{"id":"https://openalex.org/W7126177126","doi":"https://doi.org/10.1109/raid67961.2025.00029","title":"Scalable and Generalizable RL Agents for Attack Path Discovery via Continuous Invariant Spaces","display_name":"Scalable and Generalizable RL Agents for Attack Path Discovery via Continuous Invariant Spaces","publication_year":2025,"publication_date":"2025-10-19","ids":{"openalex":"https://openalex.org/W7126177126","doi":"https://doi.org/10.1109/raid67961.2025.00029"},"language":"en","primary_location":{"id":"doi:10.1109/raid67961.2025.00029","is_oa":false,"landing_page_url":"https://doi.org/10.1109/raid67961.2025.00029","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.science/hal-05182437v1/file/Scalable_and_Generalizable_RL_Agents_for_Attack_Path_Discovery_via_Continuous_Invariant_Spaces.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093312122","display_name":"Franco Terranova","orcid":"https://orcid.org/0009-0001-6989-2655"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Franco Terranova","raw_affiliation_strings":["Universit&#x00E9; de Lorraine, CNRS, Inria, LORIA,Nancy,France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Lorraine, CNRS, Inria, LORIA,Nancy,France","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Abdelkader Lahmadi","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abdelkader Lahmadi","raw_affiliation_strings":["Universit&#x00E9; de Lorraine, CNRS, Inria, LORIA,Nancy,France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Lorraine, CNRS, Inria, LORIA,Nancy,France","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124377223","display_name":"Isabelle Chrisment","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Isabelle Chrisment","raw_affiliation_strings":["Universit&#x00E9; de Lorraine, CNRS, Inria, LORIA,Nancy,France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Lorraine, CNRS, Inria, LORIA,Nancy,France","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093312122"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I4210121838"],"apc_list":null,"apc_paid":null,"fwci":5.6097,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.96518733,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"440","last_page":"457"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.2540000081062317,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.2540000081062317,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.18490000069141388,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.14270000159740448,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7045999765396118},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5267999768257141},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5202999711036682},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5009999871253967},{"id":"https://openalex.org/keywords/invariant","display_name":"Invariant (physics)","score":0.450300008058548},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4016000032424927},{"id":"https://openalex.org/keywords/retraining","display_name":"Retraining","score":0.36090001463890076}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7228999733924866},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7045999765396118},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5267999768257141},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5202999711036682},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5009999871253967},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4530999958515167},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.450300008058548},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42489999532699585},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4016000032424927},{"id":"https://openalex.org/C2778712577","wikidata":"https://www.wikidata.org/wiki/Q3505966","display_name":"Retraining","level":2,"score":0.36090001463890076},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35589998960494995},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.3481000065803528},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C115874739","wikidata":"https://www.wikidata.org/wiki/Q825377","display_name":"Critical path method","level":2,"score":0.2538999915122986},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/raid67961.2025.00029","is_oa":false,"landing_page_url":"https://doi.org/10.1109/raid67961.2025.00029","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-05182437v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05182437","pdf_url":"https://hal.science/hal-05182437v1/file/Scalable_and_Generalizable_RL_Agents_for_Attack_Path_Discovery_via_Continuous_Invariant_Spaces.pdf","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2025, Gold Coast, Australia. pp.440-457, &#x27E8;10.1109/RAID67961.2025.00029&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-05182437v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05182437","pdf_url":"https://hal.science/hal-05182437v1/file/Scalable_and_Generalizable_RL_Agents_for_Attack_Path_Discovery_via_Continuous_Invariant_Spaces.pdf","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2025, Gold Coast, Australia. pp.440-457, &#x27E8;10.1109/RAID67961.2025.00029&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7126177126.pdf","grobid_xml":"https://content.openalex.org/works/W7126177126.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W173465256","https://openalex.org/W2033742178","https://openalex.org/W2077937403","https://openalex.org/W2121805588","https://openalex.org/W2123651102","https://openalex.org/W2164858444","https://openalex.org/W2605102758","https://openalex.org/W2800109782","https://openalex.org/W2892859754","https://openalex.org/W2902907165","https://openalex.org/W2907492528","https://openalex.org/W2949676527","https://openalex.org/W2960705509","https://openalex.org/W3094485976","https://openalex.org/W3194625192","https://openalex.org/W3206568895","https://openalex.org/W4205956124","https://openalex.org/W4213251304","https://openalex.org/W4244190327","https://openalex.org/W4307964230","https://openalex.org/W4309675179","https://openalex.org/W4319079731","https://openalex.org/W4386503406","https://openalex.org/W4387382599","https://openalex.org/W4392397402","https://openalex.org/W4392849751","https://openalex.org/W4401159821","https://openalex.org/W4402212989","https://openalex.org/W4402784347","https://openalex.org/W4405439851"],"related_works":[],"abstract_inverted_index":{"Identifying":[0],"critical":[1,43],"attack":[2],"paths":[3],"in":[4,40,176,181,200,205,224,235],"a":[5,15,54,58,99,160],"net-work-sequences":[6],"of":[7,137,169,190,198,215,250],"vulnerabilities":[8,89],"an":[9,134,195,211],"attacker":[10],"can":[11,237],"chain":[12],"to":[13,53,77,115,141,154,165,218,239],"achieve":[14,247],"specific":[16,55],"threat":[17],"model-is":[18],"crucial":[19],"for":[20,37,101,110],"pinpointing":[21],"vulnerable":[22],"areas":[23],"where":[24],"defensive":[25],"measures":[26],"should":[27],"be":[28],"focused.":[29],"Recently,":[30],"Reinforcement":[31],"Learning":[32],"(RL)":[33],"has":[34],"gained":[35],"traction":[36],"training":[38,170],"agents":[39,51,143,203,233,246],"identifying":[41],"these":[42],"paths.":[44],"However,":[45],"current":[46],"solutions":[47],"typically":[48],"train":[49,142],"RL":[50,111],"tailored":[52],"environment-defined":[56],"by":[57],"fixed":[59],"network":[60,86,123],"structure":[61],"and":[62,82,88,104,107,125,159,171,187,241],"vulnerability":[63,126,157],"set-requiring":[64],"costly":[65],"retraining":[66],"whenever":[67],"either":[68],"changes.":[69],"This":[70],"limitation":[71],"arises":[72],"from":[73],"optimizing":[74],"the":[75,145,167,251,260],"agent":[76],"map":[78],"between":[79],"discrete":[80,92,206],"input":[81,106],"output":[83,108],"spaces,":[84,207],"treating":[85],"nodes":[87],"as":[90,208,210],"atomic":[91],"elements.":[93],"In":[94],"this":[95],"paper,":[96],"we":[97],"propose":[98],"method":[100],"constructing":[102],"continuous":[103,147,177,232],"invariant":[105],"spaces":[109,178],"agents,":[112],"enabling":[113],"them":[114],"learn":[116],"transferable":[117],"policies":[118],"that":[119],"generalize":[120],"across":[121],"diverse":[122],"configurations":[124],"sets.":[127],"We":[128],"also":[129],"release":[130],"Continuous":[131],"CyberBattleSim":[132,139],"(C-CyberBattleSim),":[133],"enhanced":[135],"version":[136],"Microsoft":[138],"designed":[140],"with":[144,184],"novel":[146],"spaces.":[148],"The":[149],"tool":[150],"is":[151],"further":[152],"extended":[153],"integrate":[155],"realworld":[156],"data":[158],"new":[161],"scenario":[162],"generation":[163],"pipeline":[164],"improve":[166],"realism":[168],"testing":[172],"environments.":[173],"Agents":[174],"trained":[175,204,223,234,257],"are":[179],"assessed":[180],"800":[182],"scenarios":[183,221],"varying":[185],"sizes":[186],"various":[188],"allocations":[189],"829":[191],"real-world":[192,240],"vulnerabilities,":[193],"demonstrating":[194,262],"average":[196,212],"improvement":[197],"9.3x":[199],"scalability":[201],"against":[202],"well":[209],"generalization":[213],"score":[214,252],"$89":[216],"\\%$":[217,249],"more":[219],"complex":[220],"when":[222],"simpler":[225],"scenarios.":[226],"A":[227],"final":[228],"study":[229],"evaluates":[230],"whether":[231],"simulation":[236],"adapt":[238],"emulated":[242],"scans.":[243],"On":[244],"average,":[245],"$75":[248],"they":[253],"would":[254],"have":[255],"if":[256],"directly":[258],"on":[259],"scans,":[261],"effective":[263],"knowledge":[264],"transfer.":[265]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-02-01T00:00:00"}
