<?xml version="1.0"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-05-24T05:26:21Z</responseDate><request verb="GetRecord" metadataPrefix="oai_dc">https://keep.lib.asu.edu/oai/request</request><GetRecord><record><header><identifier>oai:keep.lib.asu.edu:node-131884</identifier><datestamp>2024-12-18T20:58:30Z</datestamp><setSpec>oai_pmh:all</setSpec><setSpec>oai_pmh:repo_items</setSpec></header><metadata><oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><dc:identifier>131884</dc:identifier>
          <dc:identifier>https://hdl.handle.net/2286/R.I.56108</dc:identifier>
                  <dc:rights>http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
                  <dc:date>2020-05</dc:date>
                  <dc:format>17 pages</dc:format>
                  <dc:language>eng</dc:language>
                  <dc:contributor>Dejarnett, Eric Andrew</dc:contributor>
          <dc:contributor>Huang, Dijiang</dc:contributor>
          <dc:contributor>Chowdhary, Ankur</dc:contributor>
          <dc:contributor>Computer Science and Engineering Program</dc:contributor>
          <dc:contributor>Barrett, The Honors College</dc:contributor>
                  <dc:type>Text</dc:type>
                  <dc:description>As automation research into penetration testing has developed, several methods have been proposed as suitable control mechanisms for use in pentesting frameworks. These include Markov Decision Processes (MDPs), partially observable Markov Decision Processes (POMDPs), and POMDPs utilizing reinforcement learning. Since much work has been done automating other aspects of the pentesting process using exploit frameworks and scanning tools, this is the next focal point in this field. This paper shows a fully-integrated solution comprised of a POMDP-based planning algorithm, the Nessus scanning utility, and MITRE&#039;s CALDERA pentesting platform. These are linked in order to create an autonomous AI attack platform with scanning, planning, and attack capabilities.</dc:description>
                  <dc:subject>planning algorithm</dc:subject>
          <dc:subject>POMDP</dc:subject>
          <dc:subject>autonomous penetration testing</dc:subject>
          <dc:subject>Artificial Intelligence</dc:subject>
          <dc:subject>network security</dc:subject>
                  <dc:title>AI-Based Autonomous Security Assessment Tool</dc:title></oai_dc:dc></metadata></record></GetRecord></OAI-PMH>
