A security administrator wants to set up anomalistic monitoring around behavioral-based user activity. Which of the following could the administrator implement for monitoring?
1) Intrusion detection system (IDS)
2) Security information and event management (SIEM)
3) User behavior analytics (UBA)
4) Virtual private network (VPN)