On Automating Security Policies with Contemporary LLMs

๐Ÿ“… 2025-06-05
๐Ÿ“ˆ Citations: 0
โœจ Influential: 0
๐Ÿ“„ PDF
๐Ÿค– AI Summary
Addressing the challenge of automatically and accurately mapping high-level security policies to low-level API invocations in complex network environments, this paper proposes a security policy parsing framework that integrates context learning with retrieval-augmented generation (RAG). The framework synergistically leverages STIXv2 threat intelligence parsing, Windows API semantic modeling, and vector database indexing to enable dynamic adaptation across heterogeneous security tools and API specifications. Differing from prior approaches, this work is the first to systematically incorporate RAG into the security policy execution pipeline, significantly enhancing semantic alignment between policies and executable APIs. Experimental evaluation on the CTI policy dataset demonstrates that our method achieves average improvements exceeding 32% over baseline models in execution precision, recall, and F1-scoreโ€”thereby validating its effectiveness and generalizability.

Technology Category

Application Category

๐Ÿ“ Abstract
The complexity of modern computing environments and the growing sophistication of cyber threats necessitate a more robust, adaptive, and automated approach to security enforcement. In this paper, we present a framework leveraging large language models (LLMs) for automating attack mitigation policy compliance through an innovative combination of in-context learning and retrieval-augmented generation (RAG). We begin by describing how our system collects and manages both tool and API specifications, storing them in a vector database to enable efficient retrieval of relevant information. We then detail the architectural pipeline that first decomposes high-level mitigation policies into discrete tasks and subsequently translates each task into a set of actionable API calls. Our empirical evaluation, conducted using publicly available CTI policies in STIXv2 format and Windows API documentation, demonstrates significant improvements in precision, recall, and F1-score when employing RAG compared to a non-RAG baseline.
Problem

Research questions and friction points this paper is trying to address.

Automating security policies using LLMs for cyber threats
Leveraging RAG to improve policy compliance precision
Translating mitigation policies into actionable API calls
Innovation

Methods, ideas, or system contributions that make the work stand out.

Leveraging LLMs for automated security policy enforcement
Combining in-context learning with retrieval-augmented generation
Decomposing policies into actionable API calls via vector database
๐Ÿ”Ž Similar Papers
No similar papers found.