This is a page that curates AI-related papers published worldwide. All content here is summarized using Google Gemini and operated on a non-profit basis. Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.
CyberBOT: Towards Reliable Cybersecurity Education via Ontology-Grounded Retrieval Augmented Generation
Created by
Haebom
Author
Chengshuai Zhao, Riccardo De Maria, Tharindu Kumarage, Kumar Satvik Chaudhary, Garima Agrawal, Yiwen Li, Jongchan Park, Yuli Deng, Ying-Chih Chen, Huan Liu
Outline
This paper introduces CyberBOT, a question-answering chatbot that provides reliable and relevant information in cybersecurity education. CyberBOT leverages a search-augmented generation (RAG) pipeline to integrate contextual information from course materials and validates responses using a domain-specific cybersecurity ontology. This ontology serves as a structured inference layer that constrains and validates LLM-generated answers, reducing the risk of misleading or insecure instructions. CyberBOT has been deployed in a large graduate course at Arizona State University (ASU), with over 100 students actively using the web-based platform. Computational evaluations in a laboratory setting demonstrate CyberBOT's potential, and future field studies will assess its educational impact.
Takeaways, Limitations
•
Takeaways:
◦
Presenting the possibility of developing a reliable AI-based question-and-answer system specialized for cybersecurity education.
◦
Improving the safety and accuracy of LLM through integration of the RAG pipeline and domain-specific ontologies.
◦
Successful implementation in a real university lecture environment and presentation of active use cases by students.
◦
Presenting a direction for developing reliable and curriculum-aligned AI applications in professional education through the integration of structured domain reasoning and generative AI capabilities.
•
Limitations:
◦
Currently, only computational evaluation results from laboratory environments have been presented, and there are no actual field studies on educational effectiveness.
◦
The need for verification and ongoing management of the completeness and accuracy of the ontology.
◦
Further research is needed to determine the applicability and generalizability of these findings to various cybersecurity training courses.