2005
DOI: 10.3233/jcs-2005-13403
|View full text |Cite
|
Sign up to set email alerts
|

A comparative evaluation of two algorithms for Windows Registry Anomaly Detection

Abstract: Abstract. We present a component anomaly detector for a host-based intrusion detection system (IDS) for Microsoft Windows. The core of the detector is a learning-based anomaly detection algorithm that detects attacks on a host machine by looking for anomalous accesses to the Windows Registry. We present and compare two anomaly detection algorithms for use in our IDS system and evaluate their performance. One algorithm called PAD, for Probabilistic Anomaly Detection, is based upon a probability density estimati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0
3

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 43 publications
(26 citation statements)
references
References 27 publications
0
23
0
3
Order By: Relevance
“…Stolfo et al [32] introduced a general purpose algorithm for anomaly detection (in windows environment), the Probabilistic Anomaly Detection (PAD) algorithm, that assumes anomalies or noise are a rare event in the training data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Stolfo et al [32] introduced a general purpose algorithm for anomaly detection (in windows environment), the Probabilistic Anomaly Detection (PAD) algorithm, that assumes anomalies or noise are a rare event in the training data.…”
Section: Related Workmentioning
confidence: 99%
“…In anomaly detection one class SVM algorithm (OCSVM) is used [32]. OCSVM builds a model from training on normal data and then classifies a test data as benign or anomaly based on geometric deviations from normal training data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…File Accesses Layer We implement a anomaly detector that monitors file system calls to detect anomalous accesses based on prior work [22]. We use Auditd [23], the default Linux auditing system, to audit file system accesses, and an unsupervised machine learning system to compute normal models for those accesses.…”
Section: Security Controlsmentioning
confidence: 99%
“…PAD calculates first order and second order probability for each of the 6 features giving a total of 36 probability values for each file access entry. An alert score is then computed using a multinomial model with a hierarchical prior based on dirichlet distribution, and log probabilities are used at each step to avoid underflows [22].…”
Section: Security Controlsmentioning
confidence: 99%