critical. To this regard, existing repositories for
known attacks and their associated correlation
rules may be useful. Generally, this repository
is named Gene Library and is essential for the
process below.
II Adaptive Algorithm. The adaptive algorithm
produces a number of correlation fingerprints
that will be used to learn new correlation rules.
The basis of this algorithm relies on the AIS
principles –random adaptations will produce new
patterns by applying (i) antibody secretion, (ii)
negative selection, (iii) pathogen match, and (iv)
clonal selection based on affinity mutation.
III Adaptive Immunological Memory Consolida-
tion. New correlation fingerprints are consoli-
dated based on the following knowledge extrac-
tion: using the expertise of the administrator and
automation techniques. On the one hand, the
expert has to manually inspect and validate the
correlation rules in terms of their accuracy. On
the other hand, honeynets seem the best candi-
date to assist the automated consolidation pro-
cess. Specifically, generated fingerprints will be
validated using the non-self activity reported on
the darknet at the beginning. If any of the finger-
prints matches then the immunological memory
(associated to each correlation) will be increased.
4 CONCLUSIONS
In this position paper, we have discussed the appli-
cation of AIS techniques to optimize current SIEM
systems. To this regard, we propose an adaptive im-
mune correlation system to be included into a typi-
cal SIEM architecture. Our global objective is to effi-
ciently generate correlation rules and adaptively pre-
dict novel multi-step attacks. Our proposal comprises
various strategies already used in intrusion detection,
data mining, honeynetsand, just when strictly needed,
the expert supervision. Our hope is that this position
paper will, directly or indirectly, inspire new direc-
tions on applying intelligence to security event corre-
lation.
REFERENCES
Anuar, N., Papadaki, M., Furnell, S., and Clarke, N. (2010).
An investigation and survey of response options for
Intrusion Response Systems. In Information Security
for South Africa (ISSA), 2010, pages 1–8. IEEE.
Carter, J. H. (2000). The immune system as a model for
pattern recognition and classification. Journal of the
American Medical Informatics Association: JAMIA,
7(1):28–41.
Dasgupta, D. (2006). Advances in ais. IEEE Comp. Intelli-
gent Magazine, 1(4):40–49.
De Castro, L. and Timmis, J. (2002). Artificial immune
systems: a new computational intelligence approach.
Springer Verlag.
Farmer, J. D., Packard, N. H., and Perelson, A. S. (1986).
The immune system, adaptation, and machine learn-
ing. Physica D: Nonlinear Phen., 22(1-3):187–204.
Hofmeyr, S. A. and Forrest, S. (2000). Architecture for an
artificial immune system. Evolutionary computation,
8(4):443–73.
Jerne, N. K. (1974). Towards a network theory of the im-
mune system. Ann. Immunol., 125C:373–389.
Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco,
G., and Twycross, J. (2007). Immune system ap-
proaches to intrusion detection–a review. Natural
computing, 6(4):413–466.
Lippmann, R. P. and Cunningham, R. K. (2000). Improv-
ing intrusion detection performance using keyword
selection and neural networks. Computer Networks,
34(4):597–603. Recent Advances in IDS.
Mutz, D., Vigna, G., and Kemmerer, R. (2003). An Expe-
rience Developing an IDS Stimulator for the Black-
Box Testing of Network Intrusion Detection Systems.
In Proc. of the 2003 Computer Security Applications
Conf., Las Vegas, Nevada.
Ripley, B. (1994). Neural networks and related methods for
classification. Journal of the Royal Statistical Society,
56(3):409–456.
Spitzner, L. (2003). The honeynet project: Trapping the
hackers. IEEE Security and Privacy, pages 15–23.
Suarez-Tangil, G., Palomar, E., Fuentes, J. D., Blasco, J.,
and Ribagorda, A. (2009). Automatic rule generation
based on genetic programming for event correlation.
In Computational Intelligence in Security for Infor-
mation, Advances in Soft Computing, pages 127–134,
Burgos, Spain. Heidelberg, Springer Berlin.
Watkins, A., Timmis, J., and Boggess, L. (2004). Artificial
Immune Recognition System: An Immune-Inspired
Supervised Learning Algorithm. Genetic Program-
ming and Evolvable Machines, 5(3):291–317.
ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM
425