9 research outputs found

    Resignation?

    No full text

    Employer\u27s burden

    No full text
    The case of Centennial Transmarine Inc., Centennial Maritime Services Corporation and/or B+H Equimar Singapore Pte. Ltd. vs. Ruben G. dela Cruz which was decided by the Supreme Court only last August 22, 2008, reminds employers once again that the burden of proof to show that a seafarer\u27s employment was validly terminated, rests on no else\u27s shoulders but on theirs

    Improper release

    No full text

    Of misrepresentation and fairness

    No full text

    A better system to fend off IP infringers

    No full text
    Piracy and counterfeiting offenses remain widespread in the Philippines, but a boost to the country\u27s IP protection and enforcement law could change the situatio

    A behavior-based intrusion prevention system

    No full text
    Current intrusion prevention systems rely highly on a signature database to detect network attacks. The system provides an alternative to such systems by identifying attacks based on their behavior possibly enabling detection of undocumented attacks. The system works by undergoing a training period which allows the behavior of the network to be gathered and modeled as references after which, rules are generated from this model. Network traffic that violate any of the rules are prohibited by the systems which is implemented as an in-line device monitoring traffic from the Internet to the local network and traffic from the local network to both inside and outside networks. To quantify the accuracy and efficiency of the system, several tests have been deployed with the variables being the time duration for the training phase, and the network from which the attacker would belong to, either from the inside or outside network. The test results include the time delay before detection of attack, the classification of attacks identified and flagged, and rules violated based on the training phase. From the results, it can be deducted that the system is faithful and dependent on the model. It is able to detect all of the attacks with minimal detection delay, the same attacks detected by a third-party system of comparison, Snort. However, when valid non-malicious packets that resemble those from attacks are inserted during the modeling phase, the accuracy of the system goes down by 50% unable to detect half of the attacks tested. The number and type of parameters which are included in the model and traffic analysis also limit the types of attacks that can be detected by the system. With these, the potential of the system being a solution to pattern-based intrusion prevention systems and day 0 attacks is probable. Still, improvements to the implementation of the system, such as increasing the traffic parameters modeled and analyzed, are still necessary to achieve maximum accuracy. The system can also be deployed together with pattern-based systems for future hybrid detection systems
    corecore