Use User and Entity Behavior Analytics (UEBA) Powered by AI
Use User and Entity Behavior Analytics (UEBA) Powered by AI
2. Baseline Behavior:
Use AI to analyze historical data and establish a baseline of
normal behavior for each user and entity. This includes typical
login times, locations, devices, and access patterns.
Create detailed profiles for users and entities, capturing their
typical behaviors and interactions within the network.
The core of UEBA functionality lies in its ability to establish a
baseline of “normal” behavior for each user and entity. It then
continuously compares current activities against this baseline,
flagging anomalies that could indicate potential security threats,
such as data exfiltration, insider threats, or compromised accounts.
3. Anomaly Detection:
AI continuously monitors current activities and compares them
against established baselines to detect anomalies in real time.
Employ machine learning algorithms to identify subtle deviations
and patterns that may indicate potential security threats.
4. Risk Scoring:
Consider the context of detected anomalies, such as the
sensitivity of the accessed data, the user’s role, and the overall
risk environment.
Assign dynamic risk scores to each activity, where higher scores
indicate greater potential threats.
5. Automated Alerts and Responses:
Automatically generate alerts for security teams when unusual
behaviors are detected. Include contextual information to help
prioritize and investigate alerts.
Implement automated responses for high-risk activities, such as
locking accounts, requiring additional authentication, or blocking
access.
Scenario:
User A typically logs in from New York between 9 AM and 5 PM using a
corporate laptop.
User A attempts to log in from a foreign country at 2 AM using an
unknown device.
Behavior Analysis: AI-powered UEBA detects that the login attempt
from a foreign country and at an unusual time deviates from the
established baseline for User A.
Risk Scoring: The system assigns a high-risk score to this login attempt
due to multiple factors: unusual location, time, and device.
Alert Generation: An alert is generated and sent to the security
operations center (SOC) for further investigation.
Immediate Action: The system may automatically prompt the user for
additional authentication (e.g., MFA) or temporarily block the login
attempt pending review.
capabilities.
Automated Alerting and Incident Response: UEBA systems can
behavior.
25. Stuxnet
o Description: A highly sophisticated worm that targeted
Iran’s nuclear facilities by exploiting multiple zero-day
vulnerabilities.
o Impact: Demonstrated the potential for cyberattacks to
cause physical damage to critical infrastructure.
26. SolarWinds Attack
o Description: A supply chain attack where attackers
compromised the software update mechanism of
SolarWinds' Orion platform, affecting numerous high-profile
organizations.
o Impact: Led to widespread data breaches and highlighted
the vulnerabilities in supply chain security.
27. Operation Aurora
o Description: A series of cyberattacks conducted by a group
believed to be based in China, targeting intellectual property
and source code of major corporations like Google.
o Impact: Raised awareness of the risks associated with state-
sponsored cyber espionage.
NTA has certain benefits. The first is that it allows companies to see all
events, not just logged ones, across their entire network. This includes
every aspect of a cyberattacker’s activities. Further, NTA enables
companies to profile both user accounts and network devices (just as
UEBA can), and it deploys with relative ease.
Cons of UEBA: