small align text-align-left refresh
Informational Series

What is Behavioral Analysis?

text_image_eight full_width

Featured Webinar

Security is a Big Data Problem: It Belongs in the Cloud

Like almost anything else in IT, security itself is moving effectively to the cloud. But to what extent are firms investigating predictive security in the cloud? What are they using it for? In the average company scenario, what is the reality of success for existing endpoint or on-premise security detection and prevention, and how are these infrastructures coping in specific threat situations?

Watch Now

basic_heading secondary align text-align-left color text-black refresh

Let’s Define Behavioral Analysis

text_image_eight full_width

Behavioral analysis uses machine learning, artificial intelligence, big data, and analytics to identify malicious, stealth behavior by analyzing subtle differences in normal, everyday activities in order to proactively stop cyberattacks before the attackers have the ability to fully execute their destructive plans.

Malicious attacks have one thing in common – they all behave differently than normal everyday behavior within a system or network. Companies can often identify malicious behaviors through signatures that are directly related to certain types of well-known attacks. However, as attackers get more sophisticated, they continually develop new tactics, techniques, and procedures (TTPs) that allow them not only to enter vulnerable environments, but also to move laterally undetected.

That’s where behavioral analysis comes in. With the help of massive volumes of unfiltered endpoint data, security personnel can now use behavioral-based tools, algorithms, and machine learning to determine what the normal behavior of everyday users is – and what it is not. Behavioral analysis can identify events, trends, and patterns – both current and historic – that are outside the parameters of everyday norms.

By zeroing in on these anomalies, security teams can gain visibility and identify unexpected behavioral tactics of attackers early on, before they fully execute their plan of attack. Behavioral analysis can also help uncover root causes and provide insights for future identification and prediction of similar attacks.

 

padding refresh
 
text_image_two refresh

What is a TTP?

In this episode of "The 101" we look beyond malware - those nasty files that get introduced to your system to wreak havoc - and explore the idea that attackers have lots of ways they can wreak havoc that don’t involve any new files at all...

So how do we talk about all the different ways we get owned? We ask ourselves: “What is a TTP?”

To view this and other episodes of "The 101" click here.

basic_heading secondary align text-align-left color text-black refresh

What Behaviors Are Telling of Nefarious Activity?

text_image_eight full_width

Unusual timing of events, abnormal sequences of actions, or increased data movement are just a few indications of malicious activity in an environment. Here are some specific examples of not-so-normal behaviors that could lead to the identification of an attack in progress.

  • A link in a legitimate-looking file loads into memory, and then remotely loads a script to go after confidential data that is sent back to the attacker.

  • Malicious code is injected into already installed applications – like Microsoft Word, Flash, Adobe PDF Reader, a web browser, or JavaScript – to target vulnerabilities and then execute malicious code.

  • Native system tools, such as Microsoft Windows Management Instrumentation (WMI) and Microsoft PowerShell scripting languages that typically would be considered highly trusted, are targeted to get scripts to run remotely.

basic_heading secondary align text-align-left color text-black refresh

Industry Pulse: Behavioral Analysis Is Now a “Must Have”

text_image_eight full_width

What is Behavioral Analysis? Data GraphicBack in early 2016, the SANS Institute recognized the importance of behavioral analysis in a whitepaper, Using Analytics to Predict Future Attacks and Breaches. The author notes in the conclusion, “Leveraging more advanced data analytics platforms to take in more and different types of data, focusing on increased network threat visibility, and automating detection and response actions may help security teams now and in the future as they evolve to meet these challenges.”

Well, the future is now here, and in 2018, behavioral analysis is essentially a baseline requirement for advanced endpoint security. In fact, in its Magic Quadrant for Endpoint Protection Platform report, Gartner sees machine learning and behavior monitoring as strengths of visionaries and leaders. The report also notes that “The most visionary and leading of vendors in 2018 and 2019 will be those that use the data collected from their [endpoint detection and response] capabilities to deliver actionable guidance and advice that is tailored to their clients.”

basic_heading secondary align text-align-left color text-black refresh

The Answer: Look Up to the Cloud

text_image_eight full_width

To fully unleash behavioral analysis, companies must take advantage of the cloud and its immense computational power, unlimited scalability, and ease of management. The cloud provides a proactive approach that combines big data with powerful analytics to help outsmart the latest, most threatening emerging attacks.

For example, the cloud enables streaming analytics, where normal and abnormal endpoint activity can be monitored and compared to any unfiltered historical endpoint data. By analyzing these event streams and comparing them to what looks like normal ones, the cloud creates a global threat monitoring system that not only detects attacks, but predicts ones that have never been seen before.

This powerful approach is simply not possible with traditional AV solutions, which are signature-based, but it is with next-generation antivirus (NGAV) software.

NGAV in the cloud offers bi-directional communication with endpoints, so that all unfiltered endpoint data can be monitored and turned into predictive analytics that proactively protects companies from sophisticated attacks.

Plus, the cloud provides the infrastructure benefits that most companies are already experiencing with other enterprise software – simplified, less costly operations, faster deployment, and the latest and most innovative technology.

basic_heading secondary align text-align-left color text-black refresh

How to Find Out What You Don’t Know

To learn more about the unknown attackers that might already be in your environment, access these resources:

resources refresh
basic_heading secondary align text-align-left color text-white refresh

Learn More About Carbon Black

three_up_cta_cards