Skip to main content

Application of User and Entity Behavioral Analytics (UEBA) in the Detection of Cyber Threats and Vulnerabilities Management

  • Conference paper
  • First Online:
Computational Intelligence for Engineering and Management Applications

Abstract

Technological advancements such as the Internet of Things, mobile technology, and cloud computing are embraced by organizations, individuals, and society. The world is becoming more reliant on open networks, which fosters global communication and cloud technologies like Amazon Web Services to store sensitive data and personal information. This changes the danger landscape and opens new opportunities. As the number of people who use the Internet grows, so does the number of cyber risks and data security challenges that hackers pose. A cybersecurity threat is an action that aims to destroy or damage data, steal data, or otherwise disrupt digital life. Computer viruses, data breaches, and Denial of Service (DoS) assaults are all examples of cyber dangers. We'd be witnessing a notion of scanning enormous volumes of data across the internet if we described how AI systems might discover where hacks came from and recommend solutions to decision-makers within the corporation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Salem MB et al (2008) A survey of insider attack detection research. In: Stolfo SJ et al (eds) (2008) Insider attack and cyber security: beyond the hacker. Springer US, New York, pp 69–90

    Google Scholar 

  2. Karjalainen M, Kokkonen T (2020) Comprehensive cyber arena; the next generation cyber range. In: Proceedings of 2020 IEEE European symposium on security and privacy workshops (EuroS&PW), pp 11–16

    Google Scholar 

  3. Al-Mhiqani MN et al (2018) A new taxonomy of insider threats: an initial step in understanding authorised attack. Int J Inf Syst Manag 1(4):343–359. https://doi.org/10.1504/IJISAM.2018.094777

    Article  Google Scholar 

  4. Livshitz II et al (2020) The effects of cyber-security risks on added value of consulting services for IT-security management systems in holding companies. In: Proceedings 2020 international conference quality management, transport and information security, information technologies (IT&QM&IS), pp 119–122

    Google Scholar 

  5. Mendsaikhan O et al (2020) Quantifying the significance and relevance of cyber-security text through textual similarity and cyber-security knowledge graph. IEEE Access 8:177041–177052. http://doi.org/10.1109/ACCESS.2020.3027321

  6. Al-Turkistani HF, Ali H (2021) Enhancing users’ wireless network cyber security and privacy concerns during COVID-19. In: Proceedings of 2021 1st international conference on artificial intelligence and data analytics (CAIDA), pp 284–285

    Google Scholar 

  7. Thuraisingham B (2020) Cyber security and artificial intelligence for cloud-based internet of transportation systems. In: Proceedings of 2020 7th IEEE international conference on cyber security and cloud computing (CSCloud)/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp 8–10

    Google Scholar 

  8. Shu F et al (2020) Research and implementation of network attack and defense countermeasure technology based on artificial intelligence technology. In: Proceedings of 2020 IEEE 5th information technology and mechatronics engineering conference (ITOEC), pp 475–478

    Google Scholar 

  9. Vajjhala NR et al (2021) Novel user preference recommender system based on Twitter profile analysis. In: Proceedings of soft computing techniques and applications. Springer, Singapore, pp 85–93

    Google Scholar 

  10. Basallo YA et al (2018) Artificial intelligence techniques for information security risk assessment. IEEE Lat Am Trans 16(3):897–901. https://doi.org/10.1109/TLA.2018.8358671

    Article  Google Scholar 

  11. Ho TY et al (2020) The burden of artificial intelligence on internal security detection. In: Proceedings of 2020 IEEE 17th international conference on smart communities: improving quality of life using ICT, IoT and AI (HONET), pp 148–150

    Google Scholar 

  12. Saxena N et al (2020) Impact and key challenges of insider threats on organizations and critical businesses. Electronics (Basel) 9:1DW+

    Google Scholar 

  13. Khaliq S et al (2020) Role of user and entity behavior analytics in detecting insider attacks. In: Proceedings of 2020 international conference on cyber warfare and security (ICCWS), pp 1–6

    Google Scholar 

  14. Shashanka M et al (2016) User and entity behavior analytics for enterprise security. In: Proceedings of 2016 IEEE international conference on big data (Big Data), pp 1867–1874

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Narasimha Rao Vajjhala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Olaniyan, R., Rakshit, S., Vajjhala, N.R. (2023). Application of User and Entity Behavioral Analytics (UEBA) in the Detection of Cyber Threats and Vulnerabilities Management. In: Chatterjee, P., Pamucar, D., Yazdani, M., Panchal, D. (eds) Computational Intelligence for Engineering and Management Applications. Lecture Notes in Electrical Engineering, vol 984. Springer, Singapore. https://doi.org/10.1007/978-981-19-8493-8_32

Download citation

Publish with us

Policies and ethics