Research

Paper

AI LLM March 04, 2026

From Threat Intelligence to Firewall Rules: Semantic Relations in Hybrid AI Agent and Expert System Architectures

Authors

Chiara Bonfanti, Davide Colaiacomo, Luca Cagliero, Cataldo Basile

Abstract

Web security demands rapid response capabilities to evolving cyber threats. Agentic Artificial Intelligence (AI) promises automation, but the need for trustworthy security responses is of the utmost importance. This work investigates the role of semantic relations in extracting information for sensitive operational tasks, such as configuring security controls for mitigating threats. To this end, it proposes to leverage hypernym-hyponym textual relations to extract relevant information from Cyber Threat Intelligence (CTI) reports. By leveraging a neuro-symbolic approach, the multi-agent system automatically generates CLIPS code for an expert system creating firewall rules to block malicious network traffic. Experimental results show the superior performance of the hypernym-hyponym retrieval strategy compared to various baselines and the higher effectiveness of the agentic approach in mitigating threats.

Metadata

arXiv ID: 2603.03911
Provider: ARXIV
Primary Category: cs.AI
Published: 2026-03-04
Fetched: 2026-03-05 06:06

Related papers

Raw Data (Debug)
{
  "raw_xml": "<entry>\n    <id>http://arxiv.org/abs/2603.03911v1</id>\n    <title>From Threat Intelligence to Firewall Rules: Semantic Relations in Hybrid AI Agent and Expert System Architectures</title>\n    <updated>2026-03-04T10:18:01Z</updated>\n    <link href='https://arxiv.org/abs/2603.03911v1' rel='alternate' type='text/html'/>\n    <link href='https://arxiv.org/pdf/2603.03911v1' rel='related' title='pdf' type='application/pdf'/>\n    <summary>Web security demands rapid response capabilities to evolving cyber threats. Agentic Artificial Intelligence (AI) promises automation, but the need for trustworthy security responses is of the utmost importance. This work investigates the role of semantic relations in extracting information for sensitive operational tasks, such as configuring security controls for mitigating threats. To this end, it proposes to leverage hypernym-hyponym textual relations to extract relevant information from Cyber Threat Intelligence (CTI) reports. By leveraging a neuro-symbolic approach, the multi-agent system automatically generates CLIPS code for an expert system creating firewall rules to block malicious network traffic. Experimental results show the superior performance of the hypernym-hyponym retrieval strategy compared to various baselines and the higher effectiveness of the agentic approach in mitigating threats.</summary>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.AI'/>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.CL'/>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.CR'/>\n    <published>2026-03-04T10:18:01Z</published>\n    <arxiv:primary_category term='cs.AI'/>\n    <author>\n      <name>Chiara Bonfanti</name>\n    </author>\n    <author>\n      <name>Davide Colaiacomo</name>\n    </author>\n    <author>\n      <name>Luca Cagliero</name>\n    </author>\n    <author>\n      <name>Cataldo Basile</name>\n    </author>\n  </entry>"
}