User behavior analytics (UBA) is a
cybersecurity
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
process regarding the
detection of insider threats, targeted attacks, and
financial fraud that tracks a system's users. UBA looks at patterns of
human behavior
Human behavior is the potential and expressed capacity ( mentally, physically, and socially) of human individuals or groups to respond to internal and external stimuli throughout their life. Kagan, Jerome, Marc H. Bornstein, and Richard ...
, and then analyzes observations to detect anomalies that may indicate potential threats.
Purpose
The purpose of UBA, according to Johna Till Johnson of
Nemertes Research, is that "
Security systems provide so much information that it's tough to uncover information that truly indicates a potential for real attack. Analytics tools help make sense of the vast amount of data that
SIEM Siem is a surname. Notable people with the surname include:
*Charlie Siem (born 1986), British violinist
* Kjetil Siem (born 1960), Norwegian businessperson, journalist, author and sports official
* Kristian Siem (born 1949), Norwegian businessman
...
,
IDS
IDS may refer to:
Computing
* IBM Informix Dynamic Server, a relational database management system
* Ideographic Description Sequence, describing a Unihan character as a combination of other characters
* Integrated Data Store, one of the first da ...
/IPS,
system logs, and other tools gather. UBA tools use a specialized type of security analytics that focuses on the behavior of systems and the people using them. UBA technology first evolved in the field of marketing, to help companies understand and predict consumer-
buying patterns. But as it turns out, UBA can be extraordinarily useful in the security context too."
User behavioral analytics tools can thwart security attacks
See also
* Behavioral analytics
* Network behavior anomaly detection
* User activity monitoring
In the field of information security, user activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text ...
References
{{Reflist
External links
ABC's Of UBA
Software