A comparative evaluation of two algorithms for Windows Registry Anomaly Detection


Journal Article

We present a component anomaly detector for a host-based intrusion detection system (IDS) for Microsoft Windows. The core of the detector is a learning-based anomaly detection algorithm that detects attacks on a host machine by looking for anomalous accesses to the Windows Registry. We present and compare two anomaly detection algorithms for use in our IDS system and evaluate their performance. One algorithm called PAD, for Probabilistic Anomaly Detection, is based upon a probability density estimation while the second uses the Support Vector Machine framework. The key idea behind the detector is to first train a model of normal Registry behavior on a Windows host, even when noise may be present in the training data, and use this model to detect abnormal Registry accesses. At run-time the model is used to check each access to the Registry in real-time to determine whether or not the behavior is abnormal and possibly corresponds to an attack. The system is effective in detecting the actions of malicious software while maintaining a low rate of false alarms. We show that the probabilistic anomaly detection algorithm exhibits better performance in accuracy and in computational complexity over the support vector machine implementation under three different kernel functions. © 2005 - IOS Press and the authors. All rights reserved.

Full Text

Duke Authors

Cited Authors

  • Stolfo, SJ; Apap, F; Eskin, E; Heller, K; Hershkop, S; Honig, A; Svore, K

Published Date

  • January 1, 2005

Published In

Volume / Issue

  • 13 / 4

Start / End Page

  • 659 - 693

International Standard Serial Number (ISSN)

  • 0926-227X

Digital Object Identifier (DOI)

  • 10.3233/JCS-2005-13403

Citation Source

  • Scopus