
Table 3: Overall comparison between the performance of
the LLM-generated and optimized priority values for ac-
cess control decision-making. The bold values are the best
results among the methods that use the priority-based com-
bining algorithms, which are marked in gray.
TP FP TN FN Precision Recall F1
Allow-
overrides
18729 7801 0 86 0.706 0.995 0.826
LLM-based
priority
127 0 7801 18688 1 0.007 0.013
CMA 18597 0 7801 218 1 0.988 0.994
CMandAS3 18597 0 7801 218 1 0.988 0.994
DE 18587 0 7801 228 1 0.988 0.994
NGOpt 18609 0 7801 206 1 0.989 0.994
Random
Search
18504 0 7801 311 1 0.983 0.992
TBPSA 18462 6150 1651 353 0.75 0.981 0.85
4.4 Discussion
The experimental evaluation of a typical ICS net-
work yields several noteworthy observations, along
with limitations that require further consideration.
Firstly, the proliferation of LLM-generated policies
often leads to conflicts and redundancies. Detect-
ing and correcting policy conflicts and redundancies
represent critical future tasks to enhance overall ef-
ficiency. Secondly, priority optimization evaluations
show that using the raw policies with optimized prior-
ity values in a priority-based combining algorithm can
yield access control decisions comparable to those de-
rived from the ground truth data. However, access to
ground truth data is crucial for precisely adjusting the
priorities of generated policies.
5 CONCLUSION
This study introduced a novel LLM-based methodol-
ogy for developing fine-grained ABAC policies and
addressing key challenges of LLMs, such as context
insufficiency, and length limit. The approach com-
bines various components, including data manage-
ment and transformation, prompt construction with
RAG-like knowledge integration and multi-turn tem-
plate, attribute refinement, mixture-of-agents policy
generation, and priority optimization.
We utilized a typical ICS network as a running ex-
ample to generate 181 fine-grained ABAC policies.
We discussed several reasons why directly applying
these policies in decision-making processes yields un-
desirable results. Our experiments with various op-
timization algorithms indicated that refining the pri-
ority values greatly enhances the effectiveness of the
generated policies, resulting in an F1 score of 0.994.
While priority optimization improves the access
control decision-making of LLM-generated policies,
its effectiveness is limited by reliance on ground truth
data. In future work, we aim to reduce this depen-
dence while optimizing policy priorities and explor-
ing methods to identify optimal guideline/policy sub-
sets and resolve policy conflicts.
REFERENCES
Ahmed, M., Wei, J., and Al-Shaer, E. (2024). Prompting
LLM to Enforce and Validate CIS Critical Security
Control. In Proceedings of the 29th ACM Symposium
on Access Control Models and Technologies, pages
93–104. ACM.
Ait El Hadj, M., Benkaouz, Y., Freisleben, B., and Er-
radi, M. (2017). ABAC Rule Reduction via Similarity
Computation. In Networked Systems, volume 10299,
pages 86–100. Springer International Publishing.
Alohaly, M., Takabi, H., and Blanco, E. (2019). Towards
an Automated Extraction of ABAC Constraints from
Natural Language Policies. In ICT Systems Security
and Privacy Protection, volume 562, pages 105–119.
Springer International Publishing.
Cotrini, C., Weghorn, T., and Basin, D. (2018). Mining
ABAC Rules from Sparse Logs. In 2018 IEEE Euro-
pean Symposium on Security and Privacy (EuroS&P),
pages 31–46. IEEE.
Heaps, J., Krishnan, R., Huang, Y., Niu, J., and Sandhu, R.
(2021). Access Control Policy Generation from User
Stories Using Machine Learning. In Data and Appli-
cations Security and Privacy XXXV, volume 12840,
pages 171–188. Springer International Publishing.
Mitani, S., Kwon, J., Ghate, N., Singh, T., et al. (2023).
Qualitative Intention-aware Attribute-based Access
Control Policy Refinement. In Proceedings of the 28th
ACM Symposium on Access Control Models and Tech-
nologies, pages 201–208. ACM.
Narouei, M., Khanpour, H., Takabi, H., et al. (2017). To-
wards a Top-down Policy Engineering Framework for
Attribute-based Access Control. In Proceedings of the
22nd ACM on Symposium on Access Control Models
and Technologies, pages 103–114. ACM.
OpenStack Security Group (OSSG) (2024). Bandit: Se-
curity analyzer for python code. https://github.com/
PyCQA/bandit. Version 1.7.10.
Rapin, J. and Teytaud, O. (2018). Nevergrad - A
gradient-free optimization platform. https://GitHub.
com/FacebookResearch/Nevergrad.
Smith, A. and Johnson, B. (2024). code diff: Fast ast
based code differencing in python. https://github.com/
username/code diff. Version 1.0.
Stouffer, K., Pillitteri, V., et al. (2015). Guide to Industrial
Control Systems (ICS) Security.
Tarek, S., Saha, D., Saha, S. K., Tehranipoor, M., and Farah-
mandi, F. (2024). SoCureLLM: An LLM-driven Ap-
proach for Large-Scale System-on-Chip Security Ver-
ification and Policy Generation.
Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones,
L., et al. (2017). Attention is All you Need. In Pro-
ceedings of the 31st International Conference on Neu-
LLM-Based Fine-Grained ABAC Policy Generation
211