Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1179494.1179497acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Measuring the attack surfaces of two FTP daemons

Published: 30 October 2006 Publication History

Abstract

Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system administrators, care about and will use in choosing one soft- ware system over another. An attack surface metric is a security metric for comparing the relative security of similar software systems [7]. The measure of a system's attack surface is an indicator of the system's security: given two systems, we compare their attack surface measurements to decide whether one is more secure than another along each of the following three dimensions: methods, channels, and data. In this paper, we use the attack surface metric to measure the attack surfaces of two open source FTP daemons: ProFTPD 1.2.10 and Wu-FTPD 2.6.2. Our measurements show that ProFTPD is more secure along the method dimension, ProFTPD is as secure as Wu-FTPD along the channel dimension, and Wu-FTPD is more secure along the data dimension. We also demonstrate how software consumers can use the attack surface metric in making a choice between the two FTP daemons.

References

[1]
CERT. Cert advisories. http://www.cert.org/.
[2]
GNU cflow. http://www.gnu.org/software/cflow.
[3]
D. DaCosta, C. Dahn, S. Mancoridis, and V. Prevelakis. Characterizing the security vulnerability likelihood of software functions. In Proc. of International Conference on Software Maintenance, 2003.
[4]
M. Howard. Fending off future attacks by reducing attack surface. http://msdn.microsoft.com/library/default.asp url=/library/enus/dncode%/html/secure02132003.asp, 2003.
[5]
M. Howard, J. Pincus, and J.M. Wing. Measuring relative attack surfaces,. In Proc. of Workshop on Advanced Developments in Software and Systems Security, 2003.
[6]
P. Manadhata and J. M. Wing. Measuring a system's attack surface. In Technical Report CMU-CS-04-102, 2004.
[7]
P. Manadhata and J. M. Wing. An attack surface metric. In Technical Report CMU-CS-05-155, 2005.
[8]
MITRE. Common vulnerabilities and exposures. http://cve.mitre.org/.
[9]
The ProFTPD Project. http://www.proftpd.org/.
[10]
The ProFTPD Project. Project goals. http://www.proftpd.org/goals.html.
[11]
SecurityFocus. Securityfocus vulnerabilities. http://www.securityfocus.com/vulnerabilities.

Cited By

View all
  • (2024)Attack Surface Measurement: A Weird Machines PerspectiveProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3655705(90-94)Online publication date: 5-Jun-2024
  • (2023)Enhancing FTP Security Through Ensemble Learning-based Brute Force Attack Detection2023 3rd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)10.1109/ICIMIA60377.2023.10425917(1345-1350)Online publication date: 21-Dec-2023
  • (2022)Autonomous Driving Security: State of the Art and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2021.31300549:10(7572-7595)Online publication date: 15-May-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
QoP '06: Proceedings of the 2nd ACM workshop on Quality of protection
October 2006
70 pages
ISBN:1595935533
DOI:10.1145/1179494
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack surface
  2. attack surface metric
  3. security metric

Qualifiers

  • Article

Conference

CCS06
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)2
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Attack Surface Measurement: A Weird Machines PerspectiveProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3655705(90-94)Online publication date: 5-Jun-2024
  • (2023)Enhancing FTP Security Through Ensemble Learning-based Brute Force Attack Detection2023 3rd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)10.1109/ICIMIA60377.2023.10425917(1345-1350)Online publication date: 21-Dec-2023
  • (2022)Autonomous Driving Security: State of the Art and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2021.31300549:10(7572-7595)Online publication date: 15-May-2022
  • (2021)Challenges in Identifying Network Attacks Using Netflow Data2021 IEEE 20th International Symposium on Network Computing and Applications (NCA)10.1109/NCA53618.2021.9685305(1-10)Online publication date: 23-Nov-2021
  • (2019)Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge ProcessingSecurity and Communication Networks10.1155/2019/20310632019Online publication date: 1-Jan-2019
  • (2018)Improving offensive cyber security assessments using varied and novel initialization perspectivesProceedings of the 2018 ACM Southeast Conference10.1145/3190645.3190673(1-9)Online publication date: 29-Mar-2018
  • (2017)Security Events and Vulnerability Data for Cybersecurity Risk EstimationRisk Analysis10.1111/risa.1286437:8(1606-1627)Online publication date: 11-Aug-2017
  • (2017)Risk-based attack surface approximationProceedings of the 39th International Conference on Software Engineering: Software Engineering in Practice Track10.1109/ICSE-SEIP.2017.9(273-282)Online publication date: 20-May-2017
  • (2017)Security Risk Analysis of Enterprise Networks Using Probabilistic Attack GraphsNetwork Security Metrics10.1007/978-3-319-66505-4_3(53-73)Online publication date: 16-Nov-2017
  • (2017)An n-Sided Polygonal Model to Calculate the Impact of Cyber Security EventsRisks and Security of Internet and Systems10.1007/978-3-319-54876-0_7(87-102)Online publication date: 2-Mar-2017
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media