Risk Scoring and Classification Framework

Panther's risk scoring system uses a pseudo-Bayesian log-odds ratio approach to evaluate security events, combining both risky and benign indicators into a normalized score that ranges from -1 (benign) to +1 (risky).
Core Methodology
The system requires explicit enumeration of both risky and benign indicators, rather than making binary judgments. Each indicator receives a base score, then three multiplicative weights are applied to reflect confidence, context, and temporal relevance.
Indicator Scoring Scale
Risky Indicators receive positive scores on a 1-10 scale:
Critical (8-10): Active exploitation, successful compromise, data exfiltration
High (6-7): Known vulnerabilities targeted, privilege escalation attempts, lateral movement
Medium (4-5): Reconnaissance, scanning, suspicious patterns, policy violations
Low (1-3): Minor anomalies, configuration drift, informational findings
Benign Indicators receive negative scores on a -1 to -10 scale:
Strong Mitigation (-8 to -10): Complete blocking, successful detection, verified false positive
Moderate Mitigation (-4 to -7): Partial blocking, expected behavior, authorized activity
Weak Mitigation (-1 to -3): Limited controls, uncertain legitimacy, incomplete data
Weighting Factors
Each indicator's base score is adjusted by three multiplicative factors (all ranging from 0.0 to 1.0):
Evidence Confidence: Reliability of the data source and depth of analysis
Context Weighting: Asset criticality, environment type (production vs. sandbox), and business impact
Temporal Relevance: How recent the activity is
Last 24 hours: 1.0
1-7 days: 0.8
7-30 days: 0.6
Over 30 days: 0.3
Mathematical Formula
The system aggregates weighted scores into two totals:
ABIS (Aggregate Benign Indicators Score) = Σ(Score × Confidence × Context × Temporal) ARIS (Aggregate Risk Indicators Score) = Σ(Score × Confidence × Context × Temporal)
These are combined into a final score:
CRS (Composite Risk Score) = (ARIS + ABIS) / (ARIS - ABIS)
This normalization formula produces results where:
CRS = 0: Perfectly balanced (risky and benign evidence equal)
CRS > 0: High risk (risky evidence dominates)
CRS < 0: Low risk (benign evidence dominates)
Classification Thresholds
Based on the composite risk score, events are classified as:
Risky: CRS exceeds the positive threshold
Benign: CRS falls below the negative threshold
Inconclusive: CRS falls between thresholds
Theoretical Foundation
This methodology draws from established risk assessment frameworks:
CVSS v3.1: Multiplicative weighting of base, temporal, and environmental metrics
FAIR (Factor Analysis of Information Risk): Combines threat frequency, vulnerability, and loss magnitude factors
Bayesian Risk Scoring: Uses log-odds ratios for binary classification
OCTAVE Approach: Evidence-based risk management
Key Advantages
The approach avoids binary "good/bad" judgments by requiring analysts to:
Explicitly document both supporting and contradicting evidence
Assign confidence levels based on data quality
Account for environmental context (asset importance, business criticality)
Weight recent activity more heavily than historical patterns
This forces rigorous, evidence-based reasoning rather than relying on single indicators or gut feelings. The temporal decay ensures that stale indicators don't artificially inflate risk scores, while context weighting allows appropriate differentiation between attacks on critical production systems versus activity in development sandboxes.
Last updated
Was this helpful?

