1. NIST Special Publication 800-61 Rev. 2, Computer Security Incident Handling Guide. Section 3.2, "Detection and Analysis," emphasizes that after detecting a potential incident, the next step is analysis to validate and understand it. Section 3.2.3, "Analyzing the Incident," states, "The analysis should be performed in a structured way... Normal behavior for a network, a system, or an application is often identified by creating a baseline of its characteristics." This directly supports comparing traffic against a baseline.
2. Carnegie Mellon University, Software Engineering Institute, The CERT Guide to Coordinated Vulnerability Disclosure. While focused on vulnerabilities, the underlying principles of investigation apply. Chapter 4, "Incident Management," outlines a process where analysis and characterization of an event precede containment and eradication actions to ensure a measured and effective response.
3. MIT OpenCourseWare, Course 6.857 Computer and Network Security, Fall 2017, Lecture 19 Notes. The lecture on Network Security discusses intrusion detection systems (IDS) and the importance of analyzing alerts. It highlights the need to distinguish true positives from false positives by analyzing traffic patterns and context, which aligns with the correct answer. The process described is one of observation followed by orientation (analysis) before deciding on an action.