TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/definition/user-behavior-analytics-UBA

What is user behavior analytics (UBA)?

By Cameron Hashemi-Pour

User behavior analytics (UBA) is the tracking, collecting and assessing of user data and activities using monitoring systems. UBA is commonly referred to as user and entity behavior analytics (UEBA) to reflect that users are just one category of entities with observable behaviors on modern networks. Other entities include processes, applications and network devices.

UBA and UEBA technologies analyze historical data logs, including network and authentication logs collected and stored in log management and security information and event management (SIEM) systems. This is done to identify patterns of network traffic caused by the behavior of users, both normal and malicious. These systems provide cybersecurity teams with actionable insights when the systems detect unusual behavior.

While UBA and UEBA systems don't take action based on their findings, they can be configured to automatically adjust the difficulty of authenticating user accounts that show anomalous behavior or otherwise deviate from normal behavior.

What is UEBA and how does it differ from UBA?

The terms user behavior analytics and user and entity behavior analytics differ in three primary ways:

User and entity behavior analytics technologies have the same capabilities as traditional UBA, but UEBA systems use more advanced analytics techniques. While UBA is designed to track insider threats, UEBA is designed to use artificial intelligence (AI) and machine learning to look for more types of anomalous activities associated with a broader range of threats, including advanced threats, that can obscured by legitimate network activities. UEBA has multiple enterprise use cases and is often used in conjunction with SIEM technologies to better analyze information.

How UBA and UEBA systems work

Both UBA and UEBA systems collect various types of data, including user roles, titles, access, accounts, permissions, activity and geographical location. They also track security alerts. This data is collected from past and present activity. The analysis considers factors such as resources used, the duration of sessions, connectivity and peer group activity as part of anomaly detection capabilities. It also automatically updates when changes are made to the data, such as promotions or added permissions.

UBA and UEBA systems don't report all anomalies as risky. Instead, they evaluate the behavior's potential impact. If the behavior involves less-sensitive resources, it receives a low impact score. If it involves something more sensitive, such as personally identifiable information, it receives a higher impact score. This way, security teams prioritize what to follow up on while the behavior analysis system automatically restricts or makes it more difficult to authenticate the user showing anomalous behavior.

Behaviors that UBA and UEBA systems monitor are generally those associated with specific attacks or other security events. Monitored behaviors include the following:

Machine learning algorithms enable UBA and UEBA systems to reduce false positives and provide clearer and more accurate actionable risk intelligence to cybersecurity teams. These systems also use threat intelligence feeds to augment and support machine learning functions.

Benefits and drawbacks of UBA and UEBA

UBA and UEBA systems provide multiple benefits for enterprises with security capabilities that meet today's challenges. They include the following:

Despite these benefits, these systems have drawbacks, such as the following:

Why companies need UBA and UEBA

Behavior analysis systems first appeared in the early 2000s as tools to help marketing teams analyze and predict customer buying patterns.

Current user behavior analytics tools have more advanced profiling and exception monitoring capabilities than SIEM systems and are mainly used for two functions:

  1. To determine a baseline of normal activities specific to the organization and its individual users.
  2. To identify deviations from the norm. UBA and UEBA use big data and machine learning algorithms to assess these deviations in near real time.

While applying user behavior analytics to just one user might not be useful for finding malicious activity, running it on a large scale can detect malware and other potential cyberthreats, such as data exfiltration, insider threats and compromised endpoints.

How to implement UBA and UEBA tools

There are certain best practices enterprises should consider when implementing behavior analysis systems:

UBA and UEBA tools

The market for user behavior analytics tools continues to grow and evolve. The following are some of the leading UBA and UEBA products, according to Gartner analysis:

Newer systems are able to integrate with data sources and the use of AI and machine learning to make correlations between data points and detect anomalies. In addition to SIEM systems, UEBA systems typically integrate with databases, data warehouses and data lakes. As the market continues to consolidate, UEBA and UBA functions are also increasingly incorporated into larger cybersecurity packages from leading vendors.

UEBA vs. SIEM vs. SOAR vs. XDR: Key differences in terminology and technology

UEBA products are just one way to address threat detection. Other related technologies include the following:

Given the abundance of related technologies, there is considerable overlap among the different types of threat detection tools. UBA and UEBA are two of many tools in the cybersecurity toolkit. Which system is used depends on the organization's use cases.

UEBA and SIEM technology: Why use them in tandem?

Many organizations are opting to use SIEM and UEBA together. Looking at the differences between these two types of systems highlights how they complement each other:

User and entity behavior analysis systems require data logs from log management and SIEM systems. Learn about security log management and logging best practices.

09 Oct 2024

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement