Level SCADA (%) Forensics (%)
Accurate 13.64 0
Close to accurate 22.73 10.53
Close to inaccurate 27.27 31.58
Inaccurate 36.36 57.89
Table 3: Accuracy of the topological scoring when compared
with the ground truth of Waterloo Rubric
6.2 Topological Scoring and Comparison with
the Rubric (Ground Truth)
Analysis of Topological Scores.
Figure 5 and 6 show the topo-
logical scores and the comparison with the Rubric results on the
concept map of both SCADA system and digital forensics respec-
tively. Recall that higher score refers to higher quality of a concept
map. e results show that most of the maps have moderate scores.
In particular, out of 22 maps of SCADA system, 8 maps score a rank
of 2 or below where as 14 maps score 3 and above including 6 maps
have the rank of ve or higher. Furthermore, out of 19 maps of
forensics, 9 maps score the rank of 2 and higher whereas 10 maps
have the score of 1. Highest rank of a concept map is 4 for the topic
of ”report writing of investigation”.
Comparison between Topological Scores and Waterloo Rubric.
e Rubric grading is the ground truth. It assesses the quality of a
concept map based-on content manually. To compare the ground
truth with the automated topological scores, we normalized the
rubric scale between zero and six where the distance between two
consecutive levels (such as Excellent and Good) is 1.5.
Figures 5 and 6 shows the comparison between the ground truth
rubric and topological score. We quantify the eectiveness of the
scoring as accurate, close to accurate, close to inaccurate, and in-
accurate. If the result of ground truth and scoring is same, it is
accurate. If the score deviates one level from the ground truth, it is
close to accurate. Two and three level deviations corresponds to
close to inaccurate, and inaccurate respectively.
Table 3 summarize the results for the concept maps of both
courses. It shows that the scoring achieves some level of accuracy.
However, it is not signicant and requires further research on this
topic.
7 CONCLUSION
e paper presented a dataset of 41 concept maps for two cyberse-
curity courses useful for improving students’ learning experience in
0"
1.5"
3"
4.5"
6"
Applica/on_Layer"
A7acks_On_MODBUS"
CONVEYER_BELT"
DATA_LINK_LAYER"
DNP3_A7acks"
DNP3_Overview"
DNP3_Scapy_Tool"
ICS_BASIC_OPERATION"
Injec/on_a7acks"
INTRO_CONTROL_SYSTE
MODBUS_Func/oncode"
MODBUS_Overview"
PLC_Addressing"
PLC_Code_Analy/cs_De
PLC_Code_working_mo
Power_Grid"
Program_Scan"
Pseudo_Transport_Laye
Real_Life_A7acks_On_I
Rules_For_Ladder_Logic"
SCADA_vs_DCS"
Smart_City"
Evalua&on)Score)
Concept)Maps)
Taxonomy"Score"
Rubric"
Figure 5: SCADA System Security - Comparison between the
Waterloo Rubric and Topological Scoring
0"
1.5"
3"
4.5"
6"
Acquis/on_evidence"
Analysis_Evidence"
FAT"
File_System"
File_system_Analysis_
first_response_and_d
Handling_evidence"
Intro_digital_evidenc
intro_to_documenta/
Intro_to_inves/ga/on"
Legal_Aspects"
Live_Forensics"
NTFS"
NTFS_ADS"
Repor/ng"
Sleuthkit"
Vola/lity_Framework"
Web_Browsing_inves
windows_registry"
Evalua&on)Score))
Concept)Maps)
Taxonomy"Score" Rubric"Result"
Figure 6: Digital Forensics - Comparison between the Water-
loo Rubric and Topological Scoring
class. We evaluated the quality of the maps using two well-known
techniques. One was the Waterloo Rubric (manual assessment)
based-on the six elements of quality (such as breadth of net, inter-
connectedness, and use of descriptive links) to classify a map into
excellent, good, poor, and fail. e other was topological scoring
(automated assessment) based-on the structural features of a map
to compute the rank between zero and six.
e evaluation results showed that the rubric identied most of
the maps as Excellent or Good and provided the ground-truth about
the quality of the maps. However, when we compared the topo-
logical scoring with the ground-truth, the scoring did not achieve
signicant accuracy thereby, pointing out an open research problem
for automated assessment and grading of concept maps.
8 ACKNOWLEDGEMENT
is work was in part supported by the NSF grants # 1500101 and
1623276.
6
Paper Session: Security 1
SIGCSE '19, February 27–March 2, 2019, Minneapolis, MN, USA
736
REFERENCES
[1]
2016. Rubric for Assessing Concept Maps (Centre for Teach-
ing Excellence, University of Waterloo). hps://uwaterloo.ca/
centre-for- teaching-excellence/sites/ca.centre- for-teaching- excellence/
les/uploads/les/rubric for assessing concept maps.pdf. (2016).
[2]
I. Ahmed, S. Obermeier, S. Sudhakaran, and V. Roussev. 2017. Programmable
Logic Controller Forensics. IEEE Security Privacy 15, 6 (November 2017), 18–24.
hps://doi.org/10.1109/MSP.2017.4251102
[3]
Irfan Ahmed, Golden G. Richard, Aleksandar Zoranic, and Vassil Roussev. 2015.
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine
Introspection. In Information Security, Yvo Desmedt (Ed.). Springer International
Publishing, Cham, 3–19.
[4]
Irfan Ahmed and Vassil Roussev. 2018. Peer Instruction Teaching Methodology
for Cybersecurity Education. IEEE Security Privacy 16, 4 (July 2018).
[5]
Irfan Ahmed, Vassil Roussev, and Aisha Ali Gombe. 2015. Robust Fingerprinting
for Relocatable Code. In Proceedings of the 5th ACM Conference on Data and
Application Security and Privacy (CODASPY ’15). ACM, New York, NY, USA,
219–229. hps://doi.org/10.1145/2699026.2699104
[6]
Irfan Ahmed, Vassil Roussev, William Johnson, Saranyan Senthivel, and Sneha
Sudhakaran. 2016. A SCADA System Testbed for Cybersecurity and Forensic
Research and Pedagogy. In Proceedings of the 2Nd Annual Industrial Control
System Security Workshop (ICSS ’16). ACM, New York, NY, USA, 1–9. hps:
//doi.org/10.1145/3018981.3018984
[7]
Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden Richard, and Vassil
Roussev. 2013. Rule-Based Integrity Checking of Interrupt Descriptor Tables in
Cloud Environments. In Advances in Digital Forensics IX, Gilbert Peterson and
Sujeet Shenoi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 305–328.
[8]
Williams M. Akinsanya, C. 2004. Concept mapping for meaningful learning.
Report. 41–46 pages.
[9]
Sajal Bhatia, Sunny Behal, and Irfan Ahmed. 2018. Distributed Denial of Ser-
vice Aacks and Defense Mechanisms: Current Landscape and Future Direc-
tions. Springer International Publishing, Cham, 55–97. hps://doi.org/10.1007/
978-3- 319-97643- 3 3
[10]
Manish Bha and Irfan Ahmed. 2018. Leveraging relocations in ELF-binaries
for Linux kernel version identication. Digital Investigation 26 (2018), S12 – S20.
hps://doi.org/10.1016/j.diin.2018.04.022
[11]
Manish Bha, Irfan Ahmed, and Zhiqiang Lin. 2018. Using Virtual Machine
Introspection for Operating Systems Security Education. In Proceedings of the
49th ACM Technical Symposium on Computer Science Education. ACM, 396–401.
[12]
Alberto J Ca
˜
nas, Larry Bunch, Joseph D Novak, and Priit Reiska. 2013. Cmapanal-
ysis: An extensible concept map analysis tool. Journal for Educators, Teachers
and Trainers (2013).
[13]
A. Ca
˜
nas. 2003. A Summary of Literature Pertaining to the Use of Concept Mapping
Techniques and Technologies for Education and Performance Support. Report.
[14]
Pranita Deshpande and Irfan Ahmed. 2018 (accessed July 23, 2018). Con-
cept Map Datasets for Cybersecurity Courses. hps://gitlab.com/iahmed4/
concept-map- datasets-for- cybersecurity-courses
[15]
Pranita Deshpande and Irfan Ahmed. 2019. Evaluation of Peer Instruction for
Cybersecurity Education. In Proceeding of the 50th ACM Technical Symposium on
Computer Science Education (SIGCSE ’19).
[16]
J. Dexter. 2002. e Cyber Security Management System: A Conceptual Mapping.
Report. SANS Institute.
[17]
Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bha, and ManPyo
Hong. 2018. Automatic Mitigation of Kernel Rootkits in Cloud Environments.
In Information Security Applications, Brent ByungHoon Kang and Taesoo Kim
(Eds.). Springer International Publishing, Cham, 137–149.
[18]
David Hay, Ian Kinchin, and Simon Lygo-Baker. 2008. Making learning visible:
the role of concept mapping in higher education. Studies in Higher Education 33,
3 (2008), 295–311. hps://doi.org/10.1080/03075070802049251
[19]
Salman Javaid, Aleksandar Zoranic, Irfan Ahmed, and Golden G Richard III. 2012.
Atomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines
in a Cloud Environment. In Proceedings of the 6th Layered Assurance Workshop
(ACSAC’12).
[20]
William Johnson, Irfan Ahmed, Vassil Roussev, and Cynthia B. Lee. 2017. Pe er In-
struction for Digital Forensics. In 2017 USENIX Workshop on Advances in Security
Education (ASE 17). USENIX Association, Vancouver, BC.
[21]
William E. Johnson, Allison Luzader, Irfan Ahmed, Vassil Roussev, Golden
G. Richard III, and Cynthia B. Lee. 2016. Development of Peer Instruction
estions for Cybersecurity Education. In 2016 USENIX Workshop on Ad-
vances in Security Education (ASE 16). USENIX Association, Austin, TX. hps:
//www.usenix.org/conference/ase16/workshop-program/presentation/johnson
[22]
Paul Kim and Claudia Olaciregui. 2008. e eects of a concept map-based
information display in an electronic portfolio system on information processing
and retention in a h-grade science class covering the Earth’s atmosphere. 39,
4 (2008), 700–714.
[23]
Vassil Roussev. 2016. Digital forensic science: issues, methods, and challenges.
Synthesis Lectures on Information Security, Privacy, & Trust 8, 5 (2016), 1–155.
[24]
Vassil Roussev, Irfan Ahmed, and omas Sires. 2014. Image-based Kernel
Fingerprinting. Digit. Investig. 11, S2 (Aug. 2014), S13–S21. hps://doi.org/10.
1016/j.diin.2014.05.013
[25]
Vassil Roussev, Andres Barreto, and Irfan Ahmed. 2016. API-Based Forensic
Acquisition of Cloud Drives. In Advances in Digital Forensics XII, Gilbert Peterson
and Sujeet Shenoi (Eds.). Springer International Publishing, Cham, 213–235.
[26]
Saranyan Senthivel, Irfan Ahmed, and Vassil Roussev. 2017. SCADA network
forensics of the PCCC protocol. Digital Investigation 22 (2017), S57 – S65. hps:
//doi.org/10.1016/j.diin.2017.06.012
[27]
Saranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed, and Vassil
Roussev. 2018. Denial of Engineering Operations Aacks in Industrial Control
Systems. In Proceedings of the Eighth ACM Conference on Data and Application
Security and Privacy (CODASPY ’18). ACM, New York, NY, USA, 319–329. hps:
//doi.org/10.1145/3176258.3176319
[28]
April Tanner and David Dampier. 2009. Concept Mapping for Digital Forensic
Investigations. In Advances in Digital Forensics V, Gilbert Peterson and Sujeet
Shenoi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 291–300.
7
Paper Session: Security 1
SIGCSE '19, February 27–March 2, 2019, Minneapolis, MN, USA
737
... The automation of the grading process is a significant research problem to help teachers use the concept maps effectively in class. Existing research primarily focuses on topological scoring that utilizes structural features of a concept map for grading such as incoming child connections from a parent concept, total number of circles and links, and a number of propositions [2], [3]. Recently, Deshpande and Ahmed [3] show that a topological scoring [2] is not equally effective as compared to the Waterloo Rubric, which is a well-defined grading rubric for manual analysis [4]. ...
... Existing research primarily focuses on topological scoring that utilizes structural features of a concept map for grading such as incoming child connections from a parent concept, total number of circles and links, and a number of propositions [2], [3]. Recently, Deshpande and Ahmed [3] show that a topological scoring [2] is not equally effective as compared to the Waterloo Rubric, which is a well-defined grading rubric for manual analysis [4]. ...
... Overall, Kastor achieves around 84%, and 95% accuracy (at the accurate or close to accurate levels) for SCADA and forensics concept maps, respectively. We further compare Kastor with a topological scoring method [2] used by Deshpande and Ahmed [3] and show improvement by around 32% and 79% (at accurate and close-to-accurate levels) for SCADA and forensics concept maps, respectively. ...
Article
Full-text available
Concept mapping is a well-known pedagogical tool to help students organize, represent, and develop an understanding of a topic. The grading of concept maps is typically manual, time-consuming, and tedious, especially for a large class. Existing research mostly focuses on topological scoring based-on structural features of concept maps. Unfortunately, the scoring does not achieve comparable accuracy to well-defined rubrics for manual analysis on the quality of content in a concept map. This paper presents Kastor, a new method to automate the Waterloo Rubric of scoring concept maps by quantifying the rubric’s quality assessment parameters. The evaluation is performed on a publicly-available dataset of 39 concept maps of two cybersecurity courses, i.e., digital forensics, and supervisory control and data acquisition (SCADA) system security. The evaluation results show that Kastor achieves the accuracy of around 84% and 95% (at accurate and close-to-accurate levels) for SCADA and forensics concept maps, respectively. Furthermore, Kastor’s comparison with a topological scoring method shows improvement by around 32% and 79% on SCADA and forensics concept maps, respectively.
... ? Surprisingly, none of the examined papers provides a link to the corresponding dataset that was analyzed. Although one paper [6] includes a link to a Gitlab repository with the data, the repository is unavailable. Nevertheless, papers such as [45] present exemplary practice by including the full wording of the questions that the evaluators asked. ...
... Finally, we examined the people that publish cybersecurity education papers and their affiliations. (22), research centers (7), and private companies (2) 6 . The most represented country was the USA (203), followed by Canada (17) and the Czech Republic (10). ...
... Several research ideas stem from this review. Since K-12 education was underrepresented, it may be worthwhile to examine teaching 6 One author in [8] had two affiliations, therefore, the sum of the affiliations is 252. interventions with younger learners. ...
... ? Surprisingly, none of the examined papers provides a link to the corresponding dataset that was analyzed. Although one paper [6] includes a link to a Gitlab repository with the data, the repository is unavailable. Nevertheless, papers such as [45] present exemplary practice by including the full wording of the questions that the evaluators asked. ...
... Finally, we examined the people that publish cybersecurity education papers and their affiliations. (22), research centers (7), and private companies (2) 6 . The most represented country was the USA (203), followed by Canada (17) and the Czech Republic (10). ...
... Several research ideas stem from this review. Since K-12 education was underrepresented, it may be worthwhile to examine teaching 6 One author in [8] had two affiliations, therefore, the sum of the affiliations is 252. interventions with younger learners. ...
Preprint
Full-text available
Cybersecurity is now more important than ever, and so is education in this field. However, the cybersecurity domain encompasses an extensive set of concepts, which can be taught in different ways and contexts. To understand the state of the art of cybersecurity education and related research, we examine papers from the ACM SIGCSE and ACM ITiCSE conferences. From 2010 to 2019, a total of 1,748 papers were published at these conferences, and 71 of them focus on cybersecurity education. The papers discuss courses, tools, exercises, and teaching approaches. For each paper, we map the covered topics, teaching context, evaluation methods, impact, and the community of authors. We discovered that the technical topic areas are evenly covered (the most prominent being secure programming, network security, and offensive security), and human aspects, such as privacy and social engineering, are present as well. The interventions described in SIGCSE and ITiCSE papers predominantly focus on tertiary education in the USA. The subsequent evaluation mostly consists of collecting students' subjective perceptions via questionnaires. However, less than a third of the papers provide supplementary materials for other educators, and none of the authors published their dataset. Our results provide orientation in the area, a synthesis of trends, and implications for further research. Therefore, they are relevant for instructors, researchers, and anyone new in the field of cybersecurity education. The information we collected and synthesized from individual papers are organized in a publicly available dataset.
Article
Full-text available
A Concept map is a pedagogical tool to help students understand the concepts and identify their misconceptions. Grading a concept map is a time-consuming manual task causing a severe bottleneck to use concept maps in a large class effectively. This paper presents Cronus that provides useful feedback on a student concept map similar to manual assessment by comparing it with an instructor concept map. The feedback includes identifying misconceptions, finding concepts, links, and branches that are (partially) matched or missed from a student concept map, generating summary statistics based on the feedback, and suggesting a grade of the map using predefined criteria (by the instructor) on the summary stats. Cronus is evaluated on a dataset of 74 student concept maps collected as homework assignments in an undergraduate (senior-level) course on introductory computer security. The evaluation results show that Cronus can provide accurate feedback on student concept maps compared to the manual evaluation of the maps and automatically suggest their correct grades.
Chapter
Digital technologies are becoming more engrained in our daily life and society (e.g., smart city and smart nation), and these technologies can be both the target of and tool used to facilitate a broad range of malicious cyber activities. This reinforces the importance of disciplines such as digital forensics. Digital forensics is a relatively new, multidisciplinary field with roots in traditional forensic sciences, as well as combining elements of technology, legal, social science, political science, criminal justice, and various other disciplines. Compared to the more established fields of computer science, information security, and cybersecurity, digital forensics is somewhat understudied. Though interest in the field is growing and the industry is in need of trained professionals, there are a multitude of challenges to overcome as it relates to education. There is a glaring lack of standardization and structure both in existing educational programs and for those developing new digital forensics programs. Existing programs are scattered among various colleges and departments, and there are significant gaps in the materials covered and relevant emerging technologies. Despite these challenges, the digital forensics field and its variety of subfields such as Internet of Things, mobile, cloud, network, and vehicle forensics have been steadily gaining academic interest and attention. Finding solutions and developing robust higher educational programs is a necessary step to improve the quality of digital forensics education and produce highly trained professionals with the skills required to detect, investigate and prosecute malicious cyber activities in civil litigations (e.g., corporate espionage), criminal investigations and national security investigations.
Article
Full-text available
Qualitative research methodology courses become a provision for postgraduate students to carry out research, as one of the three obligations of college. The course is a new subject and most students had never practiced it and had never been familiar with the concepts. The aims of the study is to analyzed the causes of learning difficulties and solutions carried out by students and by lecturers in qualitative research methodology courses. This study used a qualitative research approach with a case study design. Data were obtained from questionnaires and interviews with 20 postgraduate students of biology education, Universitas Negeri Malang. Data processing consists of: data reduction, data presentation, and making conclusions. The students experienced main problems in understanding the teaching materials used because it was written in English and the methods in various qualitative studies tend to be similar so causing confusion. Various solutions are carried out by students, for example: conducting discussions, compiling concept maps, and conducting qualitative research practices. Supporting lecturers have main difficulty in assessment. Lecturers take advantage of online media to facilitate assessment. The findings of this study provided alternative solutions for lecturers and students who take qualitative research methodology courses in order to minimize the constraints.
Article
Full-text available
Identification of operating system kernel version is essential in a large number of forensic and security applications in both cloud and local environments. Prior state-of-the-art uses complex differential analysis of several aspects of kernel implementation and knowledge of kernel data structures. In this paper, we present a working research prototype codeid-elf for ELF binaries based on its Windows counterpart codeid, which can identify kernels through relocation entries extracted from the binaries. We show that relocation-based signatures are unique and distinct and thus, can be used to accurately determine Linux kernel versions and derandomize the base address of the kernel in memory (when kernel Address Space Layout Randomization is enabled). We evaluate the effectiveness of codeid-elf on a subset of Linux kernels and find that the relocations in kernel code have nearly 100% code coverage and low similarity (uniqueness) across various kernels. Finally, we show that codeid-elf, which leverages relocations in kernel code, can detect all kernel versions in the test set with almost 100% page hit rate and nearly zero false negatives.
Conference Paper
Full-text available
Peer instruction pedagogy is a student-centric approach that encourages students to read lecture material before coming to class and engages them in class via group discussion and preplanned conceptual questions. Peer instruction has shown promising results in core computer science courses such as theory of Computation and Computer Architecture, as well as reducing failure rates and improving student retention in computer science major. is paper presents the results of the first-ever attempt to replicate these results in a cybersecurity course, using an action research methodology to implement and evaluate peer instruction in a semester-long cyber-security course, Introduction to Computer Security. e evaluation consists of quizzes, subjective exams, peer instruction questions, and attitudinal surveys gathered over two control semesters and one peer instruction condition semester. We nd evidence of learning gains during group discussion and improvements in dropout and failure rates compared to traditional lecture classes. In attitudinal surveys, most students report that they would recommend that other instructors use peer instruction.
Chapter
Full-text available
Societal dependence on Information and Communication Technology (ICT) over the past two decades has brought with it an increased vulnerability to a large variety of cyber-attacks. One such attack is a Distributed Denial-of-Service (DDoS) attack which harnesses the power of a larger number of compromised and geographically distributed computers and other networked machines to attack information-providing services, often resulting in significant downtime and thereby causing a denial-of-service to legitimate clients. The size, frequency, and sophistication of such attacks have exponentially risen over the past decade. In order to develop a better understanding of these attacks and defense system against this ever-growing threat, it is essential to understand their modus operandi, latest trends and other most widely-used tactics. Consequently, the study of DDoS attacks and techniques to accurately and reliably detect and mitigate their impact is an important area of research. This chapter largely focuses on the current landscape of DDoS attack detection and defense mechanisms and provides detailed information about the latest modus operandi of various network and application layer DDoS attacks, and presents an extended taxonomy to accommodate the novel attack types. In addition, it provides directions for future research in DDoS attack detection and mitigation.
Article
Full-text available
Over the past few years, a team at the University of New Orleans has worked to develop, and evaluate the effectiveness of, a set of 280 questions for three common cybersecurity courses—Introduction to Computer Security, Digital Forensics, and Network Penetration Testing. We performed a pilot study on a subset of the forensics questions in a workshop and found promising evidence of gains in student learning. The study showed that the students quickly adapted to the format, found it useful, and highly recommended the approach be extended to a wider range of subjects.
Chapter
Full-text available
In cloud environments, the typical response to a malware attack is to snapshot and shutdown the virtual machine (VM), and revert it to a prior state. This approach often leads to service disruption and loss of availability, which can have much more damaging consequences than the original attack. Critical evidence needed to understand and permanently remedy the original vulnerability may also be lost. In this work, we propose an alternative solution, which seeks to automatically identify and disable rootkit malware by restoring normal system control flows. Our approach employs virtual machine introspection (VMI), which allows a privileged VM to view and manipulate the physical memory of other VMs with the aid of the hypervisor. This opens up the opportunity to identify common attacks on the integrity of kernel data structures and code, and to restore them to their original state.
Conference Paper
Full-text available
We present a new type of attack termed denial of engineering operations in which an attacker can interfere with the normal cycle of an engineering operation leading to a loss of situational awareness. Specifically, the attacker can deceive the engineering software during attempts to retrieve the ladder logic program from a programmable logic controller (PLC) by manipulating the ladder logic on the PLC, such that the software is unable to process it while the PLC continues to execute it successfully. This attack vector can provide sufficient cover for the attacker»s actual scenario to play out while the owner tries to understand the problem and reestablish positive operational control. To enable the forensic analysis and, eventually, eliminate the threat, we have developed the first decompiler for ladder logic programs. Ladder logic is a graphical programming language for PLCs that control physical processes such as power grid, pipelines, and chemical plants; PLCs are a common target of malicious modifications leading to the compromise of the control behavior (and potentially serious consequences). Our decompiler, Laddis, transforms a low-level representation to its corresponding high-level original representation comprising of graphical symbols and connections. The evaluation of the accuracy of the decompiler on the program of varying complexity demonstrates perfect reconstruction of the original program. We present three new attack scenarios on PLC-deployed ladder logic and demonstrate the effectiveness of the decompiler on these scenarios.
Conference Paper
Full-text available
Historically, hands-on cybersecurity exercises helped reinforce the basic cybersecurity concepts. However, most of them focused on the user level attacks and defenses and did not provide a convenient way of studying the kernel level security. Since OS kernels provide foundations for applications, any compromise to OS kernels will lead to a computer that cannot be trusted. Moreover, there has been a great interest in using virtualization to profile, characterize, and observe kernel events including security incidents. Virtual Machine Introspection (VMI) is a technique that has been deeply investigated in intrusion detection, malware analysis, and memory forensics. Inspired by the great success of VMI, we used it to develop hands-on labs for teaching kernel level security. In this work, we present three VMI-based labs on (1) stack-based buffer over-flow, (2) direct kernel object manipulation (DKOM), and (3) kernel integrity checker which have been made available online. Then, we analyze the differences in approaches taken by VMI-based labs and traditional labs and conclude that VMI-based labs are better as opposed to traditional labs from a teaching standpoint because they provide more visibility than the traditional labs and superior ability to manipulate kernel memory which provides more insight into kernel security concepts.
Article
Full-text available
Programmable logic controllers (PLCs) automate the control and monitoring of physical industrial and infrastructure processes such as power generation, gas pipelines, and water management. Due to the convergence of networking infrastructure, PLCs can be exposed to cyberattacks over the network with potentially catastrophic consequences. This contribution introduces the basic mechanisms by which various attacks can be detected, analyzed, and, ultimately, remedied.
Article
Full-text available
Most SCADA devices have few built-in self-defence mechanisms, and tend to implicitly trust communications received over the network. Therefore, monitoring and forensic analysis of network traffic is a critical prerequisite for building an effective defense around SCADA units. In this work, we provide a comprehensive forensic analysis of network traffic generated by the PCCC(Programmable Controller Communication Commands) protocol and present a prototype tool capable of extracting both updates to programmable logic and crucial configuration information. The results of our analysis show that more than 30 files are transferred to/from the PLC when downloading/uploading a ladder logic program using RSLogix programming software including configuration and data files. Interestingly, when RSLogix compiles a ladder-logic program, it does not create any low-level representation of a ladder-logic file. However, the low-level ladder logic is present and can be extracted from the network traffic log using our prototype tool. The tool extracts SMTP configuration from the network log and parses it to obtain email addresses, username and password. The network log contains password in plain text.
Conference Paper
Full-text available
This paper presents a supervisory control and data acquisition (SCADA) testbed recently built at the University of New Orleans. The testbed consists of models of three industrial physical processes: a gas pipeline, a power transmission and distribution system, and a wastewater treatment plant--these systems are fully-functional and implemented at small-scale. It utilizes real-world industrial equipment such as transformers, programmable logic controllers (PLC), aerators, etc., bringing it closer to modeling real-world SCADA systems. Sensors, actuators, and PLCs are deployed at each physical process system for local control and monitoring, and the PLCs are also connected to a computer running human-machine interface (HMI) software for monitoring the status of the physical processes. The testbed is a useful resource for cybersecurity research, forensic research, and education on different aspects of SCADA systems such as PLC programming, protocol analysis, and demonstration of cyber attacks.