Exabeam UEBA - Public
Exabeam UEBA - Public
Data Sources
UEBA solutions are able to ingest data from a general
data repository such as a data lake or data warehouse,
or through a SIEM
Use Cases
UEBA solutions provide information on the behavior of
users and other entities in the corporate network. They
should perform monitoring, detection and alerting of
anomalies
Analytics
UEBA solutions detect anomalies using a variety of
analytics approaches–statistical models, machine
learning, rules, threat signatures and more.
2. Malicious insider
A malicious insider is an employee or contractor with privileged access to IT systems, who intends to
perform a cyber attack against the organization. It is difficult to measure malicious intent or discover it
through log files or regular security events. UEBA solutions help by establishing a baseline of a user’s
typical behavior and detect abnormal activity.
3. Compromised insider
It’s common for attackers to infiltrate an organization and compromise a privileged user account or
trusted host on the network, and continue the attack from there. UEBA solutions can help rapidly detect
and analyze malicious activity that the attacker carries on via the compromised account.
Malware infection a cybercrime when a machine is infected with malicious software – malware – infiltrates your computer.
The goal of the malware in the case of a compromised insider is to steal sensitive information or user credentials. A Malware
infection can be initiated by clicking on a link, downloading a file, or plugging in an infected USB, among other ways.
Credential theft a cybercrime aimed at stealing the username and password – the credentials – of a targeted individual.
Credential theft can be done in a variety of ways. Phishing and malware infection, mentioned above, are common. Some criminals
may engage in social engineering, which is the use of deception to manipulate individuals into divulging their credentials. A bogus
call from the IT helpdesk, where the user is asked by the attacker to confirm their username and password, is a common
technique.
Pass-the-hash a more advanced form of credential theft where the hashed – encrypted or digested – authentication
credential is intercepted from one computer and used to gain access to other computers on the network. A pass-the-hash attack is
very similar in concept to a password theft attack, but it relies on stealing and reusing password hash values rather than the actual
plain text password, especially during RDP sessions.
Unsupervised learning
The system learns normal behavior, and is able to detect and alert on abnormal behavior. It will not be able to tell if the abnormal
behavior is good or bad, only that it deviates from normal.
Deep learning
Enables virtual alert triage and investigation. The system trains on data sets representing security alerts and their triage outcomes,
performs self-identification of features, and is able to predict triage outcomes for new sets of security alerts.
8. And so on
Aggregation Reduced false positives – one slightly abnormal event on its own will not result in a security
alert. The system requires multiple signs of abnormal behavior to create an alert, reducing the number
of false positives and saving time for analysts.
Reduce False Positives
More context — traditional correlation rules defined by security administrators may have been
Contextualization correct for one set of users or systems, but not for others. For example, if a department starts
employing shift workers or offshore workers, they will start logging in at unusual times, which would
Timeline analysis and session stitching trigger a rule-based alert all the time. UEBA is smarter because it establishes a context-sensitive
baseline for each user group. An offshore worker logging in at 3am local time would not be
considered an abnormal event.
Timeline analysis and session stitching - When analyzing security incidents, the
timeline is a critical concept which can tie together seemingly unrelated activities. Modern attacks are
processes, not isolated events.
ü Web Activity
ü Database Activity
ü File Activity
ü Cloud Activity