A comparative evaluation of two algorithms for Windows Registry Anomaly Detection

  • Authors:
  • Salvatore J. Stolfo;Frank Apap;Eleazar Eskin;Katherine Heller;Shlomo Hershkop;Andrew Honig;Krysta Svore

  • Affiliations:
  • Department of Computer Science, Columbia University, New York, NY 10027, USA E-mail: {sal,fapap,eeskin,heller,shlomo,kmsvore}@cs.columbia.edu;Department of Computer Science, Columbia University, New York, NY 10027, USA E-mail: {sal,fapap,eeskin,heller,shlomo,kmsvore}@cs.columbia.edu;Department of Computer Science, Columbia University, New York, NY 10027, USA E-mail: {sal,fapap,eeskin,heller,shlomo,kmsvore}@cs.columbia.edu;Department of Computer Science, Columbia University, New York, NY 10027, USA E-mail: {sal,fapap,eeskin,heller,shlomo,kmsvore}@cs.columbia.edu;Department of Computer Science, Columbia University, New York, NY 10027, USA E-mail: {sal,fapap,eeskin,heller,shlomo,kmsvore}@cs.columbia.edu;Department of Computer Science, Columbia University, New York, NY 10027, USA E-mail: {sal,fapap,eeskin,heller,shlomo,kmsvore}@cs.columbia.edu;Department of Computer Science, Columbia University, New York, NY 10027, USA E-mail: {sal,fapap,eeskin,heller,shlomo,kmsvore}@cs.columbia.edu

  • Venue:
  • Journal of Computer Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a component anomaly detector for a host-based intrusion detection system (IDS) for Microsoft Windows. The core of the detector is a learning-based anomaly detection algorithm that detects attacks on a host machine by looking for anomalous accesses to the Windows Registry. We present and compare two anomaly detection algorithms for use in our IDS system and evaluate their performance. One algorithm called PAD, for Probabilistic Anomaly Detection, is based upon a probability density estimation while the second uses the Support Vector Machine framework. The key idea behind the detector is to first train a model of normal Registry behavior on a Windows host, even when noise may be present in the training data, and use this model to detect abnormal Registry accesses. At run-time the model is used to check each access to the Registry in real-time to determine whether or not the behavior is abnormal and possibly corresponds to an attack. The system is effective in detecting the actions of malicious software while maintaining a low rate of false alarms. We show that the probabilistic anomaly detection algorithm exhibits better performance in accuracy and in computational complexity over the support vector machine implementation under three different kernel functions.