{"id":"https://openalex.org/W4384024269","doi":"https://doi.org/10.1145/3583131.3590436","title":"Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems","display_name":"Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems","publication_year":2023,"publication_date":"2023-07-12","ids":{"openalex":"https://openalex.org/W4384024269","doi":"https://doi.org/10.1145/3583131.3590436"},"language":"en","primary_location":{"id":"doi:10.1145/3583131.3590436","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583131.3590436","pdf_url":null,"source":{"id":"https://openalex.org/S4363608932","display_name":"Proceedings of the Genetic and Evolutionary Computation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Genetic and Evolutionary Computation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084412291","display_name":"Diksha Goel","orcid":"https://orcid.org/0000-0001-8212-8793"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Diksha Goel","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001757263","display_name":"Aneta Neumann","orcid":"https://orcid.org/0000-0002-0036-4782"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Aneta Neumann","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089531887","display_name":"Frank Neumann","orcid":"https://orcid.org/0000-0002-2721-3618"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Frank Neumann","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056718700","display_name":"Hung Nguyen","orcid":"https://orcid.org/0000-0003-1028-920X"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hung Nguyen","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019911052","display_name":"Mingyu Guo","orcid":"https://orcid.org/0000-0002-3478-9201"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mingyu Guo","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5084412291"],"corresponding_institution_ids":["https://openalex.org/I5681781"],"apc_list":null,"apc_paid":null,"fwci":5.4261,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.96510229,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1348","last_page":"1356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8384610414505005},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7984580993652344},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4879741072654724},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.43424034118652344},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43139564990997314},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.4228125214576721},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3726184666156769},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36871930956840515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3613491654396057}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8384610414505005},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7984580993652344},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4879741072654724},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.43424034118652344},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43139564990997314},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.4228125214576721},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3726184666156769},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36871930956840515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3613491654396057},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3583131.3590436","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583131.3590436","pdf_url":null,"source":{"id":"https://openalex.org/S4363608932","display_name":"Proceedings of the Genetic and Evolutionary Computation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Genetic and Evolutionary Computation Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:digital.library.adelaide.edu.au:2440/139311","is_oa":false,"landing_page_url":"https://hdl.handle.net/2440/139311","pdf_url":null,"source":{"id":"https://openalex.org/S4306401835","display_name":"Adelaide Research & Scholarship (AR&S) (University of Adelaide)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5681781","host_organization_name":"The University of Adelaide","host_organization_lineage":["https://openalex.org/I5681781"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://dl.acm.org/doi/proceedings/10.1145/3583131","raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1057128212","display_name":null,"funder_award_id":"DP190103894","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"},{"id":"https://openalex.org/G1219339116","display_name":null,"funder_award_id":"provi","funder_id":"https://openalex.org/F4320320978","funder_display_name":"University of Adelaide"},{"id":"https://openalex.org/G3128856113","display_name":null,"funder_award_id":"FT200100536","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320320978","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58"},{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2105899518","https://openalex.org/W2158934842","https://openalex.org/W2266357778","https://openalex.org/W3094271017","https://openalex.org/W3171223926","https://openalex.org/W4223411023","https://openalex.org/W4225631948","https://openalex.org/W4294876381","https://openalex.org/W4309284213","https://openalex.org/W4382239480","https://openalex.org/W4383221437"],"related_works":["https://openalex.org/W1987562536","https://openalex.org/W4383533535","https://openalex.org/W2375814310","https://openalex.org/W4380353856","https://openalex.org/W2347216446","https://openalex.org/W1995212308","https://openalex.org/W4255938919","https://openalex.org/W2364137969","https://openalex.org/W1985348076","https://openalex.org/W3121296602"],"abstract_inverted_index":{"We":[0,53,116],"study":[1],"a":[2,12,18,106,126,179],"Stackelberg":[3],"game":[4],"between":[5],"one":[6,9],"attacker":[7,23,158],"and":[8,27,75,153,196],"defender":[10,16,172],"in":[11],"configurable":[13],"environment.":[14],"The":[15,22,38,157,171],"picks":[17],"specific":[19,127],"environment":[20,45,109,144],"configuration.":[21],"observes":[24],"the":[25,35,44,51,118,134,162,168,175,193],"configuration":[26],"attacks":[28],"via":[29],"Reinforcement":[30],"Learning":[31],"(RL":[32],"trained":[33],"against":[34],"observed":[36],"environment).":[37],"defender's":[39],"goal":[40],"is":[41,133],"to":[42,59,80,102,160,166],"find":[43,161],"with":[46,68,95],"minimum":[47],"achievable":[48],"reward":[49],"for":[50,65,139],"attacker.":[52],"apply":[54],"Evolutionary":[55],"Diversity":[56,85],"Optimization":[57],"(EDO)":[58],"generate":[60],"diverse":[61],"population":[62],"of":[63,120,182],"environments":[64],"training.":[66],"Environments":[67],"clearly":[69],"high":[70],"rewards":[71],"are":[72],"killed":[73],"off":[74],"replaced":[76],"by":[77,123,177],"new":[78],"offsprings":[79],"avoid":[81],"wasting":[82],"training":[83,89],"time.":[84],"not":[86],"only":[87],"improves":[88],"quality":[90],"but":[91],"also":[92],"fits":[93],"well":[94],"our":[96,121],"RL":[97,99],"scenario:":[98],"agents":[100],"tend":[101],"improve":[103],"gradually,":[104],"so":[105],"slightly":[107],"worse":[108],"earlier":[110],"on":[111,125],"may":[112],"become":[113],"better":[114,189],"later.":[115],"demonstrate":[117],"effectiveness":[119],"approach":[122,187,195],"focusing":[124],"application,":[128],"Active":[129],"Directory":[130],"(AD).":[131],"AD":[132,143],"default":[135],"security":[136],"management":[137],"system":[138],"Windows":[140],"domain":[141],"networks.":[142],"describes":[145],"an":[146],"attack":[147,164],"graph,":[148],"where":[149],"nodes":[150],"represent":[151,155],"computers/accounts/etc.,":[152],"edges":[154,183],"accesses.":[156],"aims":[159],"best":[163],"path":[165],"reach":[167],"highest-privilege":[169],"node.":[170],"can":[173],"change":[174],"graph":[176],"removing":[178],"limited":[180],"number":[181],"(revoke":[184],"accesses).":[185],"Our":[186],"generates":[188],"defensive":[190],"plans":[191],"than":[192],"existing":[194],"scales":[197],"better.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
