Behavioral Intelligence Layer
What normal looks like — and when something deviates from it.
Signature-based detection catches known threats. But sophisticated attackers don't use known malware signatures. They use legitimate tools. They move slowly. They blend in with normal activity — until they don't.
SPNT's Behavioral Intelligence Layer establishes baselines of normal activity and detects deviations. Not by comparing to threat signatures, but by understanding what typical behavior looks like for your environment and flagging when something changes.
What the layer analyzes
- Identity behavior. Login patterns, authentication sources, session durations, resource access patterns. Detects account compromise indicators like impossible travel or unusual access times.
- Network behavior. Traffic patterns, connection graphs, data transfer volumes, protocol usage. Detects lateral movement, data exfiltration, command-and-control communication.
- Application behavior. API call patterns, query patterns, feature usage, error rates. Detects application-layer attacks and abuse patterns.
- Cloud resource behavior. Resource creation patterns, configuration changes, permission modifications. Detects cloud-native attack patterns.
Baseline establishment
The Behavioral Intelligence Layer learns what normal looks like for your environment over time:
- Per-identity baselines. What does this user normally do? When do they work? What do they access?
- Per-service baselines. What does normal traffic to this service look like? What query patterns are typical?
- Organizational baselines. What are normal working hours? What geographic locations are expected?
Baselines adapt over time. Legitimate changes (a user joins a new team, a service adds new functionality) are incorporated. The system distinguishes between gradual evolution and sudden anomalies.
Anomaly detection
When behavior deviates significantly from baseline, the layer creates a finding. Anomaly findings include:
- The deviation. What specifically is different from baseline.
- Context. What was the baseline? How significant is the deviation?
- Related signals. Other anomalies or findings that might be connected.
- Attack pattern matching. Does this deviation match known attack patterns (even if no signature matched)?
Integration with ISTRAGA
Behavioral anomalies are often ambiguous on their own. A user accessing an unusual system might be an attacker — or might be covering for a colleague on vacation.
ISTRAGA reasons about behavioral anomalies in context. It correlates behavioral signals with vulnerability state, threat intelligence, and other findings to produce assessments that distinguish concerning patterns from benign explanations.
See behavioral intelligence in action
A demonstration showing baseline establishment, anomaly detection, and correlation with other intelligence layers.