Browse Definitions :
Definition

behavior-based security

Behavior-based security is a proactive approach to security in which all relevant activity is monitored so that deviations from normal behavior patterns can be identified and dealt with quickly. As machine learning continues to improve, this approach to security management is expected to play an important role in securing computing at the edge of the network.

Traditional security software is signature-oriented: the software monitors data streams and compares data in transit to signatures in an anti-virus vendor's library of known threats. Behavior-based security programs work a little differently -- they monitor data streams too, but then they compare data stream activity to a baseline of normal behavior and look for anomalies. Behavior-based security products use applied mathematics and machine learning to flag events that are statistically significant.

While there may still be instances where an organization needs to choose between signature-based and anomaly-based security software, there is a broad range of intrusion detection and prevention products that combine both approaches.

Advantages of behavior-based security

In general, signature-based tools are best at identifying and repelling known threats, while behavior-based are best for fighting zero-day exploits that have not yet made it onto a list of known threat signatures. Most behavior-based security programs come with a standard set of policies for which behaviors should be allowed and which should be considered suspicious, but also allow administrators to customize policies and create new policies.

Behavior-based security software

Depending upon its capabilities, a behavior-based security software product may be marketed as a network behavior anomaly detection (NBAD) product, a behavior-based intrusion detection product, a behavior threat analysis (BTA) product or a user behavior analytics (UBA) product.  Some behavior-security products are sophisticated enough to apply machine learning algorithms to data streams so that security analysts don't need to identify what comprises normal behavior.  Other products include behavioral biometrics features that are capable of mapping specific behavior, such as typing patterns, to specific user behavior. Most products have sophisticated correlation engines to minimize the number of alerts and false positives.  

This was last updated in January 2020

Continue Reading About behavior-based security

Networking
  • telecommunications (telecom)

    Telecommunications, also known as telecom, is the exchange of information over significant distances by electronic means and ...

  • remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT ...

  • port address translation (PAT)

    Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 ...

Security
  • multifactor authentication

    Multifactor authentication (MFA) is an account login process that requires multiple methods of authentication from independent ...

  • cyber insurance

    Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract an entity can purchase to help ...

  • Protected Extensible Authentication Protocol (PEAP)

    Protected Extensible Authentication Protocol (PEAP) is a security protocol commonly used to protect wireless networks.

CIO
  • digital innovation

    Digital innovation is the adoption of modern digital technologies by a business.

  • business goals

    A business goal is an endpoint, accomplishment or target an organization wants to achieve in the short term or long term.

  • vertical SaaS (software as a service)

    Vertical SaaS describes a type of software as a service solution created for a specific industry, such as retail, financial ...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • virtual assistant (AI assistant)

    A virtual assistant, also called an AI assistant or digital assistant, is an application program that understands natural ...

  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

Close