{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:21:47Z","timestamp":1757614907937,"version":"3.44.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01089-x","type":"journal-article","created":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:09:24Z","timestamp":1751090964000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Construction of network pentest-defense adversarial environment based on NASim"],"prefix":"10.1007","volume":"24","author":[{"given":"Yuanzhi","family":"Huo","sequence":"first","affiliation":[]},{"given":"Sicong","family":"You","sequence":"additional","affiliation":[]},{"given":"Mengjie","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,28]]},"reference":[{"key":"1089_CR1","doi-asserted-by":"publisher","first-page":"4117","DOI":"10.3390\/s23084117","volume":"23","author":"U Tariq","year":"2023","unstructured":"Tariq, U., Ahmed, I., Bashir, A.K., Shaukat, K.: A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors 23, 4117 (2023). https:\/\/doi.org\/10.3390\/s23084117","journal-title":"Sensors"},{"key":"1089_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3640019","volume":"5","author":"D Everson","year":"2024","unstructured":"Everson, D., Cheng, L.: A survey on network attack surface mapping. Digital Threats Research and Practice 5, 1\u201325 (2024). https:\/\/doi.org\/10.1145\/3640019","journal-title":"Digital Threats Research and Practice"},{"key":"1089_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3656580","volume":"56","author":"PP Liang","year":"2024","unstructured":"Liang, P.P., Zadeh, A., Morency, L.-P.: Foundations & Trends in Multimodal Machine Learning: Principles, Challenges, and Open Questions. ACM Comput. Surv. 56, 1\u201342 (2024). https:\/\/doi.org\/10.1145\/3656580","journal-title":"ACM Comput. Surv."},{"key":"1089_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3616864","volume":"56","author":"S Milani","year":"2023","unstructured":"Milani, S., Topin, N., Veloso, M., Fang, F.: Explainable Reinforcement Learning: A survey and comparative review. ACM Comput. Surv. 56, 1\u201336 (2023). https:\/\/doi.org\/10.1145\/3616864","journal-title":"ACM Comput. Surv."},{"key":"1089_CR5","doi-asserted-by":"crossref","unstructured":"Abid, MN., Beggas, M., Laouid, A.: Reinforcement Learning Approach for IoT Security using CyberBattleSim: A Simulation-based Study (2024)","DOI":"10.1109\/PAIS62114.2024.10541295"},{"key":"1089_CR6","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3390\/s25010211","volume":"25","author":"AC Moreno","year":"2025","unstructured":"Moreno, A.C., Hernandez-Suarez, A., Sanchez-Perez, G., Toscano-Medina, L.K., Perez-Meana, H., Portillo-Portillo, J., Olivares-Mercado, J., Villalba, L.J.G.: Analysis of autonomous penetration testing through reinforcement learning and recommender systems. Sensors 25, 211 (2025). https:\/\/doi.org\/10.3390\/s25010211","journal-title":"Sensors"},{"key":"1089_CR7","doi-asserted-by":"publisher","unstructured":"Srilatha, D., Thillaiarasu, N.: DDoSNet: A Deep Learning Model for detecting Network Attacks in Cloud Computing. 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) 3:576\u2013581 (2022). https:\/\/doi.org\/10.1109\/icirca54612.2022.9985524","DOI":"10.1109\/icirca54612.2022.9985524"},{"key":"1089_CR8","doi-asserted-by":"publisher","first-page":"276","DOI":"10.3390\/fi14100276","volume":"14","author":"R Akhilesh","year":"2022","unstructured":"Akhilesh, R., Bills, O., Chilamkurti, N., Chowdhury, M.J.M.: Automated Penetration Testing Framework for Smart-Home-Based IoT Devices. Future Internet 14, 276 (2022). https:\/\/doi.org\/10.3390\/fi14100276","journal-title":"Future Internet"},{"key":"1089_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3502868","volume":"31","author":"A Romdhana","year":"2022","unstructured":"Romdhana, A., Merlo, A., Ceccato, M., Tonella, P.: Deep reinforcement learning for black-box testing of Android apps. ACM Transactions on Software Engineering and Methodology 31, 1\u201329 (2022). https:\/\/doi.org\/10.1145\/3502868","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"1089_CR10","doi-asserted-by":"publisher","unstructured":"Schwartz, J., Kurniawati, H.: Autonomous Penetration Testing using Reinforcement Learning. arXiv (Cornell University) (2019). https:\/\/doi.org\/10.48550\/arxiv.1905.05965","DOI":"10.48550\/arxiv.1905.05965"},{"key":"1089_CR11","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.future.2018.07.025","volume":"89","author":"A Furfaro","year":"2018","unstructured":"Furfaro, A., Piccolo, A., Parise, A., Argento, L., Sacc\u00e0, D.: A Cloud-based platform for the emulation of complex cybersecurity scenarios. Futur. Gener. Comput. Syst. 89, 791\u2013803 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.07.025","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1089_CR12","doi-asserted-by":"publisher","unstructured":"Li, L., Rami J-PSE, Taylor, A., Rao, JH., Kunz, T.: Enabling a network AI gym for autonomous cyber agents. arXiv (Cornell University) (2023). https:\/\/doi.org\/10.48550\/arxiv.2304.01366","DOI":"10.48550\/arxiv.2304.01366"},{"key":"1089_CR13","doi-asserted-by":"publisher","unstructured":"Zeng, Y., Cai, R., Sun, F., Huang, L., Hao, Z.: A survey on Causal Reinforcement learning. IEEE Transactions on Neural Networks and Learning Systems 1\u201321,(2024). https:\/\/doi.org\/10.1109\/tnnls.2024.3403001","DOI":"10.1109\/tnnls.2024.3403001"},{"key":"1089_CR14","doi-asserted-by":"publisher","DOI":"10.1201\/9781315140223","author":"E Altman","year":"2021","unstructured":"Altman, E.: Constrained Markov decision processes. (2021). https:\/\/doi.org\/10.1201\/9781315140223","journal-title":"Constrained Markov decision processes."},{"key":"1089_CR15","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/bf00992698","volume":"8","author":"CJCH Watkins","year":"1992","unstructured":"Watkins, C.J.C.H., Dayan, P.: Q-learning. Mach. Learn. 8, 279\u2013292 (1992). https:\/\/doi.org\/10.1007\/bf00992698","journal-title":"Mach. Learn."},{"key":"1089_CR16","doi-asserted-by":"publisher","unstructured":"Hester, T., Vecerik, M., Pietquin, O., Lanctot, M., Schaul, T., Piot, B., Horgan, D., Quan, J., Sendonaris, A., Osband, I., Dulac-Arnold, G., Agapiou, J., Leibo, J., Gruslys, A.: Deep q-learning from demonstrations. Proceedings of the AAAI Conference on Artificial Intelligence 32,(2018). https:\/\/doi.org\/10.1609\/aaai.v32i1.11757","DOI":"10.1609\/aaai.v32i1.11757"},{"key":"1089_CR17","doi-asserted-by":"publisher","unstructured":"Becker, N., Reti, D., Ntagiou, E.V., Wallum, M., Schotten, HD.: Evaluation of Reinforcement Learning for Autonomous Penetration Testing using A3C, Q-learning and DQN. arXiv (Cornell University) (2024). https:\/\/doi.org\/10.48550\/arxiv.2407.15656","DOI":"10.48550\/arxiv.2407.15656"},{"key":"1089_CR18","unstructured":"Understanding Scenarios \u2013 NASim 0.12.0 documentation. https:\/\/networkattacksimulator.readthedocs.io\/en\/latest\/tutorials\/scenarios.html"},{"key":"1089_CR19","doi-asserted-by":"publisher","unstructured":"Zhou, Z., Zhou, T., Xu, J., Zhu, J.: Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory. Computer Modeling in Engineering & Sciences 140:2613\u20132634 (2024). https:\/\/doi.org\/10.32604\/cmes.2023.028553","DOI":"10.32604\/cmes.2023.028553"},{"key":"1089_CR20","doi-asserted-by":"crossref","unstructured":"Hazra, R., Chatterjee, P., Singh, Y., Podder, G., Das, T.: Data encryption and secure communication protocols. In: Advances in web technologies and engineering book series. pp 546\u2013570 (2024)","DOI":"10.4018\/979-8-3693-6557-1.ch022"},{"key":"1089_CR21","doi-asserted-by":"publisher","unstructured":"Vallabhaneni, R., Veeramachaneni, V.: Understanding penetration testing for evaluating vulnerabilities and enhancing cyber security. Engineering and Technology Journal 09 (2024). https:\/\/doi.org\/10.47191\/etj\/v9i10.12","DOI":"10.47191\/etj\/v9i10.12"},{"key":"1089_CR22","doi-asserted-by":"publisher","unstructured":"Hamza, AA., Al-Janabi, JSU.: Detecting brute force attacks on SSH and FTP protocol using Machine Learning: a survey. Journal of Al-Qadisiyah for Computer Science and Mathematics 16 (2024). https:\/\/doi.org\/10.29304\/jqcsm.2024.16.11432","DOI":"10.29304\/jqcsm.2024.16.11432"},{"key":"1089_CR23","unstructured":"S, HHS., Kulkarni SG.: Security and Service Vulnerabilities with HTTP\/3 (2024)"},{"key":"1089_CR24","doi-asserted-by":"crossref","unstructured":"\u00d6zdemir, G., Tuna, G.: Privilege escalation. In: IGI Global eBooks. pp 151\u2013187 (2024)","DOI":"10.4018\/978-1-6684-9800-2.ch007"},{"key":"1089_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1002\/asmb.2752","volume":"40","author":"Q Tian","year":"2023","unstructured":"Tian, Q., Lewis-Beck, C., Niemi, J.B., Meeker, W.Q.: Specifying prior distributions in reliability applications. Appl. Stoch. Model. Bus. Ind. 40, 5\u201362 (2023). https:\/\/doi.org\/10.1002\/asmb.2752","journal-title":"Appl. Stoch. Model. Bus. Ind."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01089-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01089-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01089-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:33:22Z","timestamp":1757072002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01089-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,28]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1089"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01089-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,6,28]]},"assertion":[{"value":"20 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"166"}}