From 5b39bc9cd124f0695f511f6fd407a23e7f5e0f4a Mon Sep 17 00:00:00 2001
From: Alexandre Dulaunoy
Date: Sat, 22 Sep 2018 21:21:41 +0200
Subject: [PATCH] chg: [expressing confidence] added
---
best-practices/expressing-confidence.adoc | 17 +
book.adoc | 5 +
book.html | 80 +-
book.pdf | 1349 +++++++++++++++------
4 files changed, 1084 insertions(+), 367 deletions(-)
create mode 100644 best-practices/expressing-confidence.adoc
diff --git a/best-practices/expressing-confidence.adoc b/best-practices/expressing-confidence.adoc
new file mode 100644
index 0000000..598f593
--- /dev/null
+++ b/best-practices/expressing-confidence.adoc
@@ -0,0 +1,17 @@
+=== Expressing confidence in an analysis
+
+NOTE: Expressing the confidence or the lack of in an analysis is critical step to help a partner or a third-party to check your hypotheses and conclusions.
+
+Analysis or reports are often shared with technical details but often lack the overall confidence level associated.
+
+Adding confidence or estimative probability have multiple advantages such as:
+
+- Allowing receiving organisations to filter, classify and score the information in an automated way
+- Information with low-confidence can still be shared and reach communities or organisations interested in such information without impacting organisations filtering out by confidence level
+- Supporting counter and competitive analyses to validate hypotheses expressed in original reporting
+
+Complement analysis with contrary evidences is also very welcome to ensure the original analysis and the hypotheses evaluated.
+
+TIP: MISP taxonomies contain an exhaustive list of confidence levels including words of https://www.misp-project.org/taxonomies.html#_estimative_language[estimative probability] or confidence in analytic judgment.
+
+TIP: threat-intelligence.eu includes an overview of the https://www.threat-intelligence.eu/methodologies/[methodologies and process to support threat intelligence].
diff --git a/book.adoc b/book.adoc
index 97bfd84..7fbc9ef 100644
--- a/book.adoc
+++ b/book.adoc
@@ -18,6 +18,11 @@ include::{sourcedir}improving-analysis.adoc[]
include::{sourcedir}what-to-share.adoc[]
<<<
+
+include::{sourcedir}expressing-confidence.adoc[]
+
+<<<
+
== Authors and Contributors
- Alexandre Dulaunoy
diff --git a/book.html b/book.html
index 409c4a9..30e1f6c 100644
--- a/book.html
+++ b/book.html
@@ -446,6 +446,7 @@ body.book #toc,body.book #preamble,body.book h1.sect0,body.book .sect1>h2{page-b
A common difficulty in threat intelligence is to improve existing analysis and how to do efficiently. One of the main question is to ask what will be the target audience -of the improved analysis and the objective:
+A common difficulty in threat intelligence is to improve existing analyses and especially how to do it efficiently. One of the main questions to ask is: what will be the target audience of the improved analysis and the objective thereof?
Informing the original analyst/author (e.g. a security vendor or a CSIRT) about a specific mistake or error which needs to be corrected.
Improving an existing analysis by performing a complementary analysis or review which will be shared and used by another group (e.g. a specific constituency, team within your organisation or member of an ISAC).
+Improving an existing analysis by performing a complementary analysis or review which will be shared to and used by another group (e.g. a specific constituent, or a team within your organisation or a member of an ISAC, etc).
In the case number 1, MISP includes a mechanism to propose changes to the original creator. This mechanism is called proposal. By using proposal, you can propose a change in the value of an attribute (such as a typographic in an IP address, missing contextual information, type of the information, the category or the removal of an IDS flag). The proposal will be sent back to the original author who can decide to accept the proposal or discard it.
+In the first case, MISP includes a mechanism to propose changes to the original creator, a mechanism we refer to as proposals. By using proposals, you can propose a change to the value or the context of an attribute (such as a typographic error in an IP address, missing contextual information, type of the information, the category or the removal of an IDS flag). The proposal will be sent back to the original author who can decide to accept or discard it.
Adding proposal has some major advantages such as being very quick and there is no need to create a new event. But such approach works only if you are willing to lose control over the data. This is pretty efficient for small changes but if additional information such as galaxy or objects need to be added then the event extension is more appropriate.
+The advantages of using the proposal system include the lack of a need to create a new event as well as the process itself being very simple and fast. However, it assumes that the party providing the improvements is willing to lose control over the proposed data. This is pretty efficient for small changes but for more comprehensive changes, especially those that include non-attribute information such as galaxy clusters or objects, the event extension is more appropriate.
In the case number 2, the extend event functionality is very handy. The extend event allow to create your own information into a self-contained event (which can have custom distribution rules) and reference the original analysis. The information can be shared back to the original author or kept in a limited scope such as a specific sector or trust group.
+Apart from being more suitable for more comprehensive changes, the second scenario is also a great fit for the extended event functionality, allowing users wanting to provide additional information or an alternate view-point with the opportunity of creating a self-contained event (which can have its own custom distribution rules) that references the original analysis. This information can be shared back to the original author or kept within a limited distribution scope such as a specific sector, a trust group or as internal information for the organisation providing the additional information.
-For more information about the extend event functionality in MISP, the blog post Introducing The New Extended Events Feature in MISP includes a lot of details. +For more information about the extended event functionality in MISP, the blog post Introducing The New Extended Events Feature in MISP includes a lot of details. |
+ + | ++Expressing the confidence or the lack of in an analysis is critical step to help a partner or a third-party to check your hypotheses and conclusions. + | +
Analysis or reports are often shared with technical details but often lack the overall confidence level associated.
+Adding confidence or estimative probability have multiple advantages such as:
+Allowing receiving organisations to filter, classify and score the information in an automated way
+Information with low-confidence can still be shared and reach communities or organisations interested in such information without impacting organisations filtering out by confidence level
+Supporting counter and competitive analyses to validate hypotheses expressed in original reporting
+Complement analysis with contrary evidences is also very welcome to ensure the original analysis and the hypotheses evaluated.
++ + | ++MISP taxonomies contain an exhaustive list of confidence levels including words of estimative probability or confidence in analytic judgment. + | +
+ + | ++threat-intelligence.eu includes an overview of the methodologies and process to support threat intelligence. + | +