RefinementEngine: Automating Intent-to-Device Filtering Policy Deployment under Network Constraints

πŸ“… 2026-04-02
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
This work addresses the challenge of efficiently and accurately translating high-level security intents into deployable device-level policies in complex heterogeneous networks, where topological reachability and device capabilities often lead to misconfigurations and delayed responses. To overcome these limitations, the authors propose an end-to-end automated framework that uniquely integrates network topology, device capabilities, and real-time cyber threat intelligence (CTI). By leveraging formal modeling, policy compilation, and constraint solving, the approach automatically refines abstract security intents into concrete, network-compliant filtering rules. Experimental validation in real-world environments demonstrates the system’s ability to correctly generate both packet-filtering and web-filtering policies, confirming its practicality, correctness, and dynamic adaptability to emerging threats.
πŸ“ Abstract
Translating security intent into deployable network enforcement rules and maintaining their effectiveness despite evolving cyber threats remains a largely manual process in most Security Operations Centers (SOCs). In large and heterogeneous networks, this challenge is complicated by topology-dependent reachability constraints and device-specific security control capabilities, making the process slow, error-prone, and a recurring source of misconfigurations. This paper presents RefinementEngine, an engine that automates the refinement of high-level security intents into low-level, deployment-ready configurations. Given a network topology, devices, and available security controls, along with high-level intents and Cyber Threat Intelligence (CTI) reports, RefinementEngine automatically generates settings that implement the desired intent, counter reported threats, and can be directly deployed on target security controls. The proposed approach is validated through real-world use cases on packet and web filtering policies derived from actual CTI reports, demonstrating both correctness, practical applicability, and adaptability to new data.
Problem

Research questions and friction points this paper is trying to address.

security intent
network constraints
policy deployment
misconfigurations
cyber threats
Innovation

Methods, ideas, or system contributions that make the work stand out.

intent-based security
policy refinement
network constraints
Cyber Threat Intelligence
automated deployment
πŸ”Ž Similar Papers
No similar papers found.
D
Davide Colaiacomo
Politecnico di Torino, Torino, Italy
C
Chiara Bonfanti
Politecnico di Torino, Torino, Italy
Cataldo Basile
Cataldo Basile
Associate Professor at the Politecnico di Torino
Network SecurityPolicy-based Security ManagementSoftware Protection