Abstract
In our modern digital world, where virtually everything is intertwined with computer systems, critical infrastructures face vulnerability to a variety of cyber-attacks, stemming from the absence of a cybersecurity mindset within these establishments. We need to efficiently educate these workers about the cybersecurity threats that exist, their potential effects, and the subsequent substantial impact on human populations. Previous research has suggested traditional non-interactive training methods are often not effective. We propose an interactive learning experience that incorporates Extended Reality, Digital Twins, and Artificial Intelligence (AI) to help workers become more aware of cybersecurity issues within their critical infrastructure. This paper introduces an innovative testbed that seamlessly integrates Artificial Intelligence (AI) and Large Language Models to create an immersive educational experience. The goal is to effectively convey complex technical concepts to users with limited background knowledge on the subject. Our specific focus lies in addressing the need for proper cybersecurity training among water treatment plant employees.
The testbed presented is meticulously crafted to provide users with a tangible representation of the potential outcomes resulting from successful cyber attacks on such facilities. Through this approach, we aim to enhance the educational process and promote a deeper understanding of cybersecurity challenges in critical infrastructure like water treatment plants.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Balaji: HPING3 — network scanning tool — packet generator (2023). https://gbhackers.com/hping3-network-scanner-packer-generator/. Accessed 2 Feb 2024
Bomey, N.: How Chinese military hackers allegedly pulled off the equifax data breach, stealing data from 145 million americans (2020). https://www.usatoday.com/story/tech/2020/02/10/2017-equifax-data-breach-chinese-military-hack/4712788002/. Accessed 2 Feb 2024
Chandrashekar, N.D., King, K., Gračanin, D., Azab, M.: Design & development of virtual reality empowered cyber-security training testbed for IoT systems. In: 2023 3rd Intelligent Cybersecurity Conference (ICSC), pp. 86–94 (2023). https://doi.org/10.1109/ICSC60084.2023.10349976
Chandrashekar, N.D., Safford, S., Muniyandi, M., Gračanin, D.: An extended reality simulator for pulse palpation training. In: 2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), pp. 178–182 (2023). https://doi.org/10.1109/VRW58643.2023.00044
Chase, H.: Langchain (2022). https://www.langchain.com/. Accessed 2 Feb 2024
Easterly, J., Fanning, T.: The attack on colonial pipeline: what we’ve learned & what we’ve done over the past two years: CISA (2023). https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years. Accessed 2 Feb 2024
Francis, N., Ante, J., Helgason, D.: Unity real-time development platform | 3D, 2D, VR & AR. Unity Technologies (2005). https://unity.com/. Accessed 2 Feb 2024
Gironacci, I.: XR management training simulator supported by content-based scenario recommendation. In: 2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR), pp. 104–108 (2022). https://doi.org/10.1109/AIVR56993.2022.00021
Hertel, J.P., Millis, B.: Using Simulations to Promote Learning in Higher Education: An Introduction. Routledge, London (2002)
Jobbins, T.: Thebloke/luna-ai-llama2-uncensored-gguf at main (2023). https://huggingface.co/TheBloke/Luna-AI-Llama2-Uncensored-GGUF/tree/main. Accessed 2 Feb 2024
Korodi, A., Nicolae, A., Drǎghici, I.A.: Proactive decentralized historian-improving legacy system in the water industry 4.0 context. Sustainability 15(15) (2023). https://doi.org/10.3390/su151511487
Lyon, G.: Nmap: networking security scanner (1997). https://nmap.org/. Accessed 2 Feb 2024
Nagarajan, A., Allbeck, J.M., Sood, A., Janssen, T.L.: Exploring game design for cybersecurity training. In: 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 256–262 (2012). https://doi.org/10.1109/CYBER.2012.6392562
Ono, T., Ishikawa, T.: A research on penalty kick training system using XR. In: 2023 Nicograph International (NicoInt), pp. 86–86 (2023). https://doi.org/10.1109/NICOINT59725.2023.00026
Shapira, N., Ayalon, O., Ostfeld, A., Farber, Y., Housh, M.: Cybersecurity in water sector: stakeholders perspective. J. Water Resour. Plan. Manag. 147(8), 05021008 (2021). https://doi.org/10.1061/(ASCE)WR.1943-5452.0001400
Sutskever, I.: (2023). https://openai.com/gpt-4. Accessed 2 Feb 2024
Yoshida, S., Abe, T., Suganuma, T.: Design of a support system for guitar performance training using XR technology. In: 2023 IEEE 12th Global Conference on Consumer Electronics (GCCE), pp. 276–279 (2023). https://doi.org/10.1109/GCCE59613.2023.10315398
Acknowledgment
This study is a collaboration between Virginia Tech and Virginia Military Institute (VMI) as a part of a Commonwealth Cybersecurity Initiative Workforce Development Grant. A great many thanks to the cadets at VMI for helping us implement XR environment and the attack and defense scenarios for the testbed simulation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Disclosure of Interests. The authors have no competing interests to declare that are relevant to the content of this article.
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Lee, A., King, K., Gračanin, D., Azab, M. (2024). Experiential Learning Through Immersive XR: Cybersecurity Education for Critical Infrastructures. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2024. Lecture Notes in Computer Science, vol 14729. Springer, Cham. https://doi.org/10.1007/978-3-031-61382-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-61382-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61381-4
Online ISBN: 978-3-031-61382-1
eBook Packages: Computer ScienceComputer Science (R0)