Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dominique Alessandri is active.

Publication


Featured researches published by Dominique Alessandri.


recent advances in intrusion detection | 2000

Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems

Dominique Alessandri

After more than a decade of development, there are now many commercial and non-commercial intrusion-detection systems (IDSes) available. However, they tend to generate false alarms at high rates while overlooking real threats. The results described in this paper have been obtained in the context of work that aims to identify means for supporting the analysis, evaluation, and design of large-scale intrusion-detection architectures. We propose a practical method for evaluating IDSes and identifying their strengths and weaknesses. Our approach shall allow us to evaluate IDSes for their capabilities, unlike existing approaches that evaluate their implementation. It is furthermore shown how the obtained knowledge can be used to analyze and evaluate an IDS.


recent advances in intrusion detection | 2000

Target Naming and Service Apoptosis

James F. Riordan; Dominique Alessandri

The volume of traffic on security mailing lists, bulletin boards, news forums, et cetera has grown so sharply in recent times that it is no longer feasible for a systems administrator to follow all relevant news as a background task; it has become a full-time job. Even when relevant information does eventually reach the systems administrator, there is, often a dangerous window between public knowledge of a vulnerability and the administrators ability to correct it. Automated responses mechanisms are the key to closing these vulnerability windows. We propose a database of likely areas of vulnerability, called targets, in a machine readable and filterable manner so that administrators can greatly reduce the amount of security mail to be read. We then propose a cryptographically secure service with which semi-trusted third parties can act in a manner limited by the system administrator, say shutting down a specific service while not allowing general access, to diminish the window of vulnerability.


Archive | 2001

System, method and software for supplying activation information to a subsystem

James F. Riordan; Dominique Alessandri


Archive | 2002

Design of an intrusion-tolerant intrusion detection system

Marc Dacier; Dominique Alessandri; Raffael Marty; Christian Cachin; David Powell; Brian Randell; Yves Deswarte; James F. Riordan; Klaus Julisch; Andreas Wespi; Klaus Kursawe


Archive | 2007

DETECTION AND CONTROL OF PEER-TO-PEER COMMUNICATION

Dominique Alessandri; Daniela Bourges-Waldegg; James F. Riordan; Diego Zamboni


Lecture Notes in Computer Science | 2000

Target naming and service apoptosis

James F. Riordan; Dominique Alessandri


Archive | 2002

Embedded cryptographic system

James F. Riordan; Dominique Alessandri


Archive | 2001

Distribution of security and/or vulnerability information

James F. Riordan; Dominique Alessandri


Archive | 2001

Eindringsdetektion in Datenverarbeitungssystemen

Dominique Alessandri; James F. Riordan; Andreas Wespi


Archive | 2001

Eindringsdetektion in Datenverarbeitungssystemen Eindringsdetektion in data processing systems

Dominique Alessandri; James F. Riordan; Andreas Wespi

Collaboration


Dive into the Dominique Alessandri's collaboration.

Researchain Logo
Decentralizing Knowledge