comparison amongst the attack surface areas of dif-
ferent network zones.
However, some points require further investiga-
tion. Even if the proposed function
S (.) gives a com-
parable and suitable estimation of the attack surface,
the best function to use is an open problem, and we
believe that mathematical analysis and statistics can
greatly help in the choice of the optimal one.
The proposed approach gives a first rough
(in)security measure, which increases with the num-
ber of available services. In this, we are encour-
aged by security tendencies in network management,
which try to minimize the number of exposed ports,
and, more generally, the number of exposed ser-
vices. In spite of this, for a comprehensive evaluation
schema, in addition to our assumptions several dif-
ferent adversary models must be considered, such as
attackers acting directly on the host itself, firewalls af-
fected by weaknesses (or simply misconfigured), and
attacks to the information flow between hosts, that can
expose information leakages or integrity violations.
In conclusion, although not a complete and per-
fect solution, this work is a step forward towards the
definition of a much needed security metrics for net-
worked ICT systems and can be used as a foundation
for more complex and complete solutions.
ACKNOWLEDGEMENTS
This work is part of the POSITIF and DESEREC
projects, funded by the EC under contracts IST-2002-
002314 and IST-2004-026600
REFERENCES
Albrecht, A. J. and Gaffney, J. E. (1983). Software func-
tion, source lines of code, and development effort pre-
diction: A software science validation. IEEE Trans-
actions on Software Engineering, 9(6):639–648.
Atzeni, A. and Lioy, A. (2005). Why to adopt a security
metric? A brief survey. In Proc. of QoP2005, First In-
ternational Workshop on Quality of Protection, Milan
(Italy), pages 1–12.
Budiarto, R., Sureswaran, R., Samsudin, A., and Noor, S.
(2004). Development of penetration testing model for
increasing network security. In Proc. of Information
and Communication Technologies: From Theory to
Applications, Damascus (Syria), pages 563–564.
CC (2006). Common criteria for information tech-
nology security evaluation v3.1. [Online]
http://www.commoncriteriaportal.org/public/con-
sumer/index.php?menu=2.
Chidamber, S. R. and Kemerer, C. F. (1994). A metrics
suite for object oriented design. IEEE Transactions
on Software Engineering, 20(6):476–494.
Disney, A. and Johnson, P. M. (1998). Investigating data
quality problems in the PSP. In Proc. of the 6th ACM
SIGSOFT international symposium on Foundations of
software engineering, Lake Buena Vista (FL, USA),
pages 143–152.
FIRST (2005). Common Vulnerability Scoring Sys-
tem (CVSS). [Online] http://www.first.org/cvss/cvss-
guide.html.
fyodor@Insecure.org (1998). Nmap security scanner. [On-
line] http://www.insecure.org/nmap/.
Hauser, V. and Revmoon, D. J. (2006). The hacker’s
choice AMAP application mapper v5.2. [Online]
http://thc.org/thc-amap/.
Howard, M., Pincus, J., and Wing, J. (2003). Measuring
relative attack surfaces. In Proc. of Workshop on Ad-
vanced Developments in Software and Systems Secu-
rity, Taipei (Taiwan).
Howard, M., Pincus, J., and Wing, J. (2005). Computer
Security in the 21st Century, chapter 8, pages 109–
137. Springer.
Martin, B., Sullo, C., and Kouns, J. (2002). OS-
VDB: Open Source Vulnerability Database. [Online]
http://www.osvdb.org/database-info.php.
McCabe, T. (1976). Complexity measure. IEEE Transac-
tions on Software Engineering, 2(4):308–320.
Microsoft (2003). Microsoft security alert severity matrix.
[Online] http://www.microsoft.com/technet/
security/alerts/matrix.mspx.
MITRE (2001). Common vulnerabilities and exposures
web site. [Online] http://www.cve.mitre.org/.
Nicol, D., Sanders, W., and Trivedi, K. (2004). Model-
based evaluation: from dependability to security.
IEEE Transactions on Dependable and Secure Com-
puting, 1(1):48–65.
NIST (2005). National vulnerability database. [Online]
http://nvd.nist.gov/.
SANS (2003). Critical vulnerability analysis. [Online]
http://www.sans.org/newsletters/cva/.
Schudel, G. and Wood, B. (2000). Adversary work fac-
tor as a metric for information assurance. In Proc.
of New Security Paradigm Workshop, ACM/SIGSAC,
Ballycotton (Ireland), pages 23–30.
SSECMM (2003). Systems security engineering capa-
bility maturity model v3. [Online] http://www.sse-
cmm.org/index.html.
US-CERT (2003). CERT vulnera-
bility scoring system. [Online]
http://www.kb.cert.org/vuls/html/fieldhelp#metric.
AN ESTIMATION OF ATTACK SURFACE TO EVALUATE NETWORK (IN)SECURITY
497