Best QA and Testing Blogs

Behavioral Analytics in Cybersecurity: Key Insights

Written by Timothy Joseph | Mar 31, 2021 4:00:00 PM
 

Main Components of UEBA

  • User Monitoring and Data Collection System

    The user and entity activities are monitored for anomalies. Different behavioral factors are analyzed from generally visited websites to typically used applications.

  • Machine Learning System

    A large amount of data generated by user monitoring systems is used and analyzed by machine learning system to detect anomalies.

 

Use Cases

 

UEBA vs SIEM

Security Information and Event Management (SIEM) tools are also an option for teams looking to understand user behaviors.

The following are the key differences between UEBA and SIEM tools.

UEBA SIEM
Operates in real-time.
Point-in-time analysis of event data.
Machine learning models and algorithms are used to analyze data in real time.
Manual effort is mostly required to analyze the data.
Provides risk scoring that rank the threats efficiently.
Alerts are generated based on events that may or may not be malicious.
Processes huge amounts of structured and unstructured data.
Processes structured logs only.
 

Sample UEBA Report

Security Events

Risk Levels

 
  • Medium
  • High

Anomalous Reasons

 
  • Suspicous Endpoint
  • Unusual User Location
  • Unusual User Login Time
  • Unusual Application Access

Anomalous Activity

Risk Level Timestamp Result User Application Access Device Second Factor
High
Unusual Application Access

The activity is:
Normal
Unnormal
10:39 PM
January 04, 2021
DeniedEndpoint is not Trusted
Jmarty
Python Web SDK (kmb)
> iOS 14.4
Passcode
High
Unusual Application Access
08:24 PM
January 04, 2021
DeniedEndpoint is not Trusted
Psmith
Microsoft OWA 166
> iOS 14.3
Passcode
Medium
Suspicious Endpoint
06:05 PM
January 04, 2021
DeniedEndpoint is not Trusted
Bjoseph
Juniper SSL VPN 10
> iOS 13.5
Passcode
 

Best Practices

  • Identify the sources of data for user behavior, network flows, and system logs.
  • Enable active directory auditing to track user activity on your systems.
  • Audit the systems with sensitive information.
  • Track details on account creation and account logins.
  • Frequently review account permissions.
  • Provide UBA solution with all the data.
  • Regularly review UBA reports and investigate incidents.
  • Create relevant use cases and use datasets to find security solutions.
  • Utilize tools like Microsoft Advanced Threat Analytics and Incydr.

Have Suggestions?

We would love to hear your feedback, questions, comments and suggestions. This will help us to make us better and more useful next time.
Share your thoughts and ideas at knowledgecenter@qasource.com