Open Access
Subscription Access
Secure Arcade: A Gamified Defense Against Cyber Attacks
In modernity, we continually receive increasingly intricate technologies that allow us to increase our lives’ convenience and efficiency. Our technology, particularly technology available over the internet, is advancing at unprecedented speed. However, this speed of advancement allows those behind malicious attacks to have an increasingly easier time taking advantage of those who know little about computer security. Unfortunately, education in the computer security field is generally limited only to tertiary education. This research addresses this problem through a gamified web-based application that drives users to reach learning goals to help them become more vigilant internet users: 1. Learn and memorize general computer security terminology, 2. Become familiar with basic cryptography concepts, 3. Learn to recognize potential phishing scams via email quickly, and 4. Learn common attacks on servers and how to deal with them.
Keywords
Computer Security, Cybersecurity, Cyberattack, Phishing, Gamification
User
Font Size
Information
- J. Mallet, R. Dave, N. Seliya and M. Vanamala, "Using Deep Learning to Detecting Deepfakes," 2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI), Toronto, ON, Canada, 2022, pp. 1-5, doi: 10.1109/ISCMI56532.2022.10068449.
- A. Tiwari, R. Dave, and M. Vanamala, “Leveraging Deep Learning Approaches for Deepfake Detection: A Review,” 2023, arXiv:2304.01908.
- J. Mallet, N. Krueger, M. Vanamala, and R. Dave, “Hybrid Deepfake Detection Utilizing MLP and LSTM,” 2023, arXiv:2304.14504.
- J. Mallet, L. Pryor, R. Dave, and M. Vanamala, “Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM,” in Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, 2023, pp. 7–11. doi: 10.1145/3596947.3596954.
- F. Laricchia. “Global smartphone penetration 2016-2021.” statista.com. https://www.statista.com/statistics/203734/global-smartphone-penetration-per-capita-since-2005/ (accessed May 12, 2023).
- S. Gossain. “Five converging forces that are driving technological evolution.” TechRadar.com. https://www.techradar.com/news/five-converging-forces-that-are-driving-technological-evolution (accessed May 13, 2023).
- M. Vanamala, J. Gilmore, X. Yuan and K. Roy, "Recommending Attack Patterns for Software Requirements Document," in 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2020, pp. 1813-1818, doi: 10.1109/CSCI51800.2020.00334.
- M. Vanamala, X. Yuan, W. Smith, and J. Bennett, "Interactive Visualization Dashboard for Common Attack Pattern Enumeration Classification," in Proceedings of ICSEA 2022: The Seventeenth International Conference on Software Engineering Advances, Oct. 2022. [Online]. Available: https://www.researchgate.net/profile/Luigi- Lavazza/publication/366958432_ICSEA_2022_The_Seventeenth_International_Conference_on_So ftware_Engineering_Advances/links/63bb2f2303aad5368e75ba55/ICSEA-2022-The-Seventeenth- International-Conference-on-Software-Engineering-Advances.pdf#page=80
- M. Vanamala, X. Yuan, and M. Morgan, “A course module on HTML5 new features and security concerns,” in Journal of Computing Sciences in Colleges, vol. 34, no. 5, pp. 23–30, 2019. [Online]. Available: https://www.ccsc.org/publications/journals/SC2019.pdf#page=23
- M. Vanamala, "Hands-on labs demonstrating HTML5 security Concerns," in KSU Proceedings on Cybersecurity Education, Research and Practice, 2016. [Online]. Available: https://digitalcommons.kennesaw.edu/ccerp/2016/Student/15/
- “Cybersecurity Considerations for Institutions of Higher Education.” rems.ed.gov. [Online]. Available: https://rems.ed.gov/docs/Cybersecurity_Considerations_for_Higher_ed_Fact_Sheet_508C.pdf
- B. Pelto, M. Vanamala, and R. Dave, “Your Identity is Your Behavior–Continuous User Authentication based on Machine Learning and Touch Dynamics,” 2023, arXiv:2305.09482.
- R. Barton, “Computer security in computer literacy education,” in Issues in Information Systems, vol. 11, no. 2, pp. 162–167, 2010. [Online]. Available: https://iacis.org/iis/2010/162- 167_LV2010_1530.pdf
- K. Evans and F. Reeder, “A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters,” CSIS, Nov. 2010.
- F. B. Schneider, "Cybersecurity Education in Universities," in IEEE Security & Privacy, vol. 11, no. 4, pp. 3-4, July-Aug. 2013, doi: 10.1109/MSP.2013.84.
- W. Crumpler and J. A. Lewis, “The Cybersecurity Workforce Gap,” CSIS. Accessed: May 13, 2023. [Online]. Available: https://csis-website-prod.s3.amazonaws.com/s3fspublic/ publication/190129_Crumpler_Cybersecurity_FINAL.pdf
- J. Mallet, L. Pryor, R. Dave, N. Seliya, M. Vanamala and E. Sowells-Boone, "Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning," in 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML), Hangzhou, China, 2022, pp. 442-447, doi: 10.1109/CACML55074.2022.00081.
- N. Siddiqui, R. Dave, M. Vanamala, and N. Seliya, “Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication,” in Machine Learning and Knowledge Extraction, vol. 4, no. 2, pp. 502–518, May 2022, doi: 10.3390/make4020023.
- S. Kokal, M. Vanamala, and R. Dave, “Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication,” in Journal of Cybersecurity and Privacy, vol. 3, no. 2, pp. 227–258, Jun. 2023, doi: 10.3390/jcp3020013.
- C. Peng, “A Conceptual Review of Teacher Enthusiasm and Students’ Success and Engagement in Chinese EFL Classes,” in Frontiers in Psychology, vol. 12, 2021, doi: 10.3389/fpsyg.2021.742970.
- W. Z. Tee, R. Dave, N. Seliya and M. Vanamala, "Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning," in 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML), Hangzhou, China, 2022, pp. 456-461, doi: 10.1109/CACML55074.2022.00083.
- W. Z. Tee, R. Dave, J. Seliya and M. Vanamala, "A Close Look into Human Activity Recognition Models using Deep Learning," in 2022 3rd International Conference on Computing, Networks and Internet of Things (CNIOT), Qingdao, China, 2022, pp. 201-206, doi: 10.1109/CNIOT55862.2022.00043.
- S. Scholefield and L. A. Shepherd, “Gamification Techniques for Raising Cyber Security Awareness,” in HCI for Cybersecurity, Privacy and Trust, 2019, pp. 191–203.
- J. Zhang, X. Yuan, J. Johnson, J. Xu and M. Vanamala, "Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts," in 2020 IEEE Frontiers in Education Conference (FIE), Uppsala, Sweden, 2020, pp. 1-7, doi: 10.1109/FIE44824.2020.9274239.
- Sloman, M. and Borsattino, T. "Barriers to progress in learning – a global convergence of concern?", in Development and Learning in Organizations, vol. 21, no. 2, pp. 14-16, Feb. 2007, doi: 10.1108/14777280710727334.
- C. Perrotta, G. Featherstone, H. Aston, and E. Houghton, “Game-Based Learning: Latest Evidence and Future Directions,” in National Foundation for Educational Research, pp. 1-49, Apr. 2013.
- M. Kalogiannakis, S. Papadakis, and A.-I. Zourmpakis, “Gamification in Science Education. A Systematic Review of the Literature,” in Education Sciences, vol. 11, no. 1, Jan. 2021, doi: 10.3390/educsci11010022.
- V. Mounika, X. Yuan and K. Bandaru, "Analyzing CVE Database Using Unsupervised Topic Modelling," in 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2019, pp. 72-77, doi: 10.1109/CSCI49370.2019.00019.
- M. Vanamala, X. Yuan and K. Roy, "Topic Modeling And Classification Of Common Vulnerabilities And Exposures Database," in 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 2020, pp. 1-5, doi: 10.1109/icABCD49160.2020.9183814.
- M. Vanamala, S. Loesch, and A. Caravella, “Using Machine Learning to Identify Software Weaknesses from Software Requirement Specifications,” 2023, arXiv:2308.05558.
- L. Pryor, J. Mallet, R. Dave, N. Seliya, M. Vanamala, and E. Sowells-Boone, "Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning," May 2022, doi: https://doi.org/10.48550/arXiv.2205.08371.
- Z. DeRidder et al., "Continuous User Authentication Using Machine Learning and Multi-finger Mobile Touch Dynamics with a Novel Dataset," in 2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI), Toronto, ON, Canada, 2022, pp. 42-46, doi: 10.1109/ISCMI56532.2022.10068450.
- N. Lasky, B. Halls, M. Vanamala, R. Dave, and J. Seliya, “Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications,” Feb. 2023, doi: 10.48550/arXiv.2302.05530.
- M. Vanamala, “Machine Learning Based Approach to Recommend Attack Patterns for Software Requirements Specifications,” Ph.D. dissertation, Dept. Comp. Sci., Nor. Car. A&T St. Uni., Greensboro, Nor. Car., USA, 2021. [Online]. Available: https://www.proquest.com/openview/d9ee11365ddad8d50270260c274d5385/1?pqorigsite= gscholar&cbl=18750&diss=y
Abstract Views: 129
PDF Views: 58