{"id":"https://openalex.org/W7125958487","doi":"https://doi.org/10.1109/smc58881.2025.11343228","title":"Automated Penetration on Multi-Subnet Environments with Dual-Stage DRL Models","display_name":"Automated Penetration on Multi-Subnet Environments with Dual-Stage DRL Models","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125958487","doi":"https://doi.org/10.1109/smc58881.2025.11343228"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124117908","display_name":"Haoyu Bu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoyu Bu","raw_affiliation_strings":["Chinese Academy of Science,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124069139","display_name":"Hui Wen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Wen","raw_affiliation_strings":["Chinese Academy of Science,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124083318","display_name":"Hongsong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongsong Zhu","raw_affiliation_strings":["Chinese Academy of Science,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065859286","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-9198-3951"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Li","raw_affiliation_strings":["Chinese Academy of Science,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069182679","display_name":"Xinzhe Song","orcid":"https://orcid.org/0000-0002-6638-7805"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xirui Song","raw_affiliation_strings":["Chinese Academy of Science,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045009020","display_name":"Yimo Ren","orcid":"https://orcid.org/0000-0002-7543-0326"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yimo Ren","raw_affiliation_strings":["Chinese Academy of Science,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5124117908"],"corresponding_institution_ids":["https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85107617,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5054","last_page":"5059"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3224000036716461,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3224000036716461,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.21400000154972076,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.20579999685287476,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6626999974250793},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6532999873161316},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5239999890327454},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.4887000024318695},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4853000044822693},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.4641000032424927},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.44119998812675476},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.43529999256134033}],"concepts":[{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6626999974250793},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6532999873161316},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5875999927520752},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5239999890327454},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.4887000024318695},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4853000044822693},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.4641000032424927},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45419999957084656},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.44119998812675476},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.43529999256134033},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3882000148296356},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3499000072479248},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3176000118255615},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3151000142097473},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.313400000333786},{"id":"https://openalex.org/C203274722","wikidata":"https://www.wikidata.org/wiki/Q7001161","display_name":"Network performance","level":2,"score":0.31209999322891235},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30320000648498535},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.2870999872684479},{"id":"https://openalex.org/C104122410","wikidata":"https://www.wikidata.org/wiki/Q1416406","display_name":"Network model","level":2,"score":0.27959999442100525},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.2603999972343445},{"id":"https://openalex.org/C129119673","wikidata":"https://www.wikidata.org/wiki/Q4418003","display_name":"Network element","level":2,"score":0.25529998540878296},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1977778029","https://openalex.org/W3094485976","https://openalex.org/W4313216096","https://openalex.org/W4360764596","https://openalex.org/W4386083031","https://openalex.org/W4386349792","https://openalex.org/W4387382599","https://openalex.org/W4401159821","https://openalex.org/W4402352815"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,7,69,75,94,122,134,140,151,167,175,183],"advent":[2],"of":[3,9,77,96,133,142,171,185],"artificial":[4],"intelligence":[5],"techniques,":[6],"field":[8],"Network":[10],"Attack":[11],"Defense":[12],"(NAD)":[13],"has":[14],"witnessed":[15],"a":[16,29,106,190],"surge":[17],"in":[18,38,46,145],"research":[19],"efforts":[20],"towards":[21],"automating":[22],"penetration":[23],"testing":[24],"(PenTest).":[25],"Our":[26,137,179],"work":[27,86,180],"presents":[28],"dual-stage":[30],"PenTest":[31,187],"model":[32,70,144],"aiming":[33],"at":[34],"predicting":[35],"attack":[36],"paths":[37],"network":[39,65,111,119,147],"topology":[40,112],"and":[41,98,126,177,193],"determining":[42],"payload":[43],"for":[44],"vulnerabilities":[45],"hosts":[47],"with":[48,63,80,113],"deep":[49],"reinforcement":[50],"learning":[51],"models.":[52],"While":[53],"constructing":[54],"training":[55,99],"environments,":[56,120],"our":[57,143,155],"approach":[58,156],"integrates":[59],"real-world":[60],"vulnerability":[61,78,172],"environments":[62],"virtual":[64],"topologies.":[66],"This":[67],"allows":[68],"to":[71,84,116,124,182],"take":[72],"into":[73],"account":[74],"process":[76],"validation":[79],"success":[81,169],"rate":[82,170],"compared":[83],"existing":[85],"based":[87],"on":[88],"fully":[89],"virtualized":[90],"targets,":[91],"while":[92],"retaining":[93],"efficiency":[95],"deployment":[97],"provided":[100],"by":[101,188],"virtualization.":[102],"And":[103],"we":[104],"introduce":[105],"method":[107],"that":[108,154],"simulate":[109,117],"hierarchical":[110],"randomized":[114],"subnets":[115],"complex":[118],"challenging":[121],"agent":[123],"adapt":[125],"learn":[127],"effective":[128],"policies":[129],"across":[130],"diverse":[131],"configurations":[132],"target":[135],"networks.":[136],"experiments":[138],"demonstrate":[139],"effectiveness":[141],"various":[146],"sizes.":[148],"In":[149],"addition,":[150],"results":[152],"indicate":[153],"not":[157],"only":[158],"achieves":[159],"high":[160],"performance":[161],"but":[162],"also":[163],"maintains":[164],"stability":[165],"under":[166],"different":[168],"exploitation,":[173],"showcasing":[174],"robustness":[176],"adaptability.":[178],"contributes":[181],"advancement":[184],"automated":[186],"providing":[189],"more":[191],"generalized":[192],"efficient":[194],"solution.":[195]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
