Seek and You Shall SOC: Blending Human Expertise with Multimodal Generative AI for Scalable Threat Prevention
| dc.citation.volume | Accepted Manuscript | |
| dc.contributor.author | Xu D | |
| dc.contributor.author | Gondal I | |
| dc.contributor.author | Yi X | |
| dc.contributor.author | Susnjak T | |
| dc.contributor.author | McIntosh T | |
| dc.date.accessioned | 2026-04-08T21:43:25Z | |
| dc.date.issued | 2026-02-26 | |
| dc.description.abstract | Large language models (LLMs) are increasingly employed within Security Operations Centres (SOCs), including SOC for Digital Risk Protection (DRP), yet their outputs often exhibit partial coverage, hallucinations, verbosity, and lack of localized insights. This article proposes a hybrid reasoning pipeline that combines multimodal LLMs with stable human-curated references to mitigate these issues, and is distinct from standard retrieval-augmented generation because offline, human-curated references are applied as an explicit decision-time override rather than used solely as supportive retrieved context. We introduce a step-by-step process that incorporates multi-vantage crawling for evasive content, deterministic prompts to manage inconsistency, and a structured approach to override or refine the model’s classifications when local brand knowledge contradicts global assumptions, together with an analyst-governed escalation loop that records when and why overrides occur in external-SOC DRP settings. Empirical evaluations with multiple commercial and open-source model providers show that this method significantly boosts scam detection accuracy, lowers token costs through caching, and reduces misleading outputs by adopting curated domain data, including comparisons against a RAG-only configuration and classical non-LLM baselines. Results underline how offline reference injection fosters a reliable collaboration pattern that harmonizes automated tasks with human expertise, thereby enhancing scalability and trust in real-world SOC environments. | |
| dc.description.confidential | false | |
| dc.description.notes | Just Accepted keywords: Zero Trust, Generative AI, Cybersecurity, Adversarial Attacks, Trust Mechanisms, AI Auditing | |
| dc.identifier.citation | Xu D, Gondal I, Yi X, Susnjak T, McIntosh T. (2026). Seek and You Shall SOC: Blending Human Expertise with Multimodal Generative AI for Scalable Threat Prevention. ACM Transactions on Internet Technology. Accepted Manuscript. | |
| dc.identifier.doi | 10.1145/3799420 | |
| dc.identifier.eissn | 1557-6051 | |
| dc.identifier.elements-type | journal-article | |
| dc.identifier.uri | https://mro.massey.ac.nz/handle/10179/74404 | |
| dc.language | English | |
| dc.publisher | Association for Computing Machinery (ACM) | |
| dc.publisher.uri | https://doi.org/10.1145/3799420 | |
| dc.relation.isPartOf | ACM Transactions on Internet Technology | |
| dc.rights | (c) The author/s | en |
| dc.rights.license | CC BY-NC-ND 4.0 | en |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | en |
| dc.title | Seek and You Shall SOC: Blending Human Expertise with Multimodal Generative AI for Scalable Threat Prevention | |
| dc.type | Journal article | |
| pubs.elements-id | 609833 | |
| pubs.organisational-group | Other |
