Behavior Analytics
Build behavioral baselines and detect deviations continuously over user and entity activity streams using SQL. RisingWave flags insider threats, compromised accounts, and bot activity within milliseconds, without batch profile computation.
Why Streaming Baselines
Batch-based UEBA systems compute behavioral baselines on nightly aggregations, meaning the baseline used to evaluate today's activity reflects behavior from two days ago. Streaming baseline computation updates behavioral profiles incrementally as each activity event arrives, keeping the baseline current and enabling anomaly detection that reflects actual recent behavior rather than stale batch snapshots.
| Factor | Batch UEBA | RisingWave |
|---|---|---|
| Baseline Freshness | 24 to 48 hours stale (nightly batch) | Current (per-event streaming) |
| Anomaly Latency | Next batch run after the event | Milliseconds after the event |
| Profile Coverage | Users with sufficient history | All entities including new ones |
| Infrastructure | Batch compute + ML pipeline | Single SQL system |
Use Cases
Streaming behavioral anomaly detection covers any pattern where the current rate, volume, or sequence of activity events deviates from a maintained baseline. Insider threats, compromised service accounts, bot activity, and API abuse all produce behavioral signatures that SQL window aggregations surface against rolling baseline comparisons.
Detect employees accessing data volumes or resource categories significantly above their rolling baseline, combining file access logs, database query events, and email attachment streams in SQL to surface anomalous data aggregation behavior before exfiltration completes
Flag service accounts making API calls outside their normal call pattern, time-of-day distribution, or endpoint scope by comparing live API event streams against per-account baseline materialized views updated incrementally with each call
Identify automated account activity by computing request rate, session duration, and page sequence entropy from clickstream and API event streams, flagging sessions whose behavioral metrics fall outside the distribution of legitimate human user sessions
Detect users performing privileged operations at rates inconsistent with their historical baseline, joining live authentication and access log streams with per-user privilege usage baseline views to surface anomalous administrative activity
How It Works
RisingWave maintains per-entity behavioral baseline materialized views that update incrementally as each activity event arrives. Anomaly detection rules compare current activity window aggregations against the baseline view in a single SQL expression. When the deviation ratio exceeds a configurable threshold, the anomaly surfaces in the detection output view without any batch job or model retraining.
Build streaming behavioral baselines in SQL and flag insider threats, compromised accounts, and bot activity within milliseconds of the triggering event.
Start Free