Hierarchical Retrieval Augmented Generation for Adversarial Technique Annotation in Cyber Threat Intelligence Text
A new hierarchical RAG system cuts LLM API calls by 60% and slashes search space by 77.5% for threat intel.
A team of researchers has introduced H-TechniqueRAG, a novel AI framework designed to revolutionize how security analysts map cyber threat reports to the MITRE ATT&CK framework. Unlike standard Retrieval-Augmented Generation (RAG) systems that treat all attack techniques uniformly, H-TechniqueRAG injects a crucial hierarchical bias. It first identifies the high-level adversary tactic (like 'Initial Access' or 'Execution') before searching for specific techniques within that category. This two-stage approach slashes the irrelevant candidate search space by 77.5%, leading to dramatically more efficient and accurate analysis.
The technical innovation doesn't stop at retrieval. The team designed a tactic-aware reranking module and a hierarchy-constrained context organization strategy to bridge the gap between retrieved data and the large language model's (LLM) generation step. This mitigates context overload for the LLM and improves reasoning precision. In comprehensive tests across three diverse CTI datasets, H-TechniqueRAG not only beat the previous best model (TechniqueRAG) by 3.8% in F1 score but also delivered massive operational gains: a 62.4% reduction in inference latency and a 60% decrease in expensive LLM API calls.
Beyond raw performance numbers, the hierarchical design provides superior cross-domain generalization and, critically, offers security analysts highly interpretable, step-by-step decision paths. This transparency is key for trust and validation in high-stakes security environments, moving AI from a black-box tool to a collaborative analyst assistant.
- Uses a two-stage hierarchical retrieval to first find tactics, then techniques, cutting search space by 77.5%.
- Outperforms prior state-of-the-art (TechniqueRAG) by 3.8% in F1 score while being 62.4% faster.
- Reduces costly LLM API calls by 60%, making automated threat intelligence annotation far more economical.
Why It Matters
This makes automated, precise threat analysis significantly faster and cheaper, scaling cyber defense capabilities for enterprises.