Yotam Perlitz, Dafna Sheinwald, et al.
AAAI 2023
The complexity of modern computing environments and the growing sophistication of cyber threats necessitate a more robust, adaptive, and automated approach to security enforcement. In this paper, we present a framework leveraging large language models (LLMs) for automating attack mitigation policy compliance through an innovative combination of in-context learning and retrieval-augmented generation (RAG). We begin by describing how our system collects and manages both tool and API specifications, storing them in a vector database to enable efficient retrieval of relevant information. We then detail the architectural pipeline that first decomposes high-level mitigation policies into discrete tasks and subsequently translates each task into a set of actionable API calls. Our empirical evaluation, conducted using publicly available CTI policies in STIXv2 format and Windows API documentation, demonstrates significant improvements in precision, recall, and F1-score when employing RAG compared to a non-RAG baseline.
Yotam Perlitz, Dafna Sheinwald, et al.
AAAI 2023
Tathagata Chakraborti, Vatche Isahagian, et al.
AAAI 2023
Jayaram Kr Kallapalayam Radhakrishnan, Archit Verma, et al.
CLOUD 2020
Dirk Fahland, Fabiana Fournier, et al.
DKE