Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

CyberBOT: Towards Reliable Cybersecurity Education via Ontology-Grounded Retrieval Augmented Generation

Created by
  • Haebom

Author

Chengshuai Zhao, Riccardo De Maria, Tharindu Kumarage, Kumar Satvik Chaudhary, Garima Agrawal, Yiwen Li, Jongchan Park, Yuli Deng, Ying-Chih Chen, Huan Liu

Outline

This paper introduces CyberBOT, a question-answering chatbot that provides reliable and relevant information in cybersecurity education. CyberBOT leverages a search-augmented generation (RAG) pipeline to integrate contextual information from course materials and validates responses using a domain-specific cybersecurity ontology. This ontology serves as a structured inference layer that constrains and validates LLM-generated answers, reducing the risk of misleading or insecure instructions. CyberBOT has been deployed in a large graduate course at Arizona State University (ASU), with over 100 students actively using the web-based platform. Computational evaluations in a laboratory setting demonstrate CyberBOT's potential, and future field studies will assess its educational impact.

Takeaways, Limitations

Takeaways:
Presenting the possibility of developing a reliable AI-based question-and-answer system specialized for cybersecurity education.
Improving the safety and accuracy of LLM through integration of the RAG pipeline and domain-specific ontologies.
Successful implementation in a real university lecture environment and presentation of active use cases by students.
Presenting a direction for developing reliable and curriculum-aligned AI applications in professional education through the integration of structured domain reasoning and generative AI capabilities.
Limitations:
Currently, only computational evaluation results from laboratory environments have been presented, and there are no actual field studies on educational effectiveness.
The need for verification and ongoing management of the completeness and accuracy of the ontology.
Further research is needed to determine the applicability and generalizability of these findings to various cybersecurity training courses.
👍