After creating baseline models, UBA tools monitor users and compare their behavior to these models. When they detect deviations that might signal potential threats, they alert the security team.
UBAs can detect anomalies in a few different ways, and many UBA tools use a combination of detection methods.
Some UBA tools use rule-based systems where security teams manually define situations that should trigger alerts, such as users trying to access assets outside their permission levels.
Many UBA tools also use AI and ML algorithms to analyze user behavior and spot anomalies. With AI and ML, UBA can detect deviations from a user's historical behavior.
For example, if a user has logged into an app only during work hours in the past and is now logging in on nights and weekends, that might indicate a compromised account.
UBA tools can also use AI and ML to compare users to their peers and detect anomalies that way.
For example, there is a good chance that no one in the marketing department needs to pull customer credit card records. If a marketing user starts trying to access those records, that might signal an attempt at data exfiltration.
In addition to training AI and ML algorithms on user behaviors, organizations can use threat intelligence feeds to teach UBA tools to spot known indicators of malicious activity.