{"id":"https://openalex.org/W4401514886","doi":"https://doi.org/10.1145/3688401","title":"Hardening Active Directory Graphs via Evolutionary Diversity Optimization-based Policies","display_name":"Hardening Active Directory Graphs via Evolutionary Diversity Optimization-based Policies","publication_year":2024,"publication_date":"2024-08-12","ids":{"openalex":"https://openalex.org/W4401514886","doi":"https://doi.org/10.1145/3688401"},"language":"en","primary_location":{"id":"doi:10.1145/3688401","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688401","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3688401","source":{"id":"https://openalex.org/S4210221532","display_name":"ACM Transactions on Evolutionary Learning and Optimization","issn_l":"2688-299X","issn":["2688-299X","2688-3007"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Evolutionary Learning and Optimization","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3688401","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084412291","display_name":"Diksha Goel","orcid":"https://orcid.org/0000-0001-8212-8793"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I4210154771","display_name":"CSIRO Manufacturing","ror":"https://ror.org/04sx9wp33","country_code":"AU","type":"facility","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4210154771","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Diksha Goel","raw_affiliation_strings":["CSIRO\u2019s Data61, Clayton, Australia","CSIRO's Data61, Australia"],"affiliations":[{"raw_affiliation_string":"CSIRO\u2019s Data61, Clayton, Australia","institution_ids":["https://openalex.org/I4210154771","https://openalex.org/I42894916"]},{"raw_affiliation_string":"CSIRO's Data61, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014798059","display_name":"Max Ward","orcid":"https://orcid.org/0000-0001-9114-7339"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Max Ward","raw_affiliation_strings":["Department of Computer Science and Software Engineering, University of Western Australia, Perth, Australia","Department of Computer Science and Software Engineering, University of Western Australia, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, University of Western Australia, Perth, Australia","institution_ids":["https://openalex.org/I177877127"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, University of Western Australia, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001757263","display_name":"Aneta Neumann","orcid":"https://orcid.org/0000-0002-0036-4782"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Aneta Neumann","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","School of Computer and Mathematical Sciences, University of Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]},{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089531887","display_name":"Frank Neumann","orcid":"https://orcid.org/0000-0002-2721-3618"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Frank Neumann","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","School of Computer and Mathematical Sciences, University of Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]},{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056718700","display_name":"Hung Nguyen","orcid":"https://orcid.org/0000-0003-1028-920X"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hung Nguyen","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","School of Computer and Mathematical Sciences, University of Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]},{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019911052","display_name":"Mingyu Guo","orcid":"https://orcid.org/0000-0002-3478-9201"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mingyu Guo","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","School of Computer and Mathematical Sciences, University of Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]},{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5084412291"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I4210154771","https://openalex.org/I42894916"],"apc_list":null,"apc_paid":null,"fwci":0.698,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71343999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"5","issue":"3","first_page":"1","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7812314033508301},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.7118802070617676},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.687528133392334},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5547003746032715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4678925573825836},{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.4378606081008911},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.42960137128829956},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.42036765813827515},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.41865628957748413},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3990539610385895},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34059250354766846},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.33736473321914673},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12652549147605896},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.12584340572357178}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7812314033508301},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.7118802070617676},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.687528133392334},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5547003746032715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4678925573825836},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.4378606081008911},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42960137128829956},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.42036765813827515},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.41865628957748413},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3990539610385895},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34059250354766846},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.33736473321914673},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12652549147605896},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12584340572357178},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3688401","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688401","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3688401","source":{"id":"https://openalex.org/S4210221532","display_name":"ACM Transactions on Evolutionary Learning and Optimization","issn_l":"2688-299X","issn":["2688-299X","2688-3007"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Evolutionary Learning and Optimization","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/e08ccd05-4604-414a-b526-3f3dc1976fd8","is_oa":false,"landing_page_url":"https://admin.research-repository.uwa.edu.au/en/publications/e08ccd05-4604-414a-b526-3f3dc1976fd8","pdf_url":null,"source":{"id":"https://openalex.org/S4306402523","display_name":"UWA Profiles and Research Repository (University of Western Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Goel, D, Ward, M, Neumann, A, Neumann, F, Nguyen, H & Guo, M 2025, 'Hardening Active Directory Graphs via Evolutionary Diversity Optimization-based Policies', ACM Transactions on Evolutionary Learning and Optimization, vol. 5, no. 3, 19. https://doi.org/10.1145/3688401","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3688401","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688401","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3688401","source":{"id":"https://openalex.org/S4210221532","display_name":"ACM Transactions on Evolutionary Learning and Optimization","issn_l":"2688-299X","issn":["2688-299X","2688-3007"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Evolutionary Learning and Optimization","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401514886.pdf"},"referenced_works_count":57,"referenced_works":["https://openalex.org/W1504521876","https://openalex.org/W1639032689","https://openalex.org/W1970879550","https://openalex.org/W2030295525","https://openalex.org/W2101822116","https://openalex.org/W2105899518","https://openalex.org/W2115826669","https://openalex.org/W2133057300","https://openalex.org/W2158934842","https://openalex.org/W2266357778","https://openalex.org/W2333874039","https://openalex.org/W2343420905","https://openalex.org/W2525203296","https://openalex.org/W2559199060","https://openalex.org/W2606411279","https://openalex.org/W2913026767","https://openalex.org/W2962687375","https://openalex.org/W2962961217","https://openalex.org/W2996522055","https://openalex.org/W2997353660","https://openalex.org/W2997596630","https://openalex.org/W3005217928","https://openalex.org/W3016842374","https://openalex.org/W3023540311","https://openalex.org/W3027038700","https://openalex.org/W3093426589","https://openalex.org/W3107852229","https://openalex.org/W3111563271","https://openalex.org/W3128013500","https://openalex.org/W3132191748","https://openalex.org/W3134751001","https://openalex.org/W3157719223","https://openalex.org/W3158912946","https://openalex.org/W3168997536","https://openalex.org/W3183048323","https://openalex.org/W3195968524","https://openalex.org/W3208816282","https://openalex.org/W3213792049","https://openalex.org/W3216656735","https://openalex.org/W3217115371","https://openalex.org/W4206625874","https://openalex.org/W4210618988","https://openalex.org/W4211171425","https://openalex.org/W4220747123","https://openalex.org/W4223411023","https://openalex.org/W4224220194","https://openalex.org/W4225631948","https://openalex.org/W4250863246","https://openalex.org/W4294876381","https://openalex.org/W4309284213","https://openalex.org/W4365800092","https://openalex.org/W4382239480","https://openalex.org/W4383221437","https://openalex.org/W4387538378","https://openalex.org/W4400412639","https://openalex.org/W6600339963","https://openalex.org/W6730213019"],"related_works":["https://openalex.org/W1987562536","https://openalex.org/W17155033","https://openalex.org/W4383533535","https://openalex.org/W2375814310","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4255938919","https://openalex.org/W2903244929","https://openalex.org/W2020507817","https://openalex.org/W2022485595"],"abstract_inverted_index":{"Active":[0],"Directory":[1],"(AD)":[2],"is":[3,70,86,107,143],"the":[4,78,96,105,117,129,134,152,171,182,190,193,203,226],"default":[5],"security":[6],"management":[7],"system":[8],"for":[9,160,188],"Windows":[10],"domain":[11],"networks.":[12],"An":[13],"AD":[14,64,118,222],"environment":[15],"can":[16],"be":[17],"described":[18],"as":[19,155],"a":[20,52,89,146,175,198],"cyber-attack":[21],"graph,":[22],"with":[23],"nodes":[24],"representing":[25],"computers,":[26],"accounts,":[27],"and":[28,31,59,206,238],"so":[29],"forth,":[30],"edges":[32,93],"indicating":[33],"existing":[34],"accesses":[35],"or":[36],"known":[37],"exploits":[38],"that":[39,104,142,225],"enable":[40],"attackers":[41],"to":[42,47,71,87,94,112,137,201,214],"move":[43],"from":[44,120],"one":[45,57,60],"node":[46],"another.":[48],"This":[49],"article":[50,102,123],"explores":[51],"Stackelberg":[53],"game":[54],"model":[55],"between":[56],"attacker":[58],"defender":[61],"on":[62,170,220],"an":[63,138,156],"attack":[65],"graph.":[66],"The":[67,83,101,167],"attacker\u2019s":[68,97,135,204,235],"goal":[69],"maximize":[72],"their":[73],"chances":[74],"of":[75,92,99,178,185],"successfully":[76],"reaching":[77],"destination":[79],"before":[80],"getting":[81],"detected.":[82],"defender\u2019s":[84,161,172,216],"aim":[85],"block":[88],"constant":[90],"number":[91],"minimize":[95],"chance":[98],"success.":[100],"shows":[103],"problem":[106,136,205,236],"#P-hard":[108],"and,":[109],"therefore,":[110],"intractable":[111],"solve":[113,202,215],"exactly.":[114],"To":[115],"defend":[116],"graph":[119],"cyberattackers,":[121],"this":[122],"proposes":[124],"two":[125],"defensive":[126,165,212,228,241],"approaches.":[127],"In":[128,192],"first":[130],"approach,":[131,195],"we":[132,196],"convert":[133],"exponential-sized":[139],"Dynamic":[140],"Program":[141],"approximated":[144],"by":[145],"neural":[147],"network":[148],"(NN).":[149],"Once":[150],"trained,":[151],"NN":[153,187],"serves":[154],"efficient":[157],"fitness":[158],"function":[159],"Evolutionary":[162,209],"Diversity":[163,210],"Optimization-based":[164,211],"policy.":[166],"diversity":[168],"emphasis":[169],"solution":[173],"provides":[174],"diverse":[176],"set":[177],"training":[179,183],"samples,":[180],"improving":[181],"accuracy":[184],"our":[186],"modeling":[189],"attacker.":[191],"second":[194],"propose":[197],"RL-based":[199],"policy":[200,213],"Critic":[207],"network-assisted":[208],"problem.":[217],"Experimental":[218],"results":[219],"synthetic":[221],"graphs":[223],"show":[224],"proposed":[227],"policies":[229],"are":[230],"scalable,":[231],"highly":[232],"effective,":[233],"approximate":[234],"accurately":[237],"generate":[239],"good":[240],"plans.":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
