isecure: Integrating Learning Resources for Information Security Research and Education The isecure team



Similar documents
Search and Information Retrieval

INDEX OF LEARNING STYLES *

Association between Brain Hemisphericity, Learning Styles and Confidence in Using Graphics Calculator for Mathematics

Giuseppe Riccardi, Marco Ronchetti. University of Trento

Recommender Systems: Content-based, Knowledge-based, Hybrid. Radek Pelánek

Legal Informatics Final Paper Submission Creating a Legal-Focused Search Engine I. BACKGROUND II. PROBLEM AND SOLUTION

Mining Text Data: An Introduction

Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Intinno: A Web Integrated Digital Library and Learning Content Management System

A Study in Learning Styles of Construction Management Students. Amit Bandyopadhyay, Ph.D., PE, F.ASCE State University of New York -FSC

MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Blended Course Evaluation Standards

A SUCCESSFUL STAND ALONE BRIDGE COURSE

An Investigation into Visualization and Verbalization Learning Preferences in the Online Environment

Search Engines. Stephen Shaw 18th of February, Netsoc

Semantic Web based e-learning System for Sports Domain

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

HELP DESK SYSTEMS. Using CaseBased Reasoning

ONTOLOGY-BASED GENERIC TEMPLATE FOR RETAIL ANALYTICS

Movie Classification Using k-means and Hierarchical Clustering

ConTag: Conceptual Tag Clouds Video Browsing in e-learning

A collaborative platform for knowledge management

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

Search Result Optimization using Annotators

1 o Semestre 2007/2008

LMS Evaluation Tool User Guide

A Review On Authoring Tools

Best Practices in Online Course Design

Semantic Search in Portals using Ontologies

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

Automated News Item Categorization

dm106 TEXT MINING FOR CUSTOMER RELATIONSHIP MANAGEMENT: AN APPROACH BASED ON LATENT SEMANTIC ANALYSIS AND FUZZY CLUSTERING

LinkZoo: A linked data platform for collaborative management of heterogeneous resources

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment Marque Browne Manuel Honegger

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

MIS630 Data and Knowledge Management Course Syllabus

Learning and Teaching Styles in Language, Science and Technology Education in Nigeria.

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL

Enhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects

NNMi120 Network Node Manager i Software 9.x Essentials

WHITE PAPER. Peter Drucker. intentsoft.com 2014, Intentional Software Corporation

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance

DIGITAL MARKETING TRAINING

Recognition. Sanja Fidler CSC420: Intro to Image Understanding 1 / 28

CTL Online Workshop Program Referral Resource Sheet

LEARNING STYLE PREFERENCES AND LEARNING STRATEGIES IN INTENSIVE CARE NURSE EDUCATION.

9. Text & Documents. Visualizing and Searching Documents. Dr. Thorsten Büring, 20. Dezember 2007, Vorlesung Wintersemester 2007/08

Big Data Text Mining and Visualization. Anton Heijs

Automatic Timeline Construction For Computer Forensics Purposes

Use of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet

Distance Education Learning Resources Unit Document Title: Online Course Review Checklist Last Updated: July 17, 2013 by the DE Office Draft Final

Wiley PLUS Student User Guide

Integrating Business Intelligence Module into Learning Management System

How To Improve Cloud Computing With An Ontology System For An Optimal Decision Making

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari

Enterprise Architecture Modeling PowerDesigner 16.1

Incorporating Window-Based Passage-Level Evidence in Document Retrieval

Business Intelligence and Decision Support Systems

How To Develop Software

HCC ONLINE COURSE REVIEW RUBRIC

A SYSTEM FOR AUTOMATIC QUERY EXPANSION IN A BROWSER-BASED ENVIRONMENT

Automated Lecture Transcription

Administrator's Guide

/ / TABLEAU TRAINING DURATION 30hrs

Analysing the Behaviour of Students in Learning Management Systems with Respect to Learning Styles

Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 29-1

Phase 1 pilot 2005/6 Intervention. GCU Caledonian Business School Business Management Page 1 of 8. Overview

IT Academy Lesson Plan

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Experiments in Web Page Classification for Semantic Web

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

Effectiveness of Flipped learning in Project Management Class

Modifying Curriculum and Instruction

Developing Critical Thinking Skills with The Colbert Report

lnteractivity in CALL Courseware Design Carla Meskill University of Massachusetts/Boston

GCE APPLIED ICT A2 COURSEWORK TIPS

OPTIMIZING YOUR WEBSITE. Inbound Certification Class #2

Clustering Technique in Data Mining for Text Documents

DESIGN AND STRUCTURE OF FUZZY LOGIC USING ADAPTIVE ONLINE LEARNING SYSTEMS

How to Create a Voicethread PowerPoint Presentation

Delta Journal of Education ISSN

WebSphere Business Monitor

Desktop Computing in Skillport Finding Approved Folders and Printing Certificates of Completion

Annotea and Semantic Web Supported Collaboration

Stop searching, find your files and s fast.

INTERNET MARKETING. SEO Course Syllabus Modules includes: COURSE BROCHURE

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS

Transcription:

isecure: Integrating Learning Resources for Information Security Research and Education The isecure team 1

isecure NSF-funded collaborative project (2012-2015) Faculty NJIT Vincent Oria Jim Geller Reza Curtmola CUNY Soon Ae Chun MSU Edina Renfro-Michel Students NJIT Sheetal Rajgure (PhD) Arwa Wali (PhD) Deepthi Mandepudi (MS) Krithika Raghavan (MS) MSU Sailume Walo (PhD) 2

Millennials Multitask Have Short Attention Spans Tend to be Visual Learners Bore Easily Want Instant Gratification Want Control Over Their Learning Have an Expectation to Achieve Lack Self-Reflection Skills 3

Millennials Successful online courses need to utilize a variety of teaching tools Enhance learning for students using different learning styles Keep student attention Individualize learning (pace & information) 4

Online courses It can be difficult for students to coordinate all of the course material in a meaningful way How to reduce attrition rates for online courses? How can we make online teaching more attractive and effective? 5

isecure Online lecture materials are very popular Coursera MIT OpenCourseWare Multimedia data often relies on annotation. However, manual annotation is tedious How to effectively and efficiently search such a huge amount of heterogeneous data? 6

isecure Integration of multi-media teaching materials (slides, videos and textbooks) for Security courses based on a security ontology Segmenting and annotating learning media based on their learning content Building a Security Ontology to be used for annotating and querying the learning objects Adapting lecture contents to student learning styles Evaluating the usability and effectiveness of the linked multimedia learning system 7

Presentation Outline isecure modules Ultimate Course Search tool Security Ontology Evaluation & Learning styles Conclusion 8

isecure and Multimedia Learning Materials Multimedia is more and more used in teaching Slides, textbook, videos No link across the media The classical approaches based on visual features are not applicable Learning concepts Learning Concepts Complex semantics 9

Security Ontology isecure Modules SLOB: Security Ontology Browsing and Searching SKAT: Security Knowledge Acquisition Tool Team: James Geller, Soon Ae Chun, Arwa Wali, with Reza Curtmola and Roberto Rubino as the Information Security experts Ultimate Course Search (UCS) Slide, video and textbook indexing and search Team: Vincent Oria, Sheetal Rajgure, Krithika Raghavan, Deepthi Mandepudi, Hardikrasiklal Dasadia (MS), Saishashank Devannagari (MS) Evaluation UCS currently being used in CS 357 @ NJIT Team: Edina Renfro-Michel, Sailume Walo 10

Ultimate Course Search Indexing, Searching (Scoring and Ranking) 11

isecure and Multimedia Learning Materials: Goal The purpose of this tool is to bring different learning media (textbook, PowerPoint slides, and videos) to a single platform Enhance learning of students Enable easy search of lecture materials 12

TF-IDF Vector Space Model from Information Retrieval Documents and queries are represented as weighted vectors Distinct index term (keyword) is treated as a dimension in the vector space, and weights are TF-IDF values TermFrequency(t,x) is proportional with the number of occurrences of the term t in x InverseDocumentFrequency(t) is inversely proportional with the number of documents containing term t 13

PowerPoint Presentation Structuring the slides Every slide s content is extracted and structured in the form of XML elements consisting of slide number, slide title and slide text <Presentation title= Ptitle > <Slide slidenumber= 1 > </Slide> </Presentation> Analyze the content <SlideTitle> title </SlideTitle> <SlideText> text </SlideText> Text is broken into a series of atomic elements/tokens The keywords are identified after the text is analyzed to remove whitespaces, stop words etc. The keywords are stemmed using English Stemmer, updated version of Porter Stemmer s algorithm 14

PowerPoint Presentation Indexing Build an inverted index for stemmed keywords For every keyword, keep a list of triples: (slide number, frequency in slide title, frequency in slide body) For every presentation, keep a list of slides associated with that presentation 15

PowerPoint Presentation Searching A slide s relevance is based on: Term frequency / Inverse document frequency Cosine similarity: Sim(q, d) = V(q)!V(d) V(q)! V(d) Keyword location in the slide (title, body) Only consider slides that contain query keywords A presentation s relevance is based on: An aggregation (sum) of the relevancy scores of the slides in the presentation Presentations are ranked and displayed based on their relevancy (higher to lower) 16

17

Lecture Video To identify which portion of a lecture refers to a specific slide, we need to segment the lecture video We determine slide transition in the video: Based on features of recording software (for new videos) Based on image processing techniques (for videos priorly recorded) Once transition is found, we can easily determine the duration of the slide segment in the video 18

Lecture Video Indexing The video lectures are converted to an XML hierarchy: <Video filename = videofilename.mp4 presentationfilename = relatedpresentationfile.ppt > <Slide slidenumber = 1> </Slide> </Video> <StartTime>in ms</starttime> <EndTime> in ms </EndTime> For every video segment corresponding to a presentation slide, record the slide number and the presentation associated with that video segment 19

Lecture Video Searching For incorporating search on videos, we rely on extracted text and scoring for PowerPoint slides When a user searches for a keyword, the video files corresponding to the slides are linked to the result with the start and end time 20

21

Textbook Indexing and Searching We use the textbook s Index of Terms and the Security Ontology to create our index An inverted index that keeps a list of textbook page numbers for every Index Term The book s index terms and page numbers of each term s occurrences are organized as the following XML: <Textbook title = textbooktitle > <Keyword> <Word> index term</word> <PageNumber>1,2,3 </PageNumber> </Keyword> </Textbook> To search, we match query keywords with Index Terms 22

23

isecure: Security Ontology Soon Ae Chun, CUNY-CSI James Geller, NJIT Reza Curtmola, NJIT Arwa Wali, NJIT PhD Student Amy Luo, CUNY-CSI Honors College 24

Outline Project Goals Develop Security Ontology Approach & results Bootstrapping approach SOB Tool Expert Tool SKAT Tool Ongoing and Next Steps 25

Project Goals: Cyber Security Ontology Learning starts with grasping the Concepts and Rela,onships in a domain. Model Cyber Security Domain Knowledge o Develop Cyber Security Ontology Apply Cyber Security Ontology for Cyber Security EducaJon o SemanJc DescripJon o SemanJc Linking o SemanJc Search and Browsing o Security Learning by Concepts o Support sharing, querying and reuse of domain knowledge 26

Develop Cyber Security Ontology Challenges: Knowledge Engineering has been labor intensive, resorjng to manual processes Our approach Semi- automajcally build ontology from textbook index Challenge of idenjfying Security Domain Concepts Challenge of building hierarchical structure of ontology & other relajonships Categories or classes (is- a or taxonomic relajons) RelaJonships between concepts (property) Challenge of verifying ontology Manual categorizajon ValidaJon of ontology 27

Our Approach: Seed Ontology- based bootstrapping Use of Textbook index terms as domain concepts Use an exisjng Ontology as a basic scaffold Herzog s ontology Fenz s ontology Develop a human expert tool VerificaJon and manual classificajon and edijng 28

Seed Ontology: Top- Level Concepts and RelaJonships Asset Counterm easure/ Control Threat Vulnerability Fenz et al. 2009 29

Seed Ontology: Upper level Security Ontology Threat Countermeas ures Asset Asset, Counter Measures, Vulnerability, Threat Goal, Model, Product, defense strategy Herzog et al. 2007 - - h^p://www.ida.liu.se/~iislab/projects/secont/main.jpg 30

Herzog et al. Fenz et al. Criteria to choose a seed ontology: AnnotaJon power Useful concepts to annotate the learning objects Covering power Number of terms covered in the security textbook 31

Ontology Enrichment Components Textbook Index Pre- processing Seed Ontology Ontology Enrichment Engine Exact String matching Substring Matching Wikipedia Category TOC for rela,onships Concept Defini,ons Enriched Security Ontology WIKIPedia NIST DefiniJons 32

Results Total 724 index terms Seed Ontology 375 88 Index terms 636 375 Enriched Ontology 263 Index terms 361 33

SKAT: Security Knowledge AcquisiJon Tool Allow domain experts to classify lehover index terms from a security textbook into the security ontology. Design Goals RecommendaJon of concept classes for unclassified index terms, to minimize cognijve burden Help the security expert define most related class for an index term 34

Recommending Ontology Concepts Co- occurrence Analysis For the lehover index terms, we use human experts to classify them to the ontology Recommend the potenjally related ontology classes (concepts) for each index term Coocurrence analysis From Textbook, idenjfy all sentences where Term t in index co- occur with concept classes (c1, c2, ) in the ontology Recommend these co- occurring concepts for the term t 271 Terms co- occur with ontology concepts and 44 do not co- occur with any concepts An expert knowledge acquisijon TOOL 35

Ontology Bootstrapping Components Textbook Index Pre- processing Ontology Enrichment Engine Exact String matching Substring Matching Wikipedia Category TOC for rela,onships Concept Defini,ons Enriched Security Ontology Bootstrap Ontology SKAT Tool WIKIPedia NIST DefiniJons 36

Current acjvijes SKAT tool- based expert classificajon EvaluaJon of efficacy of the tool EvaluaJon of the automated bootstrapping based ontology SOB: Cyber Security Ontology Browser Enrich Security Ontology Pre- requisite relajons between Learning concepts, difficulty levels of concepts, etc. 37

SKAT Tool 38

SOB Tool 39

Next Phase AcJviJes Develop Linked Data of Learning Resources Not only the classroom materials but also open learning objects, learning data Cyber- security ontology based annotajon/indexing Modeling of Learners Learning preferences Learning history SLOBS: Security Learning by Ontology Browsing and Searching Learning concept definijons and related resources Ranking and presentajon of search results Consider Learners model for Search and PresentaJon EvaluaJon of the tool for learning cyber security 40

Evaluation Integrate Learning Information, teach this information to students Acquire Feedback from Students to Improve UCS Determine Student Usage of UCS Determine Learning Outcomes of UCS 41

Learning Preferences Index of Learning Preferences (Felder & Soloman, 1993) Four Types of Learners Active Reflective Sensing Intuitive Visual Verbal Sequential - Global 42

ILS Learning Styles Inventory Active and Reflective Active learners like to interact with new material Reflective learners like to think about applying material Sensing and Intuitive Sensing learners like material that applies to the real world Intuitive learners enjoy learning new material and dislike repetition 43

ILS Learning Styles Inventory Visual and Verbal Visual learners remember material presented through pictures or demonstrations Verbal learners tend to remember written and spoken explanations Sequential and Global Sequential learners like to link information in logical steps Global learners like looking at the big picture and how it related to larger themes before understanding all of the details 44

ILS Results on a Continuum ACT REF 11a 9a 7a 5a 3a 1a 1b 3b 5b 7b 9b 11b SEN INT 11a 9a 7a 5a 3a 1a 1b 3b 5b 7b 9b 11b VIS VRB 11a 9a 7a 5a 3a 1a 1b 3b 5b 7b 9b 11b SEQ GLO 11a 9a 7a 5a 3a 1a 1b 3b 5b 7b 9b 11b 45

The Research Currently Collecting Data in a Security Course Control and Experimental Demographics, Pre-Post Test, ILS User Feedback and Suggestions Back End User Data 46

Midterm Survey Feedback How are the students using UCS? Search for Information/specific words & terms Review video podcast lectures As a reference To study for the Midterm To help complete class projects 47

Midterm Survey Feedback What did the students like about UCS? User friendly Search engine Fast and accurate Search exact words Tabs and specific information Search Videos Searches lead to a lot of information 48

Implications for Higher Education Reduce attrition Increase clarity of course organization Increase student interaction with materials Individualize learning Create connections within and between courses 49

Q&A CONTACT INFO Ultimate Course Search Tool Vincent Oria: vincent.oria@njit.edu Security Ontology Soon Ae Chun: soon.chun@csi.cuny.edu James Geller: james.geller@njit.edu Evaluation & Learning styles Edina Renfro-Michel: renfromichee@mail.montclair.edu 50