diff --git a/src/assets/methodology/actionability_without_utility.png b/src/assets/methodology/actionability_without_utility.png index 567718e..34ea595 100644 Binary files a/src/assets/methodology/actionability_without_utility.png and b/src/assets/methodology/actionability_without_utility.png differ diff --git a/src/assets/methodology/weighting-examples.png b/src/assets/methodology/weighting-examples.png index 559fc08..e51b380 100644 Binary files a/src/assets/methodology/weighting-examples.png and b/src/assets/methodology/weighting-examples.png differ diff --git a/src/assets/methodology/weighting_function.png b/src/assets/methodology/weighting_function.png index 7b081c0..f2c957b 100644 Binary files a/src/assets/methodology/weighting_function.png and b/src/assets/methodology/weighting_function.png differ diff --git a/src/components/MethodologyDetails.vue b/src/components/MethodologyDetails.vue index edd82e2..5480f8a 100644 --- a/src/components/MethodologyDetails.vue +++ b/src/components/MethodologyDetails.vue @@ -46,7 +46,8 @@ is just as, if not more, important than other techniques. We tried to account for this by allowing users to choose which analytics and controls should be included in the weighted list.
You can see there are quite a few outliers, especially for detections. Keep in mind that there are known to be duplicates, so there is likely some double counting.
@@ -92,7 +93,8 @@For example scores, the cutoffs are 0 and 100 for detections, and 0 and 55 for mitigations.
Examples of potential utility functions are illustrated below:
We then define weights for each of the attributes to rank their importance. Once we have the weights @@ -188,14 +190,16 @@
Here's what actionability would look like if we didn't use utility functions to scale detections and mitigations. We can see that actionability is now unbounded, which will make things difficult to combine later on. Also, even if a technique has zero mitigations, it could still receive a high actionability score if its detections is high enough.
The MITRE team considered choke point to be the middle technique where many other techniques could go into and come out of in an attack flow proceeding.
T1055: Process Injection Successful Choke Point
T1055: Process Injection is a great example of many techniques calling Process Injection as the next technique in succession for the cyber attack then proceeding to any number of other techniques afterwards.
T1491: Defacement Non-Successful Choke Point
T1491: Defacement is a great @@ -281,7 +287,8 @@ cutoff should be no lower than the smallest value for its attribute.]
Examples of potential utility functions are illustrated below:
We define the weights
And we can overlay this with a contour plot of the actual chokepoint function (patches of the same color have roughly the same chokepoint score)
and we can compare this with a plot of what the chokepoint function would look like had we not used - utility functions to scale the number of before and after techniques
+And we can compare this with a plot of what the chokepoint function would look like had we not used + utility functions to scale the number of before and after techniques:
The weighting function and its parameters may sound complicated in text, but it is best understood visually:
Some examples of the weighting function using various parameters are given below:
Since only a few techniques make up a large majority of all sightings, we need to be careful about accounting for these outliers when we put the prevalence scores on a zero-to-one scale.
This is a histogram of the distribution of prevalence scores across all techniques for which we have
attack times. Note that there are a few techniques that have a prevalence score that is FAR greater than
@@ -490,7 +503,11 @@ export default defineComponent({
}
ul {
- @apply list-disc ml-6
+ @apply list-disc ml-6 mb-4
+}
+
+ol {
+ @apply mb-4
}
ul p {
@@ -508,4 +525,8 @@ a {
p {
@apply mb-2
}
+
+.MathJax_Display {
+ margin-bottom: 10px !important;
+}
\ No newline at end of file
diff --git a/src/views/MethodologyPage.vue b/src/views/MethodologyPage.vue
index fa1412f..80b0080 100644
--- a/src/views/MethodologyPage.vue
+++ b/src/views/MethodologyPage.vue
@@ -2,14 +2,15 @@
A prioritized list of MITRE ATT&CK techniques should actionable and driven
- by threat intelligence The Center’s methodology is composed of three different components - Actionability, Choke
+ A prioritized list of MITRE ATT&CK techniques should be actionable and driven
+ by threat intelligence. The Center’s methodology is composed of three different components - Actionability,
+ Choke
Point, and Prevalence. Algorithms for each component were created to determine a technique’s weight within a
specific component, and then each component weight is combined to give an overall weight. Methodology
-