from the values of the component intersection. Higher
values imply in the decrease of distance between the
formulas. Similarly, lower values imply in the in-
crease of distance between the formulas.
Besides the intersection component, the way that
the metrics formula is obtained can also influence on
the difference between the models. If the formula has
components that require in its composition the inser-
tion of additional arithmetic mean, such as have si-
multaneously secure and insecure components (met-
ric 2) or have components outside the intersection
(metric 3), these components will act as follows: val-
ues near to 1 decrease the difference and values near
to 0 increase the difference.
6 CONCLUSIONS
Security metrics are modern tools and with high re-
search potential. They are extremely important for the
security level understanding of the organization when
properly developed and applied.
A classic security metric has several components,
including: objective, data source, frequency, classifi-
cation and formula. The purpose of the formula, in
particular, is to describe the calculations to be per-
formed for quantify the metrics in a numerical expres-
sion. That is, the metrics results are investigated from
the formula. It is important that this task be accom-
plished in a clear, robust and generic way.
The model proposed in this work sought to cor-
rect the inaccuracies of the model proposed by Miani
et al. developing a new component, which deals with
sets intersections of security measures. This compo-
nent plays an important role in the model, distribut-
ing the weights in the proposed formula. Besides the
formula, the whole nomenclature and the logic con-
struction developedin this work can be reused to build
other models in this area.
The model validation it was obtained in two ways:
from the metrics application found in literature and
with a case study. Classic security metrics as found
in (Jaquith, 2007), (Swanson et al., 2003) and (ISO,
2005) are easily migrated to our model. One of the
benefits is the aggregation of various measures in only
one, easing the overview and the results interpretation
of the non-technical organization staff. Besides that,
the proposed model was used in three security metrics
that were implemented in the MBAN of Pedreira. The
results showed that the model proposed here achieved
lower results when compared to Miani et al. model
and could also explain how the numerical differences
between the models are established.
Future works includes the model utilization in
other security metrics, aiming to create its own cata-
log, suchlike what is developed in the Metrics Catalog
Project (MetricsCenter, 2008) and the application of
new case studies to refine the proposed model in pri-
vate institutions, government and other MBANs en-
abling the development of a security metrics database.
REFERENCES
Alexiou, A., Bouras, C., and Primpas, D. (2006). Design
aspects of open municipal broadband networks. In
AcessNets ’06: Proceedings of the 1st international
conference on Access networks, page 20, New York,
NY, USA. ACM Press.
Herrera, S. (2005). Information security management met-
rics development. In Security Technology, 2005.
CCST ’05. 39th Annual 2005 International Carnahan
Conference on, pages 51–56.
ISO (2005). Code of practice for information security man-
agement - iso/iec 27002.
Jaquith, A. (2007). Security Metrics - Replacing Fear, Un-
certainty and Doubt. Addison-Wesley.
Jelen, G. and Williams, J. (1998). A practical approach to
measuring assurance. In Computer Security Applica-
tions Conference, 1998, Proceedings., 14th Annual,
pages 333–343.
Lowans, P. W. (2002). Implementing a network security
metrics program. Technical report, SANS.
Mell, P., Scarfone, K., and Romanosky, S. (2007). A com-
plete guide to the common vulnerability scoring sys-
tem version 2.0. http://www.first.org/cvss/.
Mendes, L. S. (2006). Infovia Municipal - Um novo
Paradigma em Comunicaes. Universidade Estadual
de Campinas.
MetricsCenter (2008). http://www.metricscenter.org/
index.php/plexlogicmetricviewer. Accessed in
24/02/2009.
Miani, R. S., Zarpelo, B. B., de Souza Mendes, L., and Jr.,
M. L. P. (2008). Metrics application in metropolitan
broadband access network security analysis. In SE-
CRYPT 2008 - International Conference on Security
and Cryptography, pages 473–476.
Payne, S. C. (2006). A guide to security metrics. SANS Se-
curity Essentials GSEC Practical Assignment Version
1.2e.
Rosenblatt, J. (2008). Security metrics: A solution in search
of a problem. EDUCAUSE Quarterly, 3:8–11.
Swanson, M., Bartol, N., Sabato, J., Hash, J., and Graffo, L.
(2003). Security metrics guide for information tech-
nology systems. Technical report, NIST Special Pub-
lication 800-55.
Weiss, S., Weissmann, O., and Dressler, F. (2005). A com-
prehensive and comparative metric for information se-
curity. In Proceedings of IFIP International Confer-
ence on Telecommunication Systems, Modeling and
Analysis (ICTSM2005), pages 1–10.
SECRYPT 2009 - International Conference on Security and Cryptography
386