Anomaly detection in Windows Registry hives using machine learning

Authors

  • Krish Patel Science & Engineering Magnet Program, Manalapan High School
  • Jitin Jindal Commvault

Keywords:

malware detection, Windows registry hives, anomaly detection, metadata, Commvault, internship

Abstract

The importance of malware detection software has increased dramatically with the rise of electronic data sharing and the spread of data theft. During my internship at Commvault, an industry leader in data security and management, I created an algorithm for monitoring Windows Registry hives. The registry serves as a critical database for settings, application preferences, and system parameters, making it a frequent target of malware and malicious activities. By analyzing key-value pairs, structural relationships, and timed patterns within real-world activity on Commvault servers, I established a baseline of normal activity to detect deviations. The system integrates supervised learning models trained on labeled datasets to identify specific types of anomalies, such as trojan horses and worms. Furthermore, the model incorporates real-time logging and notifications to alert the user of potential threats. When run on a simulation of registry tampering and unauthorized key deletions, it achieves an F1 score of 0.91, which highlights the capability of the system to detect subtle anomalies while minimizing false positives, equipping systems to address emerging threats preemptively.

Downloads

Published

2025-01-27 — Updated on 2025-01-28

How to Cite

Patel, K., & Jindal, J. (2025). Anomaly detection in Windows Registry hives using machine learning. Journal of Science & Engineering , 1(3), 67. http://34.172.72.90/index.php/jse/article/view/41

Similar Articles

1-10 of 17

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)