skip to main content
10.1145/1179494.1179497acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Measuring the attack surfaces of two FTP daemons

Published:30 October 2006Publication History

ABSTRACT

Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system administrators, care about and will use in choosing one soft- ware system over another. An attack surface metric is a security metric for comparing the relative security of similar software systems [7]. The measure of a system's attack surface is an indicator of the system's security: given two systems, we compare their attack surface measurements to decide whether one is more secure than another along each of the following three dimensions: methods, channels, and data. In this paper, we use the attack surface metric to measure the attack surfaces of two open source FTP daemons: ProFTPD 1.2.10 and Wu-FTPD 2.6.2. Our measurements show that ProFTPD is more secure along the method dimension, ProFTPD is as secure as Wu-FTPD along the channel dimension, and Wu-FTPD is more secure along the data dimension. We also demonstrate how software consumers can use the attack surface metric in making a choice between the two FTP daemons.

References

  1. CERT. Cert advisories. http://www.cert.org/.Google ScholarGoogle Scholar
  2. GNU cflow. http://www.gnu.org/software/cflow.Google ScholarGoogle Scholar
  3. D. DaCosta, C. Dahn, S. Mancoridis, and V. Prevelakis. Characterizing the security vulnerability likelihood of software functions. In Proc. of International Conference on Software Maintenance, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Howard. Fending off future attacks by reducing attack surface. http://msdn.microsoft.com/library/default.asp url=/library/enus/dncode%/html/secure02132003.asp, 2003.Google ScholarGoogle Scholar
  5. M. Howard, J. Pincus, and J.M. Wing. Measuring relative attack surfaces,. In Proc. of Workshop on Advanced Developments in Software and Systems Security, 2003.Google ScholarGoogle Scholar
  6. P. Manadhata and J. M. Wing. Measuring a system's attack surface. In Technical Report CMU-CS-04-102, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  7. P. Manadhata and J. M. Wing. An attack surface metric. In Technical Report CMU-CS-05-155, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  8. MITRE. Common vulnerabilities and exposures. http://cve.mitre.org/.Google ScholarGoogle Scholar
  9. The ProFTPD Project. http://www.proftpd.org/.Google ScholarGoogle Scholar
  10. The ProFTPD Project. Project goals. http://www.proftpd.org/goals.html.Google ScholarGoogle Scholar
  11. SecurityFocus. Securityfocus vulnerabilities. http://www.securityfocus.com/vulnerabilities.Google ScholarGoogle Scholar

Index Terms

  1. Measuring the attack surfaces of two FTP daemons

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        QoP '06: Proceedings of the 2nd ACM workshop on Quality of protection
        October 2006
        70 pages
        ISBN:1595935533
        DOI:10.1145/1179494

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 October 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader