{"id":"https://openalex.org/W4414165858","doi":"https://doi.org/10.1109/access.2025.3607976","title":"AAPDEM: An Intelligent Model for Automated Attack Path Discovery and Exploitation in Modern Networks","display_name":"AAPDEM: An Intelligent Model for Automated Attack Path Discovery and Exploitation in Modern Networks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414165858","doi":"https://doi.org/10.1109/access.2025.3607976"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3607976","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3607976","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3607976","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050446575","display_name":"Tamer Mohamed Abdellatif","orcid":"https://orcid.org/0000-0003-2337-9781"},"institutions":[{"id":"https://openalex.org/I186129607","display_name":"Canadian University of Dubai","ror":"https://ror.org/029zgsn59","country_code":"AE","type":"education","lineage":["https://openalex.org/I186129607"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Tamer Mohamed Abdellatif","raw_affiliation_strings":["School of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, United Arab Emirates","School of Engineering, Applied Sciences and Technology, Canadian University in Dubai, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, United Arab Emirates","institution_ids":["https://openalex.org/I186129607"]},{"raw_affiliation_string":"School of Engineering, Applied Sciences and Technology, Canadian University in Dubai, United Arab Emirates","institution_ids":["https://openalex.org/I186129607"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003316617","display_name":"Salih Rashid Majeed","orcid":null},"institutions":[{"id":"https://openalex.org/I186129607","display_name":"Canadian University of Dubai","ror":"https://ror.org/029zgsn59","country_code":"AE","type":"education","lineage":["https://openalex.org/I186129607"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Salih Rashid Majeed","raw_affiliation_strings":["School of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, United Arab Emirates","School of Engineering, Applied Sciences and Technology, Canadian University in Dubai, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, United Arab Emirates","institution_ids":["https://openalex.org/I186129607"]},{"raw_affiliation_string":"School of Engineering, Applied Sciences and Technology, Canadian University in Dubai, United Arab Emirates","institution_ids":["https://openalex.org/I186129607"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076163760","display_name":"Ahmed Hamed","orcid":"https://orcid.org/0000-0003-0928-548X"},"institutions":[{"id":"https://openalex.org/I169744251","display_name":"Damanhour University","ror":"https://ror.org/03svthf85","country_code":"EG","type":"education","lineage":["https://openalex.org/I169744251"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ahmed Hamed","raw_affiliation_strings":["Department of Computer Science, Faculty of Computers and Information, Damanhour University, Damanhour, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, Damanhour University, Damanhour, Egypt","institution_ids":["https://openalex.org/I169744251"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115720213","display_name":"Ahmed Ali Seyam","orcid":null},"institutions":[{"id":"https://openalex.org/I186129607","display_name":"Canadian University of Dubai","ror":"https://ror.org/029zgsn59","country_code":"AE","type":"education","lineage":["https://openalex.org/I186129607"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ahmed Ali Seyam","raw_affiliation_strings":["School of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, United Arab Emirates","School of Engineering, Applied Sciences and Technology, Canadian University in Dubai, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, United Arab Emirates","institution_ids":["https://openalex.org/I186129607"]},{"raw_affiliation_string":"School of Engineering, Applied Sciences and Technology, Canadian University in Dubai, United Arab Emirates","institution_ids":["https://openalex.org/I186129607"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050446575"],"corresponding_institution_ids":["https://openalex.org/I186129607"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27976157,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"160490","last_page":"160507"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9696000218391418,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9638000130653381,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5562999844551086},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.49970000982284546},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4726000130176544},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.4499000012874603},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4275999963283539},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4271000027656555},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4023999869823456},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.40130001306533813}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8296999931335449},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5562999844551086},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.49970000982284546},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4726000130176544},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.4499000012874603},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4275999963283539},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4271000027656555},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4023999869823456},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.40130001306533813},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.39430001378059387},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3935999870300293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3847000002861023},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.3808000087738037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3709000051021576},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3646000027656555},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.33239999413490295},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32820001244544983},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.3190000057220459},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.29089999198913574},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.2793999910354614},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.27320000529289246},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3607976","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3607976","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d6b90f6244004936888b8a1c7cf96acb","is_oa":true,"landing_page_url":"https://doaj.org/article/d6b90f6244004936888b8a1c7cf96acb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 160490-160507 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3607976","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3607976","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2796206364","https://openalex.org/W2944521607","https://openalex.org/W3188982559","https://openalex.org/W4205686156","https://openalex.org/W4248986893","https://openalex.org/W4298113351","https://openalex.org/W4313479771","https://openalex.org/W4319069705","https://openalex.org/W4360874943","https://openalex.org/W4367666264","https://openalex.org/W4377695283","https://openalex.org/W4386607418","https://openalex.org/W4388834952","https://openalex.org/W4389147167","https://openalex.org/W4390692323","https://openalex.org/W4390887207","https://openalex.org/W4392939693","https://openalex.org/W4394761959","https://openalex.org/W4399792425","https://openalex.org/W4400318197","https://openalex.org/W4401879113","https://openalex.org/W4402013287","https://openalex.org/W4403903525","https://openalex.org/W4405602136","https://openalex.org/W4406657970","https://openalex.org/W4407821126","https://openalex.org/W4408325719"],"related_works":[],"abstract_inverted_index":{"Penetration":[0],"testing":[1],"plays":[2],"a":[3,80,191,205],"pivotal":[4],"role":[5],"in":[6,38,178,215],"proactively":[7],"identifying":[8],"security":[9],"vulnerabilities":[10,77],"within":[11],"modern":[12],"networks.":[13],"Traditional":[14],"approaches,":[15],"including":[16,144],"Deep":[17,24],"Reinforcement":[18],"Learning":[19],"(DRL)-based":[20],"models":[21],"such":[22],"as":[23],"Q-Networks,":[25],"often":[26],"suffer":[27],"from":[28],"high":[29,122],"computational":[30],"cost":[31],"and":[32,40,52,63,78,101,124,151,194,212],"poor":[33],"scalability,":[34],"limiting":[35],"their":[36],"applicability":[37],"large":[39],"dynamic":[41,179],"environments.":[42],"This":[43,90],"paper":[44],"introduces":[45],"AAPDEM,":[46],"an":[47],"Automated":[48],"Attack":[49],"Path":[50],"Discovery":[51],"Exploitation":[53],"Model,":[54],"which":[55],"integrates":[56],"real-time":[57],"network":[58,109,132,217],"scanning,":[59],"structured":[60],"vulnerability":[61,136,186],"analysis,":[62],"heuristic":[64],"pathfinding":[65],"to":[66,85,108,164],"address":[67],"these":[68],"limitations.":[69],"AAPDEM":[70,138,157,189],"constructs":[71],"attack":[72,88,209],"graphs":[73],"based":[74],"on":[75,171],"discovered":[76],"employs":[79],"cost-aware":[81],"A*":[82],"search":[83],"algorithm":[84],"identify":[86],"optimal":[87],"paths.":[89],"eliminates":[91],"the":[92,115,119],"need":[93],"for":[94,197,208],"model":[95],"training":[96],"while":[97],"significantly":[98],"reducing":[99,166],"memory":[100],"processing":[102],"overhead.":[103],"The":[104],"framework":[105],"adapts":[106],"efficiently":[107],"changes":[110],"by":[111,169,181],"incrementally":[112],"updating":[113],"only":[114],"affected":[116],"portions":[117],"of":[118],"graph,":[120],"maintaining":[121,182],"accuracy":[123],"responsiveness.":[125],"Comprehensive":[126],"experiments":[127],"were":[128],"conducted":[129],"across":[130,184],"various":[131],"scales":[133],"using":[134],"real-world":[135],"data.":[137],"was":[139],"benchmarked":[140],"against":[141],"state-of-the-art":[142],"methods,":[143],"Random":[145],"Walk,":[146],"Greedy":[147],"Search,":[148],"Genetic":[149],"Algorithms,":[150],"DRL-based":[152],"approaches.":[153],"Results":[154],"show":[155],"that":[156],"consistently":[158],"achieves":[159],"higher":[160],"path":[161,210],"accuracy\u2014improving":[162],"up":[163],"12%\u2014while":[165],"execution":[167],"time":[168],"35%":[170],"average.":[172],"Furthermore,":[173],"it":[174],"demonstrated":[175],"strong":[176],"resilience":[177],"environments":[180],"stability":[183],"fluctuating":[185],"conditions.":[187],"Overall,":[188],"offers":[190],"scalable,":[192],"efficient,":[193],"accurate":[195],"solution":[196],"automated":[198],"penetration":[199],"testing,":[200],"equipping":[201],"cybersecurity":[202],"professionals":[203],"with":[204],"practical":[206],"tool":[207],"discovery":[211],"risk":[213],"assessment":[214],"evolving":[216],"infrastructures.":[218]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
