Host-based intrusion detection by monitoring windows registry accesses

被引:3
|
作者
Topallar, M [1 ]
Depren, MÖ [1 ]
Anarim, E [1 ]
Ciliz, K [1 ]
机构
[1] Bogazici Univ, Elekt Elekt Muhendisligi, Bilgi & Iletisim Guvenligi BUICS Lab, TR-80815 Bebek, Turkey
关键词
D O I
10.1109/SIU.2004.1338634
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this study, we propose a host-based intrusion detection system for Microsoft Windows. The proposed system detects attacks on a host machine by monitoring anomalous accesses to the Windows Registry. First a model of normal registry behavior is trained for a host and then this model is used to detect abnormal registry accesses. The system trains a normal model using data that contains no attacks and then checks each access to the registry to determine whether or not the behavior is abnormal and corresponds to an attack. Here a new approach to the Register Anomaly Detection (RAD) is proposed in the meaning of model generator and anomaly detector. Self Organizing Map (SOM), a type of artificial neural network model, is used as an anomaly detection algorithm. The system is trained on a set of normal registry accesses by using SOM algorithm and then used to detect the behaviors of malicious software. The results of this study shows that the proposed system is effective in detecting the behaviors of malicious software and has a low rate of false alarms compared to other host-based intrusion detection systems.
引用
收藏
页码:728 / 731
页数:4
相关论文
共 50 条
  • [1] DAHID: Domain Adaptive Host-based Intrusion Detection
    Ajayi, Oluwagbemiga
    Gangopadhyay, Aryya
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 467 - 472
  • [2] A Novel Mechanism for Host-Based Intrusion Detection System
    Harshitha, Ch Gayathri
    Rao, M. Kameswara
    Kumar, P. Neelesh
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 527 - 536
  • [3] Methods for Host-based Intrusion Detection with Deep Learning
    Ring J.H.
    Van Oort C.M.
    Durst S.
    White V.
    Near J.P.
    Skalka C.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [4] A Behavioral Graph Model for Host-Based Intrusion Detection
    Cao, Zechun
    Huang, Shou-Hsuan Stephen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (02): : 48 - 57
  • [5] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [6] Host-Based Intrusion Detection Using Statistical Approaches
    Gautam, Sunil Kumar
    Om, Hari
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 481 - 493
  • [7] Trust Management for Host-Based Collaborative Intrusion Detection
    Fung, Carol J.
    Baysal, Olga
    Zhang, Jie
    Aib, Issarn
    Boutaba, Raouf
    MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 109 - 122
  • [8] Sequence Covering for Efficient Host-Based Intrusion Detection
    Martea, Pierre-Francois
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 994 - 1006
  • [9] Using Graph Representation in Host-Based Intrusion Detection
    Hu, Zhichao
    Liu, Likun
    Yu, Haining
    Yu, Xiangzhan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [10] Host-based intrusion detection for advanced mobile devices
    Miettinen, Markus
    Halonen, Perttu
    Hatonen, Kimmo
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 72 - 76