{"title":"信息保护行为分析系统概述","authors":"N. Mironova, L. Chupeeva","doi":"10.31618/esu.2413-9335.2021.1.93.1547","DOIUrl":null,"url":null,"abstract":"Methods of behavioral analysis came into business and management practice from psychology, and in recent years have found application in the protection of information infrastructure. Behavioral analysis technologies have been developed and implemented in the form of information security software abroad; now they are all actively used by Russian companies to detect and respond to information security threats. User and Software Entity Behavior Analysis (UEBA) automatically detects suspicious user activity or other events in the protected information infrastructure that indicate the risk of a threat being implemented in order to promptly suppress such threats. An analytical review of specific implementations of UEBA technology for solving information security problems has been performed.","PeriodicalId":11879,"journal":{"name":"EurasianUnionScientists","volume":"35 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"OVERVIEW OF BEHAVIORAL ANALYTICS SYSTEMS FOR INFORMATION PROTECTION\",\"authors\":\"N. Mironova, L. Chupeeva\",\"doi\":\"10.31618/esu.2413-9335.2021.1.93.1547\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Methods of behavioral analysis came into business and management practice from psychology, and in recent years have found application in the protection of information infrastructure. Behavioral analysis technologies have been developed and implemented in the form of information security software abroad; now they are all actively used by Russian companies to detect and respond to information security threats. User and Software Entity Behavior Analysis (UEBA) automatically detects suspicious user activity or other events in the protected information infrastructure that indicate the risk of a threat being implemented in order to promptly suppress such threats. An analytical review of specific implementations of UEBA technology for solving information security problems has been performed.\",\"PeriodicalId\":11879,\"journal\":{\"name\":\"EurasianUnionScientists\",\"volume\":\"35 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EurasianUnionScientists\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31618/esu.2413-9335.2021.1.93.1547\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EurasianUnionScientists","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31618/esu.2413-9335.2021.1.93.1547","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
OVERVIEW OF BEHAVIORAL ANALYTICS SYSTEMS FOR INFORMATION PROTECTION
Methods of behavioral analysis came into business and management practice from psychology, and in recent years have found application in the protection of information infrastructure. Behavioral analysis technologies have been developed and implemented in the form of information security software abroad; now they are all actively used by Russian companies to detect and respond to information security threats. User and Software Entity Behavior Analysis (UEBA) automatically detects suspicious user activity or other events in the protected information infrastructure that indicate the risk of a threat being implemented in order to promptly suppress such threats. An analytical review of specific implementations of UEBA technology for solving information security problems has been performed.