An Ontology-based e-learning System for Network Security Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi Sendai National College of Technology a0432@ccedu.sendai-ct.ac.jp Goichi Itabashi Graduate School of Information Sciences, Tohoku University Scientia Corporation itabashi@scientia.co.jp Yasushi Kato, Kaoru Takahashi Sendai National College of Technology kato@info.sendai-ct.ac.jp, kaoru@cc.sendai-ct.ac.jp Norio Shiratori Research Institute of Electrical Communication, Tohoku University norio@shiratori.riec.tohoku.ac.jp Abstract Effective information services could be provided for users by investing meta-data in information sources and making software agents understand it. In this paper, we make better use of a collection (ontology) of meta-data in the Semantic Web technology for the design of an e- learning system that enables to provide learners with a more effective education support. The learning domain is cryptography in network security. We define various concepts in the cryptographic domain and the relations among them as the ontology, and propose a way of utilizing it in the learning process. The strength of our ontology-based e-learning system is demonstrated through application examples of the prototype system that we have been developing. 1. Introduction Many problems that cannot be worked out using only individual information sources may be effectively solved by combining and utilizing many heterogeneous information sources in a uniform and integrated way. There is the concept of information integration for achieving this purpose, and there is a proposal of a common integrated architecture In W3C (World Wide Web Consortium), the Semantic Web project is in progress [1][2] which is considered as one way of information integration. It aims at developing a more advanced and reliable Web model, by adding semantic information (meta-data) to the information sources on WWW (World Wide Web) and by making software agents process the information sources based on the meta-data. On the other hand, for education where the information technology is utilized, there are methods such as CBT (Computer-Based Training) which is stand-alone type and WBT (Web-Based Training) which is based on network and Web [3][4]. E-learning includes CBT and WBT, and it is characterized as anywhere, anytime, anyone instruction delivered over the Internet. In this paper, we intertwine the Semantic Web technology with e-learning. The learning domain is cryptography in network security. We define various concepts in the cryptographic domain and the relations among them as the ontology, and propose a way of utilizing it in the learning process. We have been designing and implementing a prototype of this e-learning system. The strength of our ontology-based e-learning system is demonstrated through application examples of the prototype system. This paper is organized as follows. Section 2 summarizes the Semantic Web and ontology. We design an e-learning system for cryptography in Section 3. An im-
Figure 2. An RDF example. Figure 1. Layered structure of Semantic Web. plementation of its prototype and some examples are described in Section 4. Finally, in Section 5, we conclude this paper with summary and future study. 2. Semantic Web and Ontology The Semantic Web is a model of the Web in which software agents understand and automatically process the information instead of human by giving meta-data to all information sources available on the Web [1][2]. This technology is organized under the concept of the layered structure shown in Figure 1. In the achievement of the Semantic Web, RDF (Resource Description Framework) [5], RDF Schema (RDF Vocabulary Description Language) [6] and the ontology language OWL (Web Ontology Language) [7] are important technologies. RDF offers a standard mechanism to describe metadata that can be understood by the machine. RDF provides a data model and a grammar to describe the predicate and the object in its Model and Syntax specification. The data model of RDF consists of three components: a resource, a property and a statement. A statement consists of a subject, a predicate and an object. These are usually described in XML (extensible Markup Language). However, there is N3 (Notation3) [8] as the third notation for describing the RDF model. N3 is not only compact and comprehensible but also can express Quotation that the description is difficult in the XML syntax. Furthermore, the Rules and Logic framework layers of the Semantic Web can be concretely described by using N3. As an example, when the vocabulary such as Doctor, treats, Diseases and name is defined in a certain document, the relation The doctor treats diseases. The doctor s name is Thomas. is represented as an RDF graph shown in Figure 2. In N3, it is described as follows: Doctor treats Deseases ; name Thomas. In N3, URIs (Uniform Resource Identifiers) that show a subject, a predicate and an object are enclosed with and enumerated. A period is put at the end. When the object is a literal, it is enclosed with. There is a shortcut for when there are several statements about the same subject. A semicolon ; introduces another property of the same subject. RDF Schema offers a basic mechanism to define the category of these properties and general resources. A necessary class can be defined by using the basic classes, the basic properties, etc. prepared in the specification of RDF Schema, and its instances and subclasses can be derived. In the Web, to relate the vocabulary (or concepts) originally defined here and there, and to interoperate each other, an ontology plays an important role. An ontology is used by people, databases and applications that need to share domain information, and it includes computer-usable definitions of basic concepts in the domain and the relationships among them. An ontology is usually expressed in a logic-based language so that detailed, accurate, consistent, sound and meaningful distinctions can be made among the classes, properties and relations. It encodes knowledge in a domain and also knowledge that spans several domains. In this way, it makes that knowledge reusable. OWL is the language developed by W3C that fills the requirement of ontology sharing, evolution, interoperability and inconsistency detection requested from the Web ontology language. In Figure 1, the Rules layer defines logic as a common basis that enables query and filtering. The Logic Framework layer describes knowledge that uses logic such as the first-order logic, and does the processing of the agent based on it. The Proof layer shows foundation like the history and the reason for the agent processing that leads to the processing result. The Trust layer guarantees the reliability of meta-data offered by the Semantic Web and the processing result of the agent which interprets and processes the meta-data.
3. Design of e-learning System 3.1. Outline and Characteristic We design an e-learning system on the Web in which a learner can study cryptography using a Web browser. This system introduces the concept of the Semantic Web, particularly the concept of ontology, into the design of the system. By using ontology, not only the learning materials but also the vocabulary of the concepts contained in the learning materials and their relations can be delivered to the learner. In this way, the following advantages are yielded in comparison with the traditional e-learning without ontology: Additional information can be also offered when the learner is provided with the learning materials. When a word (or concept) the learner wants to inquire is searched, the learner can get the information that represents the relation of the word with other words. For the part in which the learner made a mistake in an assessment (test), the system can feedback various words related with the mistake as well as the correct answer. In the process of learning, the system can adjust the amount of information provided to the learner and can infer the learning contents to be studied following the present contents, according to the learner s experience. Consequently, it is expected that convenience for the learner is enhanced and easy understanding of the learning contents is accomplished, because words to be studied and the relations among them are comprehensible and the learner can easily image the whole learning domain. 3.2. Ontology for Cryptography and its Use The ontology for cryptography is described in Notation3 which can simplify description in RDF. Figure 3 shows part of the ontology used in our e-learning system. It says A public key cipher is a cipher and uses a public key and a private key. A public key is a key. The system refers to the ontology, if need be, and it provides the learner with additional necessary information, while he/she peruses the contents of the learning materials. Also, when the learner wants to inquire further into a word, it searches the ontology for the word. As the result of this search and inference, the learner Figure 3. Part of ontology in Notation3. can acquire information such as the role of (the concept corresponding to) the word in the cryptographic domain. In this ontology, the relation among words (concepts) important in the cryptographic domain is organized as shown in Figure 4. The related two words are connected by an arrow and the name of the relation is attached to the arrow. There exist relations such as subclassof, has, type, equivalentclass, etc. The contents of this ontology are explained below: Cipher and authentication are two important concepts in cryptography. By cipher, the eavesdropping can be avoided and confidentiality which is the inverse concept of eavesdropping can be achieved. There are two ciphers, i.e. shared-key cipher and publickey cipher. Shared-key cipher is often identified with symmetric-key cipher, secret-key cipher and commonkey cipher. DES and Caesar cipher belong to sharedkey cipher where shared-keys are used. A shared-key is also called a symmetric-key. RSA and Elgamal cipher belong to public-key cipher where public-keys and private-keys (also called secret-keys) are used. They are keys and are used for encryption and decryption. In encryption, a plaintext is input and a ciphertext is output. On the other hand, in decryption, a ciphertext is input and a plaintext is output. Encryption and decryption are important concepts which constitute cipher. By authentication that uses cipher together, tampering and spoofing can be avoided. Integrity and authenticity are the inverse concepts of tampering and spoofing, respectively. Eavesdropping, tampering and spoofing threaten security. Hash functions such as SHA-1 and MD5 are used for authentication. A hash function inputs a plaintext and outputs a hash value. The above mentioned ontology can be used during the learning process, to provide the learner with intelligible learning information for cryptography. In the concrete, this ontology is applicable to the cases where a search for (the meaning of) a word is performed, a review of the portion mistaken in an assessment (test) is
Figure 4. Ontology for cryptography (part). of experience based on the learner s past history, past test results and so on. When the learning materials are perused, if the depth of experience is deep, the quality and quantity of the offered learning materials will be raised; on the other hand, if shallow, those will be reduced and the learning will be performed from the basics. 3.3. System Function Figure 5. Reasoning. performed, etc. In case of a word search, this system reasons as shown in Figure 5 for the specified word. In this figure, a dotted arrow shows the portion of the reasoning result. The learner can choose the depth of reasoning and thus he/she can attain the learning information according to the degree at which he/she wants to study. For the learner, the main part of learning is in perusal of the learning materials. If the system can use his/her personal information (profile), it is expected that the learning materials will become easier to be used. Therefore, we prepare another knowledge, i.e. learner profile, besides the cryptographic ontology. The learner profile includes the information about the depth The main functions of this e-learning system are as follows. Login security In order to protect personal and confidential information, a login security is required. When the learner uses this system, his/her account and password need to be input. The password is encrypted by using MD5 which is one of the hash functions and is then transmitted to the server of this system. Delivery of learning materials This is the function to provide the learner with the learning materials. By making better use of the ontology and learner profiles, it is planned that the optimal materials are provided. Assessment (test) After the learner studies with the learning materials to some extent, an assessment for achievement is made.
Figure 7. Query about a word. Figure 6. System configuration. Perusal of personal information The assessment results, the mistaken parts, etc. can be perused. Word search This is used when there is a word (or concept) the learner wants to know in detail at the time of learning material perusal. For this purpose, the ontology is used to infer the related words. The search can be performed in accordance with the degree at which the learner wants to know, and a multi-stage reasoning is also possible. Adaptation of amount of learning materials With reference to the learner profile, the amount of information of the learning materials is adjusted according to the learner s experience. For the learner with a deep experience, a large amount of information is offered to raise knowledge further. On the other hand, a small amount of information (i.e. basics) is offered for the learner with a shallow experience. Moreover, at the time of learning material perusal, the learner can get the information such as antonym and synonym related with an interesting word. In order to realize the above functions, we have designed our e-learning system as shown in Figure 6. We outline how the system works below. A request from a learner is classified by Servlet at the server side, and the corresponding Bean is generated. When the desired learning material is picked out from the database, the ontology is referred for reasoning. Then if there is additional information, it is added and offered together. All of these information is passed to JSP (Java Server Pages), and is finally answered to the browser of the learner in HTML form. The communication between the client and server machines is securely performed using SSL (Secure Sockets Layer) which is a protocol for secure exchange of information on the Internet. 4. Implementation 4.1. Outline We have been implementing a prototype of the e- learning system designed in the preceding section. The prototype system has been built on the LAN of our college. The underlying OS is Windows2000 and the main implementation language is JAVA. In the following, we show the technology used in the implementation with an example. Suppose that a request for perusal of a learning material is issued from a learner. It reaches Servlet via the Web browser. In Servlet, a program dynamically generates HTML or other resources, and it returns the result to the Web browser. The requested processing is classified and Bean which performs the processing is generated. Bean is a kind of class whose properties and methods can be used from JSP. For this example, Bean for perusal of learning materials is generated. It acquires the corresponding information from the database, referring to the ontology. PostgreSQL is used for access to the database. The acquired information is passed to JSP. JSP can embed JAVA codes in HTML so that it becomes easy to, for example, change data to be displayed. Finally, with this mechanism, the acquired information is delivered to the learner via the Web browser in HTML form. SSL is used for secure communication between client and server. 4.2. Example Figure 7 shows a word search box on a Web browser. It is used when there is a word which the learner wants to know at the time of learning material perusal. The searchable words are contained in the box in advance. The learner chooses an interesting word from there. As described before, a flexible search in accordance with the degree at which the learner wants to know is possible. In the server side, the required information is reasoned with reference to the ontology and is offered to the learner. In case of a more detailed search, the learner can specify a multi-stage reasoning. We show below some examples that are presently demonstrable although this prototype system is still under development.
Figure 8. Query response. Figure 9. Adaptation of learning materials. Assume a situation where the word public-key is searched more in two stage reasoning. For this query, the system performs the reasoning as shown in Figure 5 with reference to the ontology (Figure 4) and understands that public-key is used in public-key cipher and it is a subclass of key. As a consequence, the related information is retrieved from the database. Then the result is returned to the learner as a response as shown on the window in Figure 8 where various information related with public-key is delivered to the learner in an easy-to-understand form. This is obtained from the ontology and database. Since this example is two-stage reasoning, the information about key and public-key cipher is also obtained. Next, we demonstrate an example where the amount of information of the learning materials is adapted according to the learner s experience. In learning RSA, the window in Figure 9 shows the contents which are offered to inexperienced learners about cryptography. An explanation of important concepts is mainly offered and theoretical parts such as formulas are not presented. On the contrary, experienced learners are offered theoretical parts such as formulas. By repeating the above learning, the learner could gradually understand the whole cryptographic domain. As the relations among individual concepts are also learned naturally, the learner could learn the whole concept efficiently. 5. Conclusion In this paper, we have considered a way of applying the Semantic Web technology to the design of e- learning system for cryptography, and described the development of a prototype system. This system is yet under development. It remains to sophisticate and complete the design in the following points, for example: completing the ontology and learning materials; using context or structure of the learning materials as knowledge; considering how to utilize the ontology for the feedback from the system in the process of learning or on an assessment. It is also important future works to investigate the advantages and disadvantages of the system through its use by many learners and to do an evaluation and improvement of the system. References [1] W3C, Semantic Web, http://www.w3.org/2001/sw [2] T.Berners-Lee, Semantic Web road map, http://www.w3.org/designissues/semantic.html, 1998. [3] W.Horton, Designing Web-based training : how to teach anyone anything anywhere anytime, John Wiley & Sons, 2000. [4] M.J.Rosenberg, E-learning: strategies for delivering knowledge in the digital age, McGraw-Hill, 2001. [5] W3C, Resource description framework (RDF), http://www.w3.org/rdf [6] W3C, RDF vocabulary description language 1.0: RDF schema, http://www.w3.org/tr/rdf-schema, 2004. [7] W3C, OWL Web ontology language reference, http://www.w3.org/tr/owl-ref, 2004. [8] T.Berners-Lee, Notation3, http://www.w3.org/designissues/notation3.html, 1998.