Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

CyberRAG: An Agentic RAG cyber attack classification and reporting tool

Created by
  • Haebom

Author

Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo

Outline

This paper presents CyberRAG, a novel framework for effectively processing the massive volume of alerts generated by enterprise IDS/IPS systems. CyberRAG is an agent-based Retrieval-Augmented Generation (RAG) framework designed around fine-tuned classifiers for each attack type, tool adapters for alert and information enrichment, and an iterative retrieval and inference loop that queries a domain-specific knowledge base. Unlike existing RAGs, CyberRAG adopts an agent-based design that enables dynamic control flow and adaptive inference. It autonomously refines threat labels and natural language descriptions, thereby reducing false positives and enhancing interpretability. Evaluation results for SQL Injection, XSS, and SSTI demonstrated over 94% accuracy for each class and a final classification accuracy of 94.92%. The generated descriptions achieved a BERTScore of 0.94 and a GPT-4-based expert evaluation score of 4.9/5. CyberRAG demonstrates scalability, supporting new attack types by adding classifiers without retraining the core agent.

Takeaways, Limitations

Takeaways:
Presenting the possibility of improving the efficiency and accuracy of IDS/IPS alarm processing through an agent-based RAG framework.
Presenting the possibility of building a highly reliable cyber defense system by reducing false positives and increasing explainability.
Suggests the possibility of securing system scalability and ease of maintenance by utilizing classifiers specialized for specific attack types.
Presents the possibility of improving SOC operation efficiency by providing real-time classification, description, and structured reporting capabilities.
Limitations:
Currently, only SQL Injection, XSS, and SSTI attacks have been evaluated, and further research is needed to determine the generalizability to other types of attacks.
Further validation of performance and stability in real-world, large-scale environments is needed.
The quality and quantity of the knowledge base used can significantly impact system performance. Difficulties in building and managing the knowledge base may also arise.
The subjectivity of expert evaluations based on GPT-4 may influence the results. Additional objective evaluation metrics are needed.
👍