Browse Definitions :
Definition

behavior-based security

Behavior-based security is a proactive approach to security in which all relevant activity is monitored so that deviations from normal behavior patterns can be identified and dealt with quickly. As machine learning continues to improve, this approach to security management is expected to play an important role in securing computing at the edge of the network.

Traditional security software is signature-oriented: the software monitors data streams and compares data in transit to signatures in an anti-virus vendor's library of known threats. Behavior-based security programs work a little differently -- they monitor data streams too, but then they compare data stream activity to a baseline of normal behavior and look for anomalies. Behavior-based security products use applied mathematics and machine learning to flag events that are statistically significant.

While there may still be instances where an organization needs to choose between signature-based and anomaly-based security software, there is a broad range of intrusion detection and prevention products that combine both approaches.

Advantages of behavior-based security

In general, signature-based tools are best at identifying and repelling known threats, while behavior-based are best for fighting zero-day exploits that have not yet made it onto a list of known threat signatures. Most behavior-based security programs come with a standard set of policies for which behaviors should be allowed and which should be considered suspicious, but also allow administrators to customize policies and create new policies.

Behavior-based security software

Depending upon its capabilities, a behavior-based security software product may be marketed as a network behavior anomaly detection (NBAD) product, a behavior-based intrusion detection product, a behavior threat analysis (BTA) product or a user behavior analytics (UBA) product.  Some behavior-security products are sophisticated enough to apply machine learning algorithms to data streams so that security analysts don't need to identify what comprises normal behavior.  Other products include behavioral biometrics features that are capable of mapping specific behavior, such as typing patterns, to specific user behavior. Most products have sophisticated correlation engines to minimize the number of alerts and false positives.  

This was last updated in January 2020

Continue Reading About behavior-based security

Networking
  • Multiprotocol Label Switching (MPLS)

    Multiprotocol Label Switching (MPLS) is a switching mechanism used in wide area networks (WANs).

  • computer network

    A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other.

  • WAN optimization (WAN acceleration)

    WAN optimization -- also known as WAN acceleration -- is a collection of technologies and techniques used to improve the ...

Security
  • three-factor authentication (3FA)

    Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication ...

  • cyber espionage

    Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry out against a business or government ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

CIO
  • knowledge-based systems (KBSes)

    Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to ...

  • Sarbanes-Oxley Act

    The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.

  • project charter

    A project charter is a formal short document that states a project exists and provides project managers with written authority to...

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • sales development representative (SDR)

    A sales development representative (SDR) is an individual who focuses on prospecting, moving and qualifying leads through the ...

  • service level indicator

    A service level indicator (SLI) is a metric that indicates what measure of performance a customer is receiving at a given time.

  • customer data platform (CDP)

    A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that ...

Close