Behavior Analytics

Real-Time Behavioral Anomaly Detection

Build behavioral baselines and detect deviations continuously over user and entity activity streams using SQL. RisingWave flags insider threats, compromised accounts, and bot activity within milliseconds, without batch profile computation.

Real-Time
Baseline Updates
User behavioral profiles update incrementally as each new activity event arrives, keeping baselines current without nightly batch recomputation
SQL
Anomaly Logic
Express behavioral deviation rules as SQL window aggregations comparing current activity rates to rolling baseline windows maintained as materialized views
Multi-Entity
Coverage
Build behavioral profiles for users, service accounts, devices, and API clients simultaneously within a single SQL pipeline
Sub-Second
Anomaly Detection
Behavioral deviations surface within milliseconds of the activity event that triggers the anomaly threshold, enabling real-time intervention

Why Streaming Baselines

Why does behavioral anomaly detection require streaming baseline computation?

Batch-based UEBA systems compute behavioral baselines on nightly aggregations, meaning the baseline used to evaluate today's activity reflects behavior from two days ago. Streaming baseline computation updates behavioral profiles incrementally as each activity event arrives, keeping the baseline current and enabling anomaly detection that reflects actual recent behavior rather than stale batch snapshots.

FactorBatch UEBARisingWave
Baseline Freshness24 to 48 hours stale (nightly batch)Current (per-event streaming)
Anomaly LatencyNext batch run after the eventMilliseconds after the event
Profile CoverageUsers with sufficient historyAll entities including new ones
InfrastructureBatch compute + ML pipelineSingle SQL system
  • Maintain always-current behavioral baselines that reflect the last hour, day, and week of activity simultaneously
  • Detect anomalies within milliseconds of the triggering event rather than waiting for the next batch job
  • Cover new users and entities from their first activity event without requiring a minimum history period
  • Express behavioral deviation logic in SQL without building or maintaining a separate ML pipeline

Use Cases

What behavioral anomaly patterns does streaming SQL detect?

Streaming behavioral anomaly detection covers any pattern where the current rate, volume, or sequence of activity events deviates from a maintained baseline. Insider threats, compromised service accounts, bot activity, and API abuse all produce behavioral signatures that SQL window aggregations surface against rolling baseline comparisons.

Insider Threat Detection

Detect employees accessing data volumes or resource categories significantly above their rolling baseline, combining file access logs, database query events, and email attachment streams in SQL to surface anomalous data aggregation behavior before exfiltration completes

Compromised Service Account Detection

Flag service accounts making API calls outside their normal call pattern, time-of-day distribution, or endpoint scope by comparing live API event streams against per-account baseline materialized views updated incrementally with each call

Bot and Scraper Detection

Identify automated account activity by computing request rate, session duration, and page sequence entropy from clickstream and API event streams, flagging sessions whose behavioral metrics fall outside the distribution of legitimate human user sessions

Privilege Abuse Detection

Detect users performing privileged operations at rates inconsistent with their historical baseline, joining live authentication and access log streams with per-user privilege usage baseline views to surface anomalous administrative activity

How It Works

How does RisingWave build and evaluate behavioral baselines in real time?

RisingWave maintains per-entity behavioral baseline materialized views that update incrementally as each activity event arrives. Anomaly detection rules compare current activity window aggregations against the baseline view in a single SQL expression. When the deviation ratio exceeds a configurable threshold, the anomaly surfaces in the detection output view without any batch job or model retraining.

  • Create Kafka sources in RisingWave for user activity event streams: access logs, API calls, file events, authentication records
  • Define per-entity baseline materialized views that compute rolling average activity rates over configurable time windows, for example average queries per hour over the last 30 days per user
  • Write anomaly detection rules as SQL expressions comparing the current window aggregation against the baseline view: current rate divided by baseline rate exceeds threshold
  • Join anomaly signals with user context and sensitivity classification tables via stream-table joins to prioritize high-risk entity anomalies
  • Query the anomaly detection materialized view from your SIEM, SOAR, or identity governance platform via the PostgreSQL interface

Frequently Asked Questions

How do I build real-time behavioral baselines for anomaly detection?
How is streaming UEBA different from ML-based behavioral analytics?
Can I detect anomalies for new users who have no behavioral history?
How do I tune anomaly thresholds to reduce false positives?

Detect behavioral anomalies as they happen, not the next day

Build streaming behavioral baselines in SQL and flag insider threats, compromised accounts, and bot activity within milliseconds of the triggering event.

Start Free
Best-in-Class Event Streaming
for Agents, Apps, and Analytics
GitHubXLinkedInSlackYouTube
Sign up for our to stay updated.