Building Knowledge Graphs from Unstructured Texts: Applications and Impact Analyses in Cybersecurity Education
Abstract
:1. Introduction
Knowledge Graphs for Cybersecurity Education
2. Related Work
2.1. Ontology Development
2.2. Knowledge Graph Construction in Cybersecurity Domain
3. Methods
- From the student perspective, we have the following:
- 1.
- Concept Visualization: The first objective was to provide a visual concept graph for students to learn the key concepts of a complex course such as cybersecurity. The conceptual graphs help in breaking down task instructions, thereby allowing the students to visually analyze and implement the project’s challenges.
- 2.
- Question Answering: As a downstream task, we built an interactive chatbot for the students to promote self-learning. The students are able to query the system for frequently asked questions on the lab system’s setup, concepts, projects, etc. We trained the bot using an SVM model for intent-classification based on the questions from the key entities that were identified in our ontology. By using the bot, we also had the opportunity to collect the logs of more questions and paraphrases from the students. This allowed us to retrain the existing model. In the future, we aim to build a dataset to train a question-answering model on cybersecurity education.
- 3.
- Student Feedback: As a part of our work, we wanted to find the impact of using knowledge graphs in teaching cybersecurity courses. We took feedback from students via surveys and interviews and analyzed whether visual graphs and question-answering chatbot served as effective learning aids for students. The feedback from students also helped in improving our knowledge graph consumption tools.
- From the research perspective, we have the following:
- 1.
- Ontology Framework for Cybersecurity Education: We present a bottom-up approach for identifying the key entities and relations from unstructured course material for cybersecurity education. We developed an ontology framework that can be very well adapted to any ontology standards and query languages across industry and academia for constructing knowledge graphs for cybersecurity education. We also show that this approach can also be used by other domains to build ontology from scratch.
- 2.
- Research Potential: With the increase in demand for cybersecurity professionals, there is a need to build effective learning tools. In spite of the fact that acquiring cybersecurity skills is challenging, there is not much research traction in this field. Knowledge graphs can be extremely helpful in creating interactive and adaptive learning required for cybersecurity. However, there are no data models with standard key entity–relation pairs or labeled datasets, so there is no starting point for building knowledge graphs for cybersecurity education. Our work is a gateway to showcase the research potential and implementation opportunities in this area.
3.1. Phase 1: Knowledge Acquisition
3.1.1. Data Collection
3.1.2. Entity and Relation Extraction
- Sentence Segmentation: The project instruction manual was split into sentences using a simple python script. Sentences with one subject and one object are easier to extract.For example, the sentence, “Snort can detect attacks” has one subject (Snort) and one object (attacks). Some sentences were paraphrased such that they had only one subject and object.
- Parts of Speech (POS) Tagging and Dependency Parsing: In the previous example, single-word entities can be extracted easily from a sentence as nouns and proper nouns using part-of-speech (POS) tagging. However, POS tags are not enough for the entities that span multiple words. We used spaCy-based rule-matching methods to parse the dependency tree of the sentence and defined the semantic relationship. We defined a set of rules for the syntax and other grammatical properties to extract meaningful information. The modifiers, prepositions, compound words, and prefixes were considered as the dependencies to be extracted with the subject and objects so that the domain expert could obtain some meaningful information.For example, in the sentence, “Snort lab use syslog remote for logging”, the parser will now extract the subject as "Snort lab" and the object as "syslog remote for logging". Similarly, in the sentence, “Students will write their own IDS rules”, the parser will now extract the subject as "Students" and the object as "own IDS rules".
- Relation Extraction (RE): The next task is to extract the relations to connect the entities. POS was used to extract the root or verb of the sentence and tagged it as a relation. We defined the pattern by writing a dependency rule to match the adjectives, adverbs, and auxiliary tokens, etc., while parsing the root.For example, for the sentence “Snort can output tcpdump pcap”, the relation extracted will be, ‘can output’.
- Temporary Triples: The subject and object extracted from the sentence were stored as entity pairs where the head entity is the subject and the tail entity is the object. The relation extracted from the sentence is the edge label. The triples were stored in the form of a "entity-relation-entity" triple in a csv file. The entities and relations extracted at this stage contain noise and redundant information. The triples thus created are temporary only to provide a visual representation.
- Preliminary Visual Representation: Using the entity and relations extracted from the subject–object pairs and the predicates in the above step, we can now build a visual representation from the unstructured text in the form of a directed labeled graph. One of the sub-graphs on the lab requirements for setting up "Snort" is shown in Figure 2.
3.1.3. Knowledge Integration
3.1.4. Ontology Development
3.1.5. Entity Matcher
3.2. Phase 2: Knowledge Storage
3.3. Phase 3: Knowledge Consumption Layer
3.3.1. View Knowledge Graphs
3.3.2. Chatbot
- 1.
- Identify Intents: The intents are the labels or class that are used by the machine learning model to map questions to the answer. To identify the main intents, it is important to find the concepts that students may wish to learn. We considered the entities from our ontology framework to provide the key concepts. We used the knowledge graphs to view and analyze the conversation flow and created the intents from the list of entities. There were 30 most important main intents chosen from the entity list. Additionally, there is a “greetings” intent for the bot to give a welcome message and “other” intent to gracefully continue the conversation for out-of-context questions.
- 2.
- Question-Answer Data Preparation: As a next step, the questions were prepared based on these intents. We collected the frequently asked questions in emails from the instructor and TA of the course, discussion forums and quiz questions from previous years on the course portal. The questions were paraphrased for model training and were mapped to corresponding intents using a JSON file.
- 3.
- Intent Classification Model: In order to classify the intents from the natural language questions, we used the SVM model as it is an extremely successful NLP technique for text classification, especially when the training dataset is not large enough [54]. SVM has been one of the most widely used models for multiple applications for over a decade [55].To develop the model, we first created features using the TF-IDF (term frequency-inverse document frequency) vectorization method. It calculates the weighted term frequency score for each word in the corpus relative to the document in the form of a vector. Thus, it gives the measure of how often that word is seen in the document by computing the overall document weightage of a word. To extract a bag of words, we used unigrams. We initially started with bigrams, but upon performing the “chi2test” and after analyzing the correlated terms, we found that the model prediction was better in the case of unigrams. This is because of the nature of questions in our dataset. Most questions were straightforward or how-to questions such as “How to install Metasploit?” The linear-SVM model was trained for intent classification. The dataset contained the question ID and the questions as input and intents as labels. SVM returns the highest probability intent as the output. The predicted intent was sent to the json file where the intent is mapped to the corresponding answer, which is shown in the Chatbot messaging window in the UI. The current model reported a prediction accuracy of 92%. We plan to retrain the model on more questions that are being collected in the logs to improve the accuracy.In this work, we considered using only the single model based on the main intents as labels. For sub-intents, we populated the choices in the response window as clickable buttons that students can click to know more about the topic. For example, as shown in Figure 7, if the user asks a question such as “Tell me about firewall?”, the model then maps the question to the main intent, “firewall”, and the UI provides the response that contains the definition of “firewall” with two buttons “IPTables” and “Run Firewalls”. The students can click on buttons to know more about configuring IP tables rules of linux firewall or run the script for setting the firewall. This approach allowed us to have minimal ambiguity for the model and also to retained a light-weight application by using a single model in contrast to running multiple models for sub-intents at real time. The model allows students to paraphrase and ask the question in their natural language style. They can also go back and forth to the messaging window to view responses.
4. Evaluation
4.1. Evaluation of Proposed Method
4.2. Impact Analysis of Knowledge Graphs
Results
4.3. Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
KG | Knowledge graphs; |
KGQA | Knowledge graph question answering systems; |
SVM | Support vector machine; |
IDS | Intrusion detection system; |
NER | Named entity recognition; |
NLP | Natural language processing; |
UI | User interface. |
References
- Singhal, A. Introducing the Knowledge Graph: Things, Not Strings. May 2012. Official Blog, of Google. 2012. Available online: http://googleblog.blogspot.ie/2012/05/introducing-knowledgegraph-things-not.html (accessed on 10 September 2022).
- Sowa, J.F. Semantic networks. Encycl. Cogn. Sci. 2012. Available online: http://www.jfsowa.com/pubs/semnet.pdf (accessed on 10 September 2022).
- Hogan, A.; Blomqvist, E.; Cochez, M.; d’Amato, C.; Melo, G.D.; Gutierrez, C.; Kirrane, S.; Gayo, J.E.L.; Navigli, R.; Neumaier, S.; et al. Knowledge graphs. ACM Comput. Surv. (CSUR) 2021, 54, 1–37. [Google Scholar] [CrossRef]
- Wu, X.; Wu, J.; Fu, X.; Li, J.; Zhou, P.; Jiang, X. Automatic knowledge graph construction: A report on the 2019 icdm/icbk contest. In Proceedings of the 2019 IEEE International Conference on Data Mining (ICDM), Beijing, China, 8–11 November 2019; pp. 1540–1545. [Google Scholar]
- Kang, S.J.; Kang, I.S. Generalization of Ontology Instances Based on WordNet and Google. J. Korean Inst. Intell. Syst. 2009, 19, 363–370. [Google Scholar]
- Gould, N.; Mackaness, W. From taxonomies to ontologies: Formalizing generalization knowledge for on-demand mapping. Cartogr. Geogr. Inf. Sci. 2016, 43, 208–222. [Google Scholar] [CrossRef]
- Lin, J.; Zhao, Y.; Huang, W.; Liu, C.; Pu, H. Domain knowledge graph-based research progress of knowledge representation. Neural Comput. Appl. 2021, 33, 681–690. [Google Scholar] [CrossRef]
- Jung, Y.; Ryu, J.; Kim, K.M.; Myaeng, S.H. Automatic construction of a large-scale situation ontology by mining how-to instructions from the web. Web Semant. Sci. Serv. Agents World Wide Web 2010, 8, 110–124. [Google Scholar] [CrossRef]
- Shin, J.; Wu, S.; Wang, F.; De Sa, C.; Zhang, C.; Ré, C. Incremental knowledge base construction using deepdive. In Proceedings of the VLDB Endowment International Conference on Very Large Data Bases; NIH Public Access: Bethesda, MD, USA, 2015; Volume 8, p. 1310. [Google Scholar]
- Guo, L.; Yan, F.; Li, T.; Yang, T.; Lu, Y. An automatic method for constructing machining process knowledge base from knowledge graph. Robot. Comput.-Integr. Manuf. 2022, 73, 102222. [Google Scholar] [CrossRef]
- Issa, S.; Adekunle, O.; Hamdi, F.; Cherfi, S.S.S.; Dumontier, M.; Zaveri, A. Knowledge graph completeness: A systematic literature review. IEEE Access 2021, 9, 31322–31339. [Google Scholar] [CrossRef]
- Kejriwal, M. Domain-Specific Knowledge Graph Construction; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
- Chaudhri, V.; Baru, C.; Chittar, N.; Dong, X.; Genesereth, M.; Hendler, J.; Kalyanpur, A.; Lenat, D.; Sequeda, J.; Vrandečić, D.; et al. Knowledge Graphs: Introduction, History and, Perspectives. AI Mag. 2022, 43, 17–29. [Google Scholar]
- Abu-Salih, B. Domain-specific knowledge graphs: A survey. J. Netw. Comput. Appl. 2021, 185, 103076. [Google Scholar] [CrossRef]
- Pan, J.Z.; Vetere, G.; Gomez-Perez, J.M.; Wu, H. Exploiting Linked Data and Knowledge Graphs in Large Organisations; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
- Qin, Y.; Cao, H.; Xue, L. Research and Application of Knowledge Graph in Teaching: Take the database course as an example. In Proceedings of the Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2020; Volume 1607, p. 012127. [Google Scholar]
- Sun, K.; Liu, Y.; Guo, Z.; Wang, C. Visualization for knowledge graph based on education data. Int. J. Softw. Inform. 2016, 10, 1–13. [Google Scholar]
- Chi, Y.; Qin, Y.; Song, R.; Xu, H. Knowledge graph in smart education: A case study of entrepreneurship scientific publication management. Sustainability 2018, 10, 995. [Google Scholar] [CrossRef] [Green Version]
- Deng, L.; Liu, Y. Deep Learning in Natural Language Processing; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
- Kertkeidkachorn, N.; Ichise, R. T2kg: An end-to-end system for creating knowledge graph from unstructured text. In Proceedings of the Workshops at the Thirty-First AAAI Conference on Artificial Intelligence, San Francisco, CA, USA, 4–9 February 2017. [Google Scholar]
- Zhao, M.; Wang, H.; Guo, J.; Liu, D.; Xie, C.; Liu, Q.; Cheng, Z. Construction of an industrial knowledge graph for unstructured chinese text learning. Appl. Sci. 2019, 9, 2720. [Google Scholar] [CrossRef] [Green Version]
- Sant’Anna, D.T.; Caus, R.O.; dos Santos Ramos, L.; Hochgreb, V.; dos Reis, J.C. Generating Knowledge Graphs from Unstructured Texts: Experiences in the E-commerce Field for Question Answering. In Proceedings of the ASLD@ ISWC, Athens, Greece, 1–6 November 2020; pp. 56–71. [Google Scholar]
- Chen, Y.; Kuang, J.; Cheng, D.; Zheng, J.; Gao, M.; Zhou, A. AgriKG: An agricultural knowledge graph and its applications. In Proceedings of the International Conference on Database Systems for Advanced Applications, Chiang Mai, Thailand, 22–25 April 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 533–537. [Google Scholar]
- Martinez-Rodriguez, J.L.; López-Arévalo, I.; Rios-Alvarado, A.B. Openie-based approach for knowledge graph construction from text. Expert Syst. Appl. 2018, 113, 339–355. [Google Scholar] [CrossRef]
- Noy, N.; Gao, Y.; Jain, A.; Narayanan, A.; Patterson, A.; Taylor, J. Industry-scale Knowledge Graphs: Lessons and Challenges: Five diverse technology companies show how it’s done. Queue 2019, 17, 48–75. [Google Scholar] [CrossRef]
- Jain, N. Domain-specific knowledge graph construction for semantic analysis. In Proceedings of the European Semantic Web Conference, Crete, Greece, 31 May–4 June 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 250–260. [Google Scholar]
- Shi, B.; Weninger, T. Open-world knowledge graph completion. In Proceedings of the AAAI Conference on Artificial Intelligence, New Orleans, LA, USA, 2–7 February 2018; Volume 32. [Google Scholar]
- Lenat, D.B. CYC: A large-scale investment in knowledge infrastructure. Commun. ACM 1995, 38, 33–38. [Google Scholar] [CrossRef] [Green Version]
- Subasic, P.; Yin, H.; Lin, X. Building Knowledge Base through Deep Learning Relation Extraction and Wikidata. In Proceedings of the AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering, Palo Alto, CA, USA, 25–27 March 2019. [Google Scholar]
- Wang, K.; Shen, Z.; Huang, C.; Wu, C.H.; Dong, Y.; Kanakia, A. Microsoft academic graph: When experts are not enough. Quant. Sci. Stud. 2020, 1, 396–413. [Google Scholar] [CrossRef]
- Souag, A.; Salinesi, C.; Mazo, R.; Comyn-Wattiau, I. A security ontology for security requirements elicitation. In Proceedings of the International Symposium on Engineering Secure Software and Systems, Milan, Italy, 4–6 March 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 157–177. [Google Scholar]
- Mozzaquatro, B.A.; Agostinho, C.; Goncalves, D.; Martins, J.; Jardim-Goncalves, R. An ontology-based cybersecurity framework for the internet of things. Sensors 2018, 18, 3053. [Google Scholar] [CrossRef] [Green Version]
- Jia, Y.; Qi, Y.; Shang, H.; Jiang, R.; Li, A. A practical approach to constructing a knowledge graph for cybersecurity. Engineering 2018, 4, 53–60. [Google Scholar] [CrossRef]
- Bürger, J.; Strüber, D.; Gärtner, S.; Ruhroth, T.; Jürjens, J.; Schneider, K. A framework for semi-automated co-evolution of security knowledge and system models. J. Syst. Softw. 2018, 139, 142–160. [Google Scholar] [CrossRef]
- Doynikova, E.; Fedorchenko, A.; Kotenko, I. Ontology of metrics for cyber security assessment. In Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, 26–29 August 2019; pp. 1–8. [Google Scholar]
- Alenezi, M.; Basit, H.A.; Khan, F.I.; Beg, M.A. A Comparison Study of Available Sofware Security Ontologies. In Proceedings of the Evaluation and Assessment in Software Engineering, Trondheim, Norway, 15–17 April 2020; pp. 499–504. [Google Scholar]
- Rizun, M. Knowledge graph application in education: A literature review. Acta Univ. Lodz. Folia Oeconomica 2019, 3, 7–19. [Google Scholar] [CrossRef] [Green Version]
- Chen, P.; Lu, Y.; Zheng, V.W.; Chen, X.; Yang, B. Knowedu: A system to construct knowledge graph for education. IEEE Access 2018, 6, 31553–31563. [Google Scholar] [CrossRef]
- Chen, P.; Lu, Y.; Zheng, V.W.; Chen, X.; Li, X. An automatic knowledge graph construction system for K-12 education. In Proceedings of the Fifth Annual ACM Conference on Learning at Scale, London, UK, 26–28 June 2018; pp. 1–4. [Google Scholar]
- Aliyu, I.; Kana, A.; Aliyu, S. Development of knowledge graph for university courses management. Int. J. Educ. Manag. Eng. 2020, 10, 1. [Google Scholar] [CrossRef]
- Deng, Y.; Lu, D.; Huang, D.; Chung, C.J.; Lin, F. Knowledge graph based learning guidance for cybersecurity hands-on labs. In Proceedings of the ACM Conference on Global Computing Education, Chengdu, China, 17–19 May 2019; pp. 194–200. [Google Scholar]
- Deng, Y.; Zeng, Z.; Huang, D. Neocyberkg: Enhancing cybersecurity laboratories with a machine learning-enabled knowledge graph. In Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V. 1, Virtual Event, Germany, 26 June–1 July 2021; pp. 310–316. [Google Scholar]
- Deng, Y.; Zeng, Z.; Jha, K.; Huang, D. Problem-Based Cybersecurity Lab with Knowledge Graph as Guidance. J. Artif. Intell. Technol. 2022, 2, 55–61. [Google Scholar] [CrossRef]
- Brank, J.; Grobelnik, M.; Mladenic, D. A survey of ontology evaluation techniques. In Proceedings of the Conference on Data Mining and Data Warehouses (SiKDD 2005), Ljubljana, Slovenia, 17 October 2005; pp. 166–170. [Google Scholar]
- Bonifati, A.; Furniss, P.; Green, A.; Harmer, R.; Oshurko, E.; Voigt, H. Schema validation and evolution for graph databases. In Proceedings of the International Conference on Conceptual Modeling, Salvador, Brazil, 4–7 November 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 448–456. [Google Scholar]
- ReGraph Documentation. Available online: http://dev.executableknowledge.org/ReGraph/ (accessed on 25 October 2022).
- Corradini, A.; Heindel, T.; Hermann, F.; König, B. Sesqui-pushout rewriting. In Proceedings of the International Conference on Graph Transformation, Rio Grande do Norte, Brazil, 17–23 September 2006; Springer: Berlin/Heidelberg, Germany, 2006; pp. 30–45. [Google Scholar]
- Punnoose, R.; Crainiceanu, A.; Rapp, D. Rya: A scalable RDF triple store for the clouds. In Proceedings of the 1st International Workshop on Cloud Intelligence, Istanbul, Turkey, 31 August 2012; pp. 1–8. [Google Scholar]
- Miller, J.J. Graph database applications and concepts with Neo4j. In Proceedings of the Southern Association for Information Systems Conference, Atlanta, GA, USA, 23–24 March 2013; Volume 2324. [Google Scholar]
- Francis, N.; Green, A.; Guagliardo, P.; Libkin, L.; Lindaaker, T.; Marsault, V.; Plantikow, S.; Rydberg, M.; Selmer, P.; Taylor, A. Cypher: An evolving query language for property graphs. In Proceedings of the 2018 International Conference on Management of Data, Houston, TX, USA, 10–15 June 2018; pp. 1433–1445. [Google Scholar]
- Angles, R.; Arenas, M.; Barceló, P.; Hogan, A.; Reutter, J.; Vrgoč, D. Foundations of modern query languages for graph databases. ACM Comput. Surv. (CSUR) 2017, 50, 1–40. [Google Scholar] [CrossRef] [Green Version]
- Angles, R.; Arenas, M.; Barceló, P.; Boncz, P.; Fletcher, G.; Gutierrez, C.; Lindaaker, T.; Paradies, M.; Plantikow, S.; Sequeda, J.; et al. G-CORE: A core for future graph query languages. In Proceedings of the 2018 International Conference on Management of Data, Houston, TX, USA, 10–15 June 2018; pp. 1421–1432. [Google Scholar]
- van Rest, O.; Hong, S.; Kim, J.; Meng, X.; Chafi, H. PGQL: A property graph query language. In Proceedings of the Fourth International Workshop on Graph Data Management Experiences and Systems, Redwood Shores, CA, USA, 24 June 2016; pp. 1–6. [Google Scholar]
- Matykiewicz, P.; Pestian, J. Effect of small sample size on text categorization with support vector machines. In Proceedings of the BioNLP: Proceedings of the 2012 Workshop on Biomedical Natural Language Processing, Montreal, QC, Canada, 8 June 2012; pp. 193–201. [Google Scholar]
- Luo, X. Efficient english text classification using selected machine learning techniques. Alex. Eng. J. 2021, 60, 3401–3409. [Google Scholar] [CrossRef]
- Agrawal, G. KG for Cybersecurity Education. 2022. Available online: https://github.com/garima0106/KG-Cybersec.git (accessed on 3 November 2022).
- Thomas, G.; Anderson, D.; Nashon, S. Development of an instrument designed to investigate elements of science students’ metacognition, self-efficacy and learning processes: The SEMLI-S. Int. J. Sci. Educ. 2008, 30, 1701–1724. [Google Scholar] [CrossRef]
- Loyens, S.M.; Magda, J.; Rikers, R.M. Self-directed learning in problem-based learning and its relationships with self-regulated learning. Educ. Psychol. Rev. 2008, 20, 411–427. [Google Scholar] [CrossRef]
- Gong, Z.; Yu, X.; Fu, W.; Che, X.; Mao, Q.; Zheng, X. The Construction of Knowledge Graph for Personalized Online Teaching. In Proceedings of the International Conference on Data Mining and Big Data, Guangzhou, China, 20–22 October 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 98–107. [Google Scholar]
entityName | entityType | entityCategory |
---|---|---|
private key, cookies, protocol | feature | concept |
tcpdump, SHA, hash, xor | function | concept |
CSS, Sql Injection, DOS | attack | concept |
weak password, poor config | vulnerability | concept |
honeypot, risk assessment | technique | concept |
burp, snort, wireshark | tools | application |
linux, IP, Server | system | application |
browser, webapp | app | application |
attacker, black hat | attacker | roles |
security engg, white hat | ethicalHacker | roles |
employee, user | user | roles |
student | student | roles |
task4, project3 | project | course |
CSE575, lab-CNS-003 | courseName | course |
Theme 1—Students find the knowledge graph as an informative tool |
---|
Summary—Students found knowledge graphs useful as an informative tool to learn the core concepts. It also helped them understand the problem structure and gave a flow map of the tasks assigned to them. |
Evidence from Open-ended Questions—“The knowledge graph was the basis for me understanding the overarching concepts and connection between parts.” |
Evidence from Interview—“I found to be extremely helpful, I definitely was able to use the knowledge graph to see like okay here are the concepts that I need to know.” “Yeah, I would say, I liked it basically because the knowledge graph gives you a skeletal structure of how the flow should be (look like).” |
Theme 2—Students use the knowledge graph as a visual reference |
Summary—They used the knowledge graphs for monitoring and visually cross checking their progress on project tasks. |
Evidence from Open-ended Questions—“It (Knowledge graph) gave the exact visual view of the project.” |
Evidence from Interview—“I pull knowledge graph up, real quick, so I can actually have a visual reference because I did use it throughout the labs.” “(Knowledge graph) is used, for like, a solid ground. Just kind of, confirming that I am going the right direction.” |
Theme 3: Chatbot and the knowledge graph are an easy access to just-in-time information |
Summary—The chatbot and KG were useful as an on-demand learning tool for immediate feedback and answering the how-to questions for implementing a task. |
Evidence from Interview—“(I) immediately go back and see what is that, how do I use this, how do I implement this.” “Go to the knowledge graph and it would quickly take me to the Wiki link with a few clicks that was, that was pretty convenient.” |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Agrawal, G.; Deng, Y.; Park, J.; Liu, H.; Chen, Y.-C. Building Knowledge Graphs from Unstructured Texts: Applications and Impact Analyses in Cybersecurity Education. Information 2022, 13, 526. https://doi.org/10.3390/info13110526
Agrawal G, Deng Y, Park J, Liu H, Chen Y-C. Building Knowledge Graphs from Unstructured Texts: Applications and Impact Analyses in Cybersecurity Education. Information. 2022; 13(11):526. https://doi.org/10.3390/info13110526
Chicago/Turabian StyleAgrawal, Garima, Yuli Deng, Jongchan Park, Huan Liu, and Ying-Chih Chen. 2022. "Building Knowledge Graphs from Unstructured Texts: Applications and Impact Analyses in Cybersecurity Education" Information 13, no. 11: 526. https://doi.org/10.3390/info13110526
APA StyleAgrawal, G., Deng, Y., Park, J., Liu, H., & Chen, Y. -C. (2022). Building Knowledge Graphs from Unstructured Texts: Applications and Impact Analyses in Cybersecurity Education. Information, 13(11), 526. https://doi.org/10.3390/info13110526