Published June 21, 2025 | Version v1
Conference paper Open

RuleXploit: A Framework for Generating Suricata Rules from Exploits Using Generative AI

  • 1. Centre for Research and Technology Hellas: Thessaloniki, GR
  • 2. ROR icon Centre for Research and Technology Hellas
  • 3. CERTH
  • 4. Centre for Research and Technology-Hellas

Description

Intrusion Detection Systems (IDS) are essential for effective cyber-defense. Signature-based IDS operate using specific rules which are difficult to generate due to the evolving cybersecurity landscape. To this end, this work proposes a rule generation framework, called RuleXploit, which uses Large Language Models (LLMs) to generate rules from exploits. The proposed framework is composed of two components: the RuleXploit Generator, which produces rules using structured prompts and examples, and the RuleXploit Refinery, which validates and refines these rules for accuracy and effectiveness. The RuleXploit framework is demonstrated via the GPT-4o model, configured with tailored prompt engineering techniques and settings. RuleXploit successfully generated 100% syntactically valid rules and achieved an effectiveness rate of 76.67% in detecting malicious traffic. This work presents the first approach to generate IDS rules from the exploit code of a vulnerability, offering a novel way towards the successful mitigation of cyber attacks.

Files

Accepted RuleXploit.pdf

Files (387.1 kB)

Name Size Download all
md5:3951bf149f8a6687c89dc1b5944a3ec0
387.1 kB Preview Download