WorldWideScience

Sample records for austurhorn intrusive complex

  1. Elucidating the magmatic history of the Austurhorn silicic intrusive complex (southeast Iceland) using zircon elemental and isotopic geochemistry and geochronology

    Science.gov (United States)

    Padilla, A. J.; Miller, C. F.; Carley, T. L.; Economos, R. C.; Schmitt, A. K.; Coble, M. A.; Wooden, J. L.; Fisher, C. M.; Vervoort, J. D.; Hanchar, J. M.

    2016-09-01

    The Austurhorn intrusive complex (AIC) in southeast Iceland comprises large bodies of granophyre and gabbro, and a mafic-silicic composite zone (MSCZ) that exemplifies magmatic interactions common in Icelandic silicic systems. Despite being one of Iceland's best-studied intrusions, few studies have included detailed analyses of zircon, a mineral widely recognized as a valuable tracer of the history and evolution of its parental magma(s). In this study, we employ high spatial resolution zircon elemental and isotopic geochemistry and U-Pb geochronology as tools for elucidating the complex construction and magmatic evolution of Austurhorn's MSCZ. The trace element compositions of AIC zircon crystals form a broad but coherent array that partly overlaps with the geochemical signature for zircons from Icelandic silicic volcanic rocks. Typical of Icelandic zircons, Hf concentrations are relatively low (mush-like material and a prolonged lifetime for the complex.

  2. Root zone of a continental rift: the Neoproterozoic Kebnekaise Intrusive Complex, northern Swedish Caledonides

    DEFF Research Database (Denmark)

    Kirsch, Moritz; Svenningsen, Olaf

    2016-01-01

    Mafic magmatic rocks formed between ca. 615 and 560 Ma along the Neoproterozoic margins of Baltica and Laurentia are classically attributed to continental rifting heralding the opening of the Iapetus Ocean. We report new data for the Kebnekaise Intrusive Complex (KIC) exposed in the Seve Nappes i...

  3. Age and nature of Triassic magmatism in the Netoni Intrusive Complex, West Papua, Indonesia

    Science.gov (United States)

    Webb, Max; White, Lloyd T.

    2016-12-01

    We report field observations together with petrological, geochemical and geochronological data from granitoids of the Netoni Intrusive Complex of West Papua. Until now, our knowledge of the timing of granitic magmatism in this region has been limited to a wide range of ages (241-6.7 Ma) obtained from K-Ar measurements of hornblende, biotite and plagioclase, primarily from samples of river detritus. We collected in situ samples along several traverses into the intrusive complex to: (1) develop a better understanding of the lithologies within the intrusive complex; and (2) determine the timing of magmatism using U-Pb dating of zircon. We also dated zircons from two river sand samples to identify other potential pulses of magmatism that may have been missed due to a sampling bias. The zircons extracted from the river sands yield age spectra similar to those obtained from the in situ samples. The combined data demonstrate that magmatism in the Netoni Intrusive Complex occurred between 248 Ma and 213 Ma. The petrological and geochemical data indicate that the granitoids were most likely emplaced in an ocean-continent (Andean style) subduction setting. This builds on previous work which suggests that a magmatic belt extended along eastern Gondwana (now New Guinea and eastern Australia) throughout much of the Paleozoic. The volcanic ejecta that were produced along this arc and the subsequent erosion of the mountain chain are a potential source of detritus for Triassic and younger sedimentary rocks in New Guinea, eastern Indonesia and north/northwestern Australia.

  4. Semantic intrusion detection with multisensor data fusion using complex event processing

    Indian Academy of Sciences (India)

    R Bhargavi; V Vaidehi

    2013-04-01

    Complex Event Processing (CEP) is an emerging technology for processing and identifying patterns of interest from multiple streams of events in real/near real time. Sensor network-based security and surveillance is a topic of recent research where events generated from distributed sensors at an unpredictable rate need to be analysed for possible threats and respond in a timely manner. Traditional software architectures like client/server architecture where the interactions are pull-based (DBMS) do not target the efficient processing of streams of events in real time. CEP which is a push-based system can process streaming data to identify the intrusion patterns in near real time and respond to the threats. An Intrusion Detection System (IDS) based on single sensor may fail to give accurate identification of intrusion. Hence there is a need for multisensor based IDS. A multisensor-based IDS enables identification of the intrusion patterns semantically by correlating the events and context information provided by multiple sensors. JDL multisource data fusion model is a well-known research model first established by the Joint Directorate Laboratories. This paper proposes JDL fusion framework-based CEP for semantic intrusion detection. The events generated from heterogeneous sensors are collected, aggregated using logical and spatiotemporal relations to form complex events which model the intrusion patterns. The proposed system is implemented and the results show that the proposed system out performs the pull-based solutions in terms of detection accuracy and detection time.

  5. Intrusive dike complexes, cumulate cores, and the extrusive growth of Hawaiian volcanoes

    Science.gov (United States)

    Flinders, Ashton F.; Ito, Garrett; Garcia, Michael O.; Sinton, John M.; Kauahikaua, Jim; Taylor, Brian

    2013-01-01

    The Hawaiian Islands are the most geologically studied hot-spot islands in the world yet surprisingly, the only large-scale compilation of marine and land gravity data is more than 45 years old. Early surveys served as reconnaissance studies only, and detailed analyses of the crustal-density structure have been limited. Here we present a new chain-wide gravity compilation that incorporates historical island surveys, recently published work on the islands of Hawai‘i, Kaua‘i, and Ni‘ihau, and >122,000 km of newly compiled marine gravity data. Positive residual gravity anomalies reflect dense intrusive bodies, allowing us to locate current and former volcanic centers, major rift zones, and a previously suggested volcano on Ka‘ena Ridge. By inverting the residual gravity data, we generate a 3-D view of the dense, intrusive complexes and olivine-rich cumulate cores within individual volcanoes and rift zones. We find that the Hāna and Ka‘ena ridges are underlain by particularly high-density intrusive material (>2.85 g/cm3) not observed beneath other Hawaiian rift zones. Contrary to previous estimates, volcanoes along the chain are shown to be composed of a small proportion of intrusive material (<30% by volume), implying that the islands are predominately built extrusively.

  6. Palaeomagnetism of the Early Permian Mount Leyshon Intrusive Complex and Tuckers Igneous Complex, North Queensland, Australia

    Science.gov (United States)

    Clark, D. A.; Lackie, M. A.

    2003-06-01

    This study provides reliable, precisely defined and well-dated Early Permian (286 +/- 6 Ma) palaeomagnetic poles for Australia from the Mount Leyshon Intrusive Complex (MLIC) and the Tuckers Igneous Complex (TIC). Both complexes are associated with prominent negative magnetic anomalies, indicating the presence of rocks carrying stable remanence of reverse polarity, with a Koenigsberger ratio greater than unity. The characteristic remanence carried by the intrusive phases and by locally remagnetized, contact-metamorphosed host rocks is always of reverse polarity, consistent with acquisition during the Permo-Carboniferous (Kiaman) Reverse Superchron. The corresponding palaeopoles confirm that Australia occupied high latitudes in the Early Permian. The pole positions are: MLIC: lat. = 43.2 °S, long. = 137.3 °E dp = 6.0°, dm = 6.4° Q= 6; TIC: lat. = 47.5 °S, long. = 143.0 °E, dp = 6.0°, dm = 6.6° Q= 6. Permian palaeomagnetic overprinting is detectable at considerable distances from the MLIC (2-3 km), well beyond the zone of visible alteration. The primary nature of the Early Permian palaeomagnetic signature is established by full baked contact/aureole tests at both localities. Other new data from Australia are consistent with the poles reported here. Comparison of the Australian, African and South American Apparent Polar Wander Paths (APWP) suggests that mean Permian and Triassic poles from West Gondwana, particularly from South America, are biased by remagnetization in the Jurassic-Cretaceous and that the Late Palaeozoic-Mesozoic APWP for Gondwana is best defined by Australian data. The Australian APWP exhibits substantial movement through the Mesozoic. Provided only that the time-averaged palaeofield was zonal, the Early Triassic palaeomagnetic data from Australia provide an important palaeogeographic constraint that the south geographic pole was within, or very close to, SE Australia around 240 Ma. The new Early Permian poles are apparently more consistent

  7. Contact relations and petrography of the Solarya intrusive complex (NW Turkey)

    Science.gov (United States)

    Nur Güraslan, Işıl; Ünal, Alp; Altunkaynak, Şafak

    2016-04-01

    Solarya pluton is a N-S trending intrusive body exposed in the North of the Balikesir city in NW Anatolia. It is Early Miocene in age and intruded into the Nilüfer and Hodul unit of Karakaya complex representing Triassic metamorphic and non-metamorphic basement of Sakarya Continent. Solarya plutonic complex consists of three granitic rock members: Porphyritic granodiorite with K-feldspar (orthoclase) megacrystals, microgranite-microgranodiorite and haplogranite. Coarse grained porphyritic granodiorite is common in northern part of the pluton while the southern part of the pluton is formed from microgranite-microgranodiorite. Haplogranite was emplaced between the pluton and the metamorphic country rocks and surrounds the pluton as a thin light coloured outer zone along northern half of the border. Haplogranitic envelope zone display graphic and granophyric textures. Main plutonic body also contains mafic enclaves and syn-plutonic mafic dykes. Along the southern border, the fine grained chilled margin of Solarya pluton gradually passes into the hypabyssal and volcanic rocks. At the western border of the pluton, a young fault separates the pluton from non-metamorphic Hodul Unit of Karakaya complex. Along the northern and eastern margin, Solarya pluton intruded into metamorphic rocks of Nilüfer Unit which consist mainly of marbles, metapelites and metabasites. Solarya intrusive complex developed contact metamorphism in a narrow zone (150-200 m) around its eastern margin between the marbles which reaches to hornblende-hornfels facies conditions. The grain sizes of the marbles grow towards the margin of the pluton. Contact metamorphic rocks surrounding the intrusive body are common with granoblastic texture and display calcite + plagioclase + tremolite + diopside + garnet ± quartz mineral paragenesis dominantly. This mineral paragenesis suggest that the contact metamorphic aureole has developed under 500-550 C° and 2-3 kbar temperature and pressure conditions, which

  8. Melanite garnet-bearing nepheline syenite minor intrusion in Mawpyut ultramafic–mafic complex, Jaintia Hills, Meghalaya

    Indian Academy of Sciences (India)

    Monoj Maitra; J S David; S Bhaduri

    2011-12-01

    Mawpyut igneous suite in Jaintia Hills of Meghalaya plateau comprises differentiated suite of ultramafic–mafic rocks. The complex differs from other ultramafic–alkaline–carbonatite igneous emplacements of Shillong plateau and Mikir Hills like Jesra, Sung, Samchampi complexes, by the absence of alkaline–carbonatite rocks as major litho-units. Melanite garnet-bearing nepheline syenite, occurs as late phase minor intrusion in Mawpyut igneous complex, posseses alkaline character and shows inubiquitous relation with the host ultramafic–mafic rocks. On the other hand, this alkaline intrusive bodies of the Mawpyut igneous complex shows chemico-mineralogical resemblance with garnet-bearing nepheline syenite, ijolite litho-members of Jesra, Sung, Samchampi complexes of the region. It is interpreted that melanite garnet-bearing nepheline syenite intrusion in Mawpyut is contemporaneous with Jesra, Sung, Samchampi ultramafic–alkaline–carbonatite complexes and the host rocks of Mawpyut complex is an earlier magmatic activity possibly from a comparatively least enriched source.

  9. Magma transport in sheet intrusions of the Alnö carbonatite complex, central Sweden.

    Science.gov (United States)

    Andersson, Magnus; Almqvist, Bjarne S G; Burchardt, Steffi; Troll, Valentin R; Malehmir, Alireza; Snowball, Ian; Kübler, Lutz

    2016-06-10

    Magma transport through the Earth's crust occurs dominantly via sheet intrusions, such as dykes and cone-sheets, and is fundamental to crustal evolution, volcanic eruptions and geochemical element cycling. However, reliable methods to reconstruct flow direction in solidified sheet intrusions have proved elusive. Anisotropy of magnetic susceptibility (AMS) in magmatic sheets is often interpreted as primary magma flow, but magnetic fabrics can be modified by post-emplacement processes, making interpretation of AMS data ambiguous. Here we present AMS data from cone-sheets in the Alnö carbonatite complex, central Sweden. We discuss six scenarios of syn- and post-emplacement processes that can modify AMS fabrics and offer a conceptual framework for systematic interpretation of magma movements in sheet intrusions. The AMS fabrics in the Alnö cone-sheets are dominantly oblate with magnetic foliations parallel to sheet orientations. These fabrics may result from primary lateral flow or from sheet closure at the terminal stage of magma transport. As the cone-sheets are discontinuous along their strike direction, sheet closure is the most probable process to explain the observed AMS fabrics. We argue that these fabrics may be common to cone-sheets and an integrated geology, petrology and AMS approach can be used to distinguish them from primary flow fabrics.

  10. Geochemistry of an island-arc plutonic suite: Wadi Dabr intrusive complex, Eastern Desert, Egypt

    Science.gov (United States)

    Abu El-Ela, Fawzy F.

    1997-05-01

    The Wadi Dabr intrusive complex, west of Mersa-Alam, Eastern Desert, Egypt ranges in composition from gabbro to diorite, quartz diorite and tonalite. The gabbroic rocks include pyroxene-horn blend e gabbro, hornblende gabbro, quartz-hornblende gabbro, metagabbro and amphibolite. Mineral chemistry data for the gabbroic rocks indicate that the composition of clinopyroxenes ranges from diopside to augite and the corresponding magma is equivalent to a volcanic-arc basalt. Plagioclase cores range from An 75 to An 34 for the gabbroic varieties, except for the metagabbro which has An 11-18. The brown amphiboles are primary phases and classified as calcic amphiboles, which range from tschermakitic hornblende to magnesiohornblende. Green hornblende and actinolite are secondary phases. Hornblende barometry and hornblende-plagioclase themometry for the gabbroic rocks estimate crystallisation conditions of 2-5 kb and 885-716°C. The intrusive rocks cover an extensive silica range (47.86-72.54 wt%) and do not exhibit simple straight-line variation on Harker diagrams for many elements (e.g. TiO 2, Al 2O 3, FeO ∗, MgP, CaO, P 2O 5, Cr, Ni, V, Sr, Zr and Y). Most of these elements exhibit two geochemical trends suggesting two magma sources. The gabbroic rocks are relatively enriched in large ion lithophile elements (K, Rb, Sr and Ba) and depleted in high field strength elements (Nb, Zr, Ti and Y) which suggest subduction-related magma. Rare earth element (REE) data demonstrate that the gabbroic rocks have a slight enrichment of light REE [(La/Yb) N=2.67-3.91] and depletion of heavy REE ((Tb/Yb) N=1.42-1.47], which suggest the parent magma was of relatively primitive mantle source. The diorites and tonalites are clearly calc-alkaline and have negative anomalies of Nb, Zr, and Y which also suggest subduction-related magma. They are related to continental trondhjemites in terms of RbSr, KNaCa, and to volcanic-arc granites in terms of Rband NbY. The Wadi Dabr

  11. Episodic growth of a Late Cretaceous and Paleogene intrusive complex of pegmatitic leucogranite, Ruby Mountains core complex, Nevada, USA

    Science.gov (United States)

    Howard, K.A.; Wooden, J.L.; Barnes, C.G.; Premo, W.R.; Snoke, A.W.; Lee, S.-Y.

    2011-01-01

    Gneissic pegmatitic leucogranite forms a dominant component (>600 km3) of the midcrustal infrastructure of the Ruby Mountains-East Humboldt Range core complex (Nevada, USA), and was assembled and modified episodically into a batholithic volume by myriad small intrusions from ca. 92 to 29 Ma. This injection complex consists of deformed sheets and other bodies emplaced syntectonically into a stratigraphic framework of marble, calc-silicate rocks, quartzite, schist, and other granitoids. Bodies of pegmatitic granite coalesce around host-rock remnants, which preserve relict or ghost stratigraphy, thrusts, and fold nappes. Intrusion inflated but did not disrupt the host-rock structure. The pegmatitic granite increases proportionally downward from structurally high positions to the bottoms of 1-km-deep canyons where it constitutes 95%-100% of the rock. Zircon and monazite dated by U-Pb (sensitive high-resolution ion microprobe, SHRIMP) for this rock type cluster diffusely at ages near 92, 82(?), 69, 38, and 29 Ma, and indicate successive or rejuvenated igneous crystallization multiple times over long periods of the Late Cretaceous and the Paleogene. Initial partial melting of unexposed pelites may have generated granite forerunners, which were remobilized several times in partial melting events. Sources for the pegmatitic granite differed isotopically from sources of similar-aged interleaved equigranular granites. Dominant Late Cretaceous and fewer Paleogene ages recorded from some pegmatitic granite samples, and Paleogene-only ages from the two structurally deepest samples, together with varying zircon trace element contents, suggest several disparate ages of final emplacement or remobilization of various small bodies. Folded sills that merge with dikes that cut the same folds suggest that there may have been in situ partial remobilization. The pegmatitic granite intrusions represent prolonged and recurrent generation, assembly, and partial melting modification of a

  12. Apatite formation behaviour during metasomatism in the Bathtub Intrusion (Babbitt deposit, Duluth Complex, USA)

    Science.gov (United States)

    Raič, Sara; Mogessie, Aberra; Krenn, Kurt; Hauzenberger, Christoph A.; Tropper, Peter

    2016-04-01

    The mineralized troctolitic Bathtub intrusion (Duluth Complex, NE-Minnesota) is known for its famous Cu-Ni-Sulfide±PGM Babbitt deposit, where platinum group minerals (PGMs) are either hosted by primary magmatic sulfides (base metal sulfides) or associated with hydrothermally altered portions. This secondary generation of PGMs is present in alteration patches and suggests the involvement of hydrothermal fluids in the mobilization of platinum-group elements (PGEs). Accessory fluorapatite in these samples reveals besides H2O- and CO2-rich primary fluid inclusions, textural and compositional variations that also record magmatic and metasomatic events. Based on detailed back-scattered electron imaging (BSE) and laser ablation-inductively coupled plasma-mass spectrometry (LA-ICPMS), a primary magmatic origin is reflected by homogeneous or zoned grains, where zoning patterns are either concentric or oscillatory, with respect to LREE. Late magmatic to hydrothermal processes are indicated by grains with bright LREE-enriched rims or conversion textures with REE-enriched patches in the interior of the apatite. A metasomatic formation of monazite from apatite is documented by the presence of monazite inclusions in apatite and newly grown monazite at altered apatite rims. They formed by the release of REEs from the apatite during a fluid-induced alteration, based on the coupled substitution Ca2+ + P5+ = REE3+ + Si4+ (Rønsbo 1989; Rønsbo 2008). Samples with monazite inclusions in apatite further display occurrences of PGMs associated with hydrothermal alteration patches (chlorite + amphibole). The presence of H2O- and CO2-rich fluid inclusions in apatite, the metasomatically induced monazite growth, as well as the occurrence of PGMs in hydrothermally alteration zones, also suggest the involvement of aqueous chloride complexes in a H2O dominated fluid in the transportation of LREE and redistribution of the second generation of PGEs. Rønsbo, J.G. (1989): Coupled substitutions

  13. Geochronology of the Hannan intrusive complex to adjoin the Qinling orogen and its rapid cooling reason

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The geochronological works for the Hannan intrusive complex,cosisting of the gabbro-quartz diorite-plagiogranite bodies, in the north border of the Yangtze craton block, adjoining the Qinling orogen, are reported, because its age and genesis are of great importance to research of the tectonic evalutional history for the Qinling orogen and of the rifted processes for the Late Proterozoic supercontinent Rodinia. A good isochron of t=(837±26) Ma (2σ), corresponding to INd=0.51165(2±2σ), σNd(t)=+1.9, MSWD1.02, was difined by the Nd isotopic analytical results for the 21 whole-rock samples from the varied lithological complex bodies, but for the Rb-Sr isotopic aralytical data there is no isochron. The 40Ar/39Ar plateau age of the biotite, sorted from plagiogranites, is (796±20) Ma(2σ), and yet for the Rb-Sr isotopic data of the plagiogranite whole-rock samples (WR) and the sorted biotite (Bio), plagioclase (Plag) and apatite (Apt) mineral samples from the plagiogranite whole-rock samples, an isochron of t=(824.8±3.8) Ma (2σ) with ISr=0.70393±14(2σ), MSWD2.44 is given. The U-Pb isotopic results for the single zircon, sorted from plagiogranite samples, yielded an upper and a lower intercept ages of ~876 Ma and ~273 Ma. The Nd isotope data of complex indicate that it is probably the products of crystallization differentiation from the magma with (Nd>0 when the rapid uplift in 837—800 Ma took place in the northern border of the Yangtze craton block.

  14. Seawater intrusion into groundwater aquifer through a coastal lake - complex interaction characterised by water isotopes (2)H and (18)O.

    Science.gov (United States)

    Gemitzi, Alexandra; Stefanopoulos, Kyriakos; Schmidt, Marie; Richnow, Hans H

    2014-01-01

    The present study investigates the complex interactions among surface waters, groundwaters and a coastal lake in northeastern Greece, using their stable isotopic composition (δ(18)O, δ(2)H) in combination with hydrogeological and hydrochemical data. Seasonal and spatial trends of water isotopes were studied and revealed that all water bodies in the study area interact. It was also shown that the aquifer's increased salinity is not due to fossil water from past geological periods, but is attributed to brackish lake water intrusion into the aquifer induced by the extensive groundwater pumping for irrigation purposes. Quantification of the contribution of the lake to the aquifer was achieved using the simple dilution formula. The isotopic signatures of the seawater and the groundwaters are considerably different, so there is a very little possibility of direct seawater intrusion into the aquifer.

  15. Radiological Mapping of the Alkaline Intrusive Complex of Jombo, South Coastal Kenya by In-Situ Gamma-Ray Spectrometry

    Science.gov (United States)

    Kaniu, Ian; Darby, Iain G.; Kalambuka Angeyo, Hudson

    2016-04-01

    Carbonatites and alkaline intrusive complexes are rich in a variety of mineral deposits such as rare earth elements (REEs), including Nb, Zr and Mn. These are often associated with U and Th bearing minerals, including monazite, samarskite and pyrochlore. Mining waste resulting from mineral processing activities can be highly radioactive and therefore poses a risk to human health and environment. The Jombo complex located in Kenya's south coastal region is potentially one of the richest sources of Nb and REEs in the world. It consists of the main intrusion at Jombo hill, three associated satellite intrusions at Mrima, Kiruku and Nguluku hills, and several dykes. The complex is highly heterogeneous with regard to its geological formation as it is characterized by alkaline igneous rocks and carbonatites which also influence its radio-ecological dynamics. In-situ gamma spectrometry offers a low-cost, rapid and spatially representative radioactivity estimate across a range of landscapes compared to conventional radiometric techniques. In this work, a wide ranging radiological survey was conducted in the Jombo complex as follow up on previous studies[1,2], to determine radiation exposure levels and source distributions, and perform radiological risk assessments. The in-situ measurements were carried out using a 2.0 l NaI(Tl) PGIS-2 portable detector from Pico Envirotec Inc integrated with GPS, deployed for ground (back-pack) and vehicular gamma-ray spectrometry. Preliminary results of radiological distribution and mapping will be presented. [1] Patel, J. P. (1991). Discovery and Innovation, 3(3): 31-35. [2] Kebwaro, J. M. et. al. (2011). J. Phys. Sci., 6(13): 3105-3110.

  16. The Odivelas gabbro complex (Alentejo, Portugal): a Hercynian synorogenic layered intrusion

    NARCIS (Netherlands)

    Soares de Andrade, A.A.; Vieira, Conceição L.

    1981-01-01

    The ultramafic-mafic zone of the Hercynian Beja Massif includes 1) the Quintos amphibolite-diorite-serpentinite Complex, 2) the Odivelas layered gabbro Complex, and 3) the Peroguarda (meta) basalt-andesite Complex. The rhythmic and cryptic zoning of the Odivelas Complex is described, as well as its

  17. Occurrence of uranium in rocks of the intrusive complex at Ekiek Creek, western Alaska

    Science.gov (United States)

    Wallace, Alan R.

    1979-01-01

    Uranium in the Ekiek Creek Complex of western Alaska is related to a niobium-rich pyrochlore in the nepheline syenite of the complex. The complex consists of an aegirine-phlogopite pyroxenite that has been intruded and partly replaced by nepheline syenite. The contact zone between the two igneous units varies from a sharp contact to a diffuse zone where the pyroxenite has been metasomatically replaced by the syenite. The entire complex was intruded into an older Cretaceous monzonite. The pyrochlore occurs as an accessory mineral in the syenite, and is visible in rocks containing over 50 ppm uranium. Chemical analyses indicate that, in all samples of syenite, there is a positive correlation between uranium and niobium; this suggests that the uranium-pyrochlore association persists even when pyrochlore is not readily visible in thin section. The small amount of pyrochlore, and its refractory nature, make the complex an unfavorable source for secondary uranium leaching or heavy-mineral concentration.

  18. Development of a complex groundwater model to assess the relation among groundwater resource exploitation, seawater intrusion and land subsidence

    Science.gov (United States)

    Hsi Ting, Fang; Yih Chi, Tan; Chen, Jhong Bing

    2016-04-01

    The land subsidence, which is usually irreversible, in Taiwan Pintung Plain occurred due to groundwater overexploitation. Many of the land subsidence areas in Taiwan are located in coastal area. It could not only result in homeland loss, but also vulnerability to flooding because the function of drainage system and sea wall are weakened for the lowered ground surface. Groundwater salinization and seawater intrusion could happen more easily as well. This research focuses on grasping the trend of environmental change due to the damage and impact from inappropriate development of aquaculture in the last decades. The main task is developing the artificial neural networks (ANNs) and complex numerical model for conjunctive use of surface and groundwater which is composed of a few modules such as land use, land subsidence, contamination transportation and etc. An approach based on self-organizing map (SOM) is proposed to delineate groundwater recharge zones. Several topics will be studied such as coupling of surface water and groundwater modeling, assessing the benefit of improving groundwater resources by recharge, identifying the improper usage of groundwater resources, and investigating the effect of over-pumping on land subsidence in different depth. In addition, a complete plan for managing both the flooding and water resources will be instituted by scheming non-engineering adaptation strategies for homeland planning, ex. controlling pumping behavior in area vulnerable to land subsidence and increasing groundwater recharge.

  19. High-resolution insights into episodes of crystallization, hydrothermal alteration and remelting in the Skaergaard intrusive complex

    Science.gov (United States)

    Wotzlaw, Jörn-Frederik; Bindeman, Ilya N.; Schaltegger, Urs; Brooks, C. Kent; Naslund, H. Richard

    2012-11-01

    This paper presents a new high-precision zircon U-Pb geochronological view on the crystallization and assembly process of one of the most important and intensely studied intrusive bodies on Earth—the Skaergaard intrusion in East Greenland. With analytical uncertainties of a few tens of thousands of years, we were able to resolve several important events during cooling of this intrusion. Initial cooling of the shallowly intruded ˜300 km3 of tholeiitic basaltic magma from liquidus to zircon saturation at ˜1000 °C is recorded by a precise zircon crystallization age of 55.960±0.018 Ma of an intercumulus gabbroic pegmatite in the lower portion of the intrusion. Based on this zircon crystallization age and a published cooling model we estimate the "true" age of emplacement to be ˜56.02 Ma. The last portions of Skaergaard appear to crystallize completely ˜100 ka after emplacement as recorded by abundant ˜55.91-55.93 Ma zircons in the Sandwich Horizon (SH), where lower and upper solidification fronts met. Intrusion of an isotopically distinct new magma batch, the ˜600 m thick Basistoppen Sill, into the solidified upper portion of Skaergaard, happened at 55.895±0.018 Ma, suggesting close timing between crystallization of evolved rocks around the SH and intrusion of the Basistoppen Sill. The novel result of this work is the demonstration that zircons in the SH, >100 m below the Basistoppen contact, have a bimodal age distribution, with the youngest population of 55.838±0.019 Ma postdating intrusion of the Basistoppen Sill by 57±37 ka. Oxygen isotope analyses reveal that SH zircons are low and heterogeneous with respect to δ18O. These results support the proposed conclusion that the SH crystallized twice: it was fully crystalline, then hydrothermally-altered by low-δ18O surface waters and subsequently partially remelted, triggered by heat of the Basistoppen Sill. The low-degree partial melt generated during remelting partially migrated upward by intergranular

  20. Contact metamorphism, partial melting and fluid flow in the granitic footwall of the South Kawishiwi Intrusion, Duluth Complex, USA

    Science.gov (United States)

    Benko, Z.; Mogessie, A.; Molnar, F.; Severson, M.; Hauck, S.; Lechler, P.; Arehart, G.

    2012-04-01

    The footwall of the South Kawishiwi Intrusion (SKI) a part of the Mesoproterozoic (1.1 Ga) Duluth Complex consists of Archean granite-gneiss, diorite, granodiorite (Giant Range Batholith), thin condensed sequences of Paleoproterozoic shale (Virginia Fm.), as well as banded iron formation (Biwabik Iron Fm). Detailed (re)logging and petrographic analysis of granitic footwall rocks in the NM-57 drillhole from the Dunka Pit area has been performed to understand metamorphic processes, partial melting, deformation and geochemical characteristics of de-volatilization or influx of fluids. In the studied drillhole the footwall consists of foliated metagranite that is intersected by mafic (dioritic) dykes of older age than the SKI. In the proximal contact zones, in the mafic dykes, the orthopyroxene+clinopyroxene+plagioclase+quartz+Fe-Ti-oxide+hornblende±biotite porphyroblasts embedded in a plagioclase+K-feldspar+orthopyroxene+apatite matrix indicate pyroxene-hornfels facies conditions. Migmatitization is revealed by the euhedral crystal faces of plagioclase and pyroxene against anhedral quartz crystals in the in-situ leucosome and by the presence of abundant in-source plagioclase±biotite leucosome veinlets. Amphibole in the melanosome of mafic dykes was formed with breakdown of biotite and implies addition of H2O to the system during partial melting. Towards the deeper zones, the partially melted metatexite-granite can be characterized by K-feldspar+plagioclase+quartz+ortho/clinopyroxene+biotite+Fe-Ti-oxide+apatite mineral assemblage. The felsic veins with either pegmatitic or aplititic textures display sharp contact both to the granite and the mafic veins. They are characterized by K-feldspar+quartz±plagioclase±muscovite mineral assemblage. Sporadic occurrence of muscovite suggest local fluid saturated conditions. Emplacement of gabbroic rocks of the SKI generated intense shear in some zones of the granitic footwall resulting in formation of biotite-rich mylonites with

  1. Pulp-dentine complex changes and root resorption during intrusive orthodontic tooth movement in patients prescribed nabumetone.

    Science.gov (United States)

    Villa, Paula A; Oberti, Giovanni; Moncada, Cesar A; Vasseur, Olga; Jaramillo, Alejandro; Tobón, Diego; Agudelo, Jaime A

    2005-01-01

    Pulpitis, external root resorption, and pain may be experienced during orthodontic movement. The use of nonsteroidal anti-inflammatory drugs (NSAIDs) has been suggested to control these changes. The purpose of this study was to observe pulp-dentinal reactions, root resorption, tooth pain, and tooth movement after the application of a 4-ounce intrusive orthodontic force to human maxillary first premolars in patients given the NSAID nabumetone. Thirty-four maxillary first premolars were evaluated. A placebo was prescribed to 17 patients after an intrusive force was activated and reactivated for an 8-week period on the right side. The same procedure was repeated on the left side after patients were given nabumetone. Pulp-dentinal reactions and external root resorption were evaluated by histology. Pain and movement were also evaluated. Nabumetone was found to be useful in reducing pulpitis, external root resorption, and pain caused by intrusive orthodontic movement, without altering tooth movement in response to the application of orthodontic force.

  2. High-resolution insights into episodes of crystallization, hydrothermal alteration and remelting in the Skaergaard intrusive complex

    DEFF Research Database (Denmark)

    Wotzlaw, Joern-Frederik; Bindeman, Ilya N.; Schaltegger, Urs

    2012-01-01

    This paper presents a new high-precision zircon U-Pb geochronological view on the crystallization and assembly process of one of the most important and intensely studied intrusive bodies on Earth the Skaergaard intrusion in East Greenland. With analytical uncertainties of a few tens of thousands...... crystalline, then hydrothermally-altered by low-delta O-18 surface waters and subsequently partially remelted, triggered by heat of the Basistoppen Sill. The low-degree partial melt generated during remelting partially migrated upward by intergranular compaction-driven flow, explaining the existence...

  3. Construction of the Vinalhaven Intrusive Complex, Maine, USA: the Plutonic Record of Evolving Magma Chambers Affected by Multiple Episodes of Replenishment, Rejuvenation, Crystal Accumulation and Eruption

    Science.gov (United States)

    Wiebe, R. A.; Hawkins, D. P.

    2004-12-01

    Increasingly, the plutonic roots of volcanic systems can be shown to contain temporal records of events inferred from the study of volcanic rocks. The Vinalhaven intrusive complex preserves evidence for multiple episodes of silicic and mafic replenishments, rejuvenation of granite, and probable eruptive events over a nominal time-span of 1.7 Ma (Hawkins and Wiebe, this volume). The complex is about 12 km in diameter and consists mainly of cg granite, a thick section of arcuate, inward-dipping gabbro-diorite sheets in the southeastern half of the complex, and a circular core of fg granite. Field relations demonstrate that the base of the intrusion is along the southeastern margin of the complex, and the top is along the northwestern margin where it intrudes coeval volcanic rocks. Aphyric basaltic and granitic dikes fed this essentially bimodal intrusion. When basaltic dikes intersected a silicic chamber, basalt spread across a floor of silicic crystal mush to form gabbro-diorite sheets in granite. Several extensive layers of angular blocks of country rock occur within the mafic rocks. Granitic dikes and the fg granitic core of the complex have sharp to gradational contacts with cg granite, and, locally, both granites are intimately mixed and commingled. These relations indicate that new silicic injections mixed into partly crystallized resident magma. Several irregular bodies of porphyry (0.2 to 0.5 km in average dimension) intrude cg granite with sharp, gradational, or commingled contacts. The porphyry has 5 to 40% corroded phenocrysts, identical in composition to crystals in the granite, and a variably quenched matrix. Some of these bodies formed when late injections of basalt remelted largely solid portions of cg granite. New silicic input may have contributed to other porphyry bodies. The matrix probably quenched because of a sudden decrease in pressure, possibly due to eruption of magma from the chamber. The cg granite and inter-layered mafic rocks preserve a

  4. Petrology of the Motaghairat mafic-ultramafic complex, Eastern Desert, Egypt: A high-Mg post-collisional extension-related layered intrusion

    Science.gov (United States)

    Abdel Halim, Ali H.; Helmy, Hassan M.; Abd El-Rahman, Yasser M.; Shibata, Tomoyuki; El Mahallawi, Mahmoud M.; Yoshikawa, Masako; Arai, Shoji

    2016-02-01

    The geodynamic settings of the Precambrian mafic-ultramafic complexes in the Eastern Desert of Egypt have important bearing on understanding the geotectonic evolution of the Arabian Nubian Shield. We present a detailed petrological study on a layered mafic-ultramafic intrusion that is located at the contact between the Precambrian continental crust and the Miocene Red Sea oceanic crust. The Motaghairat layered intrusion consists of basal lherzolite, orthopyroxenite, troctolite, olivine gabbro and anorthosite on the top. Variations in modal mineralogy and mineral chemistry along with the chemical composition of these units suggest their derivation from a common high-Mg tholeiitic parent melt through fractional crystallization processes. The parental magma was derived from a metasomatised mantle source. The primitive mantle-normalized patterns of the calculated melts exhibit enrichment in U relative to Th and Ba relative LREE which indicate that the enriched lithospheric mantle source was metasomatised by fluids derived from a subducted oceanic crust rather than by a sediment melt. Geological and petrological evidences suggest that the layered Motaghairat intrusion was emplaced during post-orogenic extension following subduction break-off and lithospheric delamination after the collision between the amalgamated island arc terranes and the Saharan Metacraton. The heat source required to melt the metasomatised lithospheric mantle was derived from the upwelling of hot asthenosphere after the subduction-break-off.

  5. U-Pb zircon SHRIMP data from the Cana Brava layered complex: new constraints for the mafic-ultramafic intrusions of Northern Goiás, Brazil

    Science.gov (United States)

    Giovanardi, T.; Girardi, V. A. V.; Correia, C. T.; Sinigoi, S.; Tassinari, C. C. G.; Mazzucchelli, M.

    2015-08-01

    The Cana Brava Complex is the northernmost and least well known layered intrusion of a discontinuous belt of mafic-ultramafic massifs within the Brasilia Belt, which also comprises theNiquelândia and Barro Alto complexes. Available geochronological data from a range of techniques (K/Ar, Ar/Ar, Rb/Sr, Sm/Nd and U/Pb) provide a range of possible ages (time span from 3.9 Ga to 450 Ma), hence a precise and reliable age for the Cana Brava Complex is still lacking. Also, preliminary isotopic and geochemical data of the Cana Brava Complex suggest a significant crustal contamination, which could have affected bulk-rock Sr and Nd systematics resulting in meaningless age determinations. In this paper, we present new U-Pb SHRIMP zircon analyses from four samples of different units of the Cana Brava Complexwhich suggest that the intrusion occurred during the Neoproterozoic, between 800 and 780 Ma, i.e. at the same age ofNiquelândia. Discordant older 206Pb/238U ages are provided by inherited zircons, and match the age of the metamorphism of the embedding Palmeirópolis Sequence.

  6. Early Jurassic subduction of the Paleo-Pacific Ocean in NE China: Petrologic and geochemical evidence from the Tumen mafic intrusive complex

    Science.gov (United States)

    Guo, Feng; Li, Hongxia; Fan, Weiming; Li, Jingyan; Zhao, Liang; Huang, Miwei; Xu, Wenliang

    2015-05-01

    Subduction of the Paleo-Pacific Oceanic Plate is widely considered to have caused extensive Mesozoic magmatism, lithospheric deformation and mineralization in East Asia. However, it is still unclear when this subduction began. Here we report an Early Jurassic (~ 187 Ma) mafic intrusive complex (including olivine norite, gabbro, and diorite) from the Tumen area in NE China. The olivine norite contains a mineral assemblage of olivine, pyroxene, Ca-plagioclase, and hornblende that crystallized in a water-saturated parental magma. The rocks in the complex show variable degrees of plagioclase and ferromagnesian mineral accumulation as reflected by positive Sr and Eu anomalies in primitive mantle-normalized incompatible element patterns. Mass-balance calculations indicate that the parental magma was calc-alkaline with arc-type trace element features (i.e., large ion incompatible and light rare earth element enrichment and Nb-Ta depletion). It also had Sr-Nd-Hf isotopic compositions (87Sr/86Sr(i) = 0.7042 to 0.7044, εNd(t) = + 2.5 to + 3.5 and εHf(t) = + 8.4 to + 10.5) similar to those of modern arc basalts. The parental magma was likely derived from 5 to 20% melting of a mantle wedge metasomatized by an addition of 3-4% hydrous sediment melt from the subducting Paleo-Pacific Oceanic slab. The Tumen mafic intrusive complex, together with other contemporaneous mafic intrusions, I-type granitoids, and felsic lavas, constitutes an Early Jurassic N-S-trending arc magmatic belt that was formed by westward subduction of the Paleo-Pacific Ocean.

  7. Draped aeromagnetic survey in Transantarctic Mountains over the area of the Butcher Ridge igneous complex showing extent of underlying mafic intrusion

    Science.gov (United States)

    Behrendt, John C.; Damaske, D.; Finn, C.A.; Kyle, P.; Wilson, T.J.

    2002-01-01

    A draped aeromagnetic survey over the area surrounding the Butcher Ridge igneous complex (BRIC), Transantarctic Mountains, was acquired in 1997-1998 as part of a larger Transantarctic Mountains Aerogeophysical Research Activity survey. The BRIC is a sill-like hypoabyssal intrusion ranging in composition from tholeiitic basalt to rhyolite. An 40Ar/39 Ar age of 174 Ma and the chemical character of the basaltic rocks show the BRIC to be part of the widespread Jurassic Ferrar suite of continental tholeiitic rocks, that extends for 3500 km across Antarctica. The aeromagnetic survey shows a horseshoe-shaped pattern of anomalies reaching amplitudes as great as 1900 nT generally associated with the bedrock topography where it is exposed. It is apparent that the high-amplitude anomaly pattern is more extensive than the 10-km-long exposed outcrop, first crossed by a single 1990 aeromagnetic profile. The highest-amplitude anomalies appear south of the profile acquired in 1990 and extend out of the survey area. The new aeromagnetic data allow determination of the extent of the interpreted Butcher mafic(?) intrusion beneath exposures of Beacon sedimentary rock and ice in the area covered, as well as beneath the small BRIC exposure. The magnetic anomalies show a minimum area of 3000 km2, a much greater extent than previously inferred. Magnetic models indicate a minimum thickness of ???1-2 km for a horizontal intrusion. However, nonunique models with magnetic layers decreasing in apparent susceptibility with depth are consistent with of a 4- to 8-km-thick layered intrusion. These magnetic models indicate progressively deeper erosion of the interpreted mafic-layered body from the south to north. The erosion has removed more magnetic upper layers that mask the magnetic effects of the lower less magnetic layers. The probable minimum volume of the intrusion in the area of the survey is ???6000 km3. An alternate, but less likely, interpretation of a series of dikes can also fit the

  8. Post-collisional multistage magmatism in the Ribeira mobile belt: geochemical and isotopic study of the Varzea Alegre intrusive complex, Espirito Santo, Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Medeiros, Silvia Regina de; Mendes, Julio Cezar [Universidade Federal, Rio de Janeiro, RJ (Brazil). Inst. de Geociencias. Dept. de Geologia]. E-mail: medeiros@igeo.ufrj.br; Wiedemann-Leonardos, Cristina Maria [Brasilia Univ., DF (Brazil). Inst. de Geociencias]. E-mail: wiedeman@unb.br

    2000-03-01

    The Varzea Alegre Intrusive Complex (VAIC) corresponds to a post-collisional (late orogenic) pluton, related to the Brasiliano cycle, situated in the central part of the Espirito Santo State. It intrudes amphibolite to granulite facies metamorphic rocks of the Ribeira Belt. Two distinct domains were recognised in this zoned pluton: an inner domain with opx-gabbro, monzogabbro, diorite, quartz-diorite and megaporphyritic granite, and an outer one comprising an irregular and large ring of charnockitic rocks. Geochemical data from the former reveal medium to high-K calc-alkalic rocks, enriched in incompatible elements, mainly Ba, Sr, La, Ce and Pb and partially depleted in HFS elements. The charnockitic rocks show a high-K alkali-calcic signature; they are rich in Ba, K and some HFS elements, such a Zr, P and Nb. The incompatible element enrichment detected in the rocks of the VAIC has been reported for several intrusions from this part of the Ribeira Belt. A Rb-Sr isochronic age of 508{+-} 12 Ma was determined for the megaporphyritic granite. The T{sub DM} model age varies from 1.3 Ga (opx-gabbro) to ca. 1.67 Ga (charnockitic rocks), which can be related to an important Mesoproterozoic crustal event. The calculated T{sub CHUR} model ages of the cogenetic opx-gabbros and intermediary rocks is ca. 1.0 Ga, interpreted as the time when the basic magma was extracted from the source. (author)

  9. New U-Pb ages in the Diablillos Intrusive Complex, Southern Puna, Argentina: A long magmatic event in the Paleozoic Arc, SW Gondwana

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz, Agustin; Hauser, Natalia [Universidade de Brasilia (UnB), DF (Brazil). Instituto de Geociencias. Lab. de Geocronologia; Becchio, Raul; Nieves, Alexis; Suzano, Nestor [Universidad Nacional de Salta (UNSa)-CONICET, Salta (Argentina)

    2015-07-01

    The Puna geological region comprises Salta, Jujuy and Catamarca provinces, northwestern Argentina. This 4000 meter above sea level high-plateau region lies between the Central Argentinian Andes. The Puna basement in the central Andes consists of Proterozoic–Paleozoic metamorphic rocks and granitoids. Diverse authors, proposed different models to explain the origin of the basement, where two orogenic events are recognized: the Pampean (Upper Precambrian–Lower Cambrian) and Famatinian (Upper Cambrian–Lower Silurian) (e.g. Ramos et al., 1986; Ramos, 1988; Loewy et al., 2004; for opposite points of view see Becchio et al., 1999; Bock et al., 2000; Buttner et al., 2005). Hence, Lucassen et al. (2000) proposed for the Central Andean basement, an evolution in a mobile belt, where the Pampean and Famatinian cycles are not distinct events but, they are one single, non-differentiable event from 600 to 400 Ma. The mobile belt culminated in low-P/ high-T metamorphism at approximately 525-500 Ma. Then, these were followed by a long-lasting high-thermal gradient regime in the mid-crust until Silurian times. Becchio et al., (2011) defined the Diablillos Intrusive Complex (CID, by its Spanish name), emplaced in the Inca Viejo Range. This range splits the Salares Ratones-Centenario with the Salar Diablillos (Fig.1). This Complex is located in the Eastern Magmatic Belt, Southern Puna, Argentina. Here we present new zircons U-Pb ages by LA-MC-ICPMS in the Diablillos Intrusive Complex, contributing to understanding the magmatic event in the lower Paleozoic arc, SW Gondwana. (author)

  10. An overview to Software Architecture in Intrusion Detection System

    CERN Document Server

    Bahrami, Mehdi

    2012-01-01

    Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software based network intrusion detection systems have difficulty in handling high speed links. This paper reviews of many type of software architecture in intrusion detection systems and describes the design and implementation of a high-performance network intrusion detection system that combines the use of software-based network intrusion detection sensors and a network processor board. The network processor acts as a customized load balancing splitter that cooperates with a set of modified content-based network intrusion detection sensors in processing network traffic.

  11. Development of computer program ENAUDIBL for computation of the sensation levels of multiple, complex, intrusive sounds in the presence of residual environmental masking noise

    Energy Technology Data Exchange (ETDEWEB)

    Liebich, R. E.; Chang, Y.-S.; Chun, K. C.

    2000-03-31

    The relative audibility of multiple sounds occurs in separate, independent channels (frequency bands) termed critical bands or equivalent rectangular (filter-response) bandwidths (ERBs) of frequency. The true nature of human hearing is a function of a complex combination of subjective factors, both auditory and nonauditory. Assessment of the probability of individual annoyance, community-complaint reaction levels, speech intelligibility, and the most cost-effective mitigation actions requires sensation-level data; these data are one of the most important auditory factors. However, sensation levels cannot be calculated by using single-number, A-weighted sound level values. This paper describes specific steps to compute sensation levels. A unique, newly developed procedure is used, which simplifies and improves the accuracy of such computations by the use of maximum sensation levels that occur, for each intrusive-sound spectrum, within each ERB. The newly developed program ENAUDIBL makes use of ERB sensation-level values generated with some computational subroutines developed for the formerly documented program SPECTRAN.

  12. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  13. Paleoposition of the northern margin of Armorica in Late Devonian times: Paleomagnetic and rock magnetic results from the Frankenstein Intrusive Complex (Mid-German Crystalline Rise)

    Science.gov (United States)

    Zwing, Alexander; Bachtadse, Valerian

    2000-09-01

    A detailed rockmagnetic and paleomagnetic study of the Frankenstein Intrusive Complex (FIC, 363±7 Ma in age), southwestern Germany, has been carried out in order to test whether the paleomagnetic declinations within the internal parts of the European Variscides follow a common trend controlled by the structural grain of the orogen or whether the distribution of declinations follows a random pattern. In addition, new paleomagnetic data will contribute to further refine the drift history of the Armorican Terrane Assemblage during late Paleozoic times. The unmetamorphosed Frankenstein Igneous Complex forms part of the Mid-German Crystalline Rise within the Armorican Terrane Assemblage, amalgamated to Avalonia and Baltica during the Variscan orogeny, Stepwise thermal and alternating field (AF) demagnetization experiments identify four components (A, B, Cn, and Cr) of magnetization. Component A is a recent viscous overprint that parallels the present-day geomagnetic field. The high unblocking temperatures of A in some samples can be explained by the presence of multidomain magnetite. Component B is carried by hematite and is considered to be a late Carboniferous remagnetization. Components Cr and Cn, found in 110 samples from 20 sites, are antiparallel and pass a class C reversal test. Their primary origin is further supported by a contact test. Cr and Cn have maximum unblocking temperatures of up to 580°C and occasionally above over 600°C, indicating magnetite and hematite to carry the characteristic remanent magnetization. Ore microscopy revealed that primary hematite lamellae in ilmenite carry Cr and Cn and that a secondary generation of hematite is the carrier of B. The overall site mean direction of Cr and Cn (20 sites) based on endpoints and remagnetization circle analysis of 198°/40° (declination/inclination) with a 95% confidence limit (α95) of 4.9° and a precision parameter (k) of 45.0 defines a paleopole at 15°S, 9°W. When comparing to the apparent

  14. Chronology and Sources of Mesozoic Intrusive Complexes in the Xuzhou-Huainan Region, Central China:Constraints from SHRIMP Zircon U-Pb Dating

    Institute of Scientific and Technical Information of China (English)

    XU Wenliang; WANG Qinghai; LIU Xiaochun; WANG Dongyan; GUO Jinghui

    2004-01-01

    SHRIMP zircon U-Pb dating in the Liguo and Jiagou intmsives indicates that they were formed at ~130 Ma in the Early Cretaceous. Most inherited zircons in the Liguo intrusive were formed at 2509±43 Ma. Most inherited and detrital zircons in the Jiagou intrusive were formed at ~2500 Ma, ~2000 Ma and ~1800 Ma. The SHRIMP zircon U-Pb dating in two gneiss xenoliths from the Jiagou intrusive yields the ages of 2461+22 Ma and 2508±15 Ma, respectively. The dating results from inherited and detrital zircons in the intmsives and the gneiss xenoliths imply that the magmas could be derived from the partial melting of the basement of the North China Block (NCB). The magmatism is strong and extensive in the periods from 115 to 132 Ma, which is of typical bimodal characteristics. It is suggested that the lithospheric thinning in the eastern North China Block reached its peak in 115-132 Ma.

  15. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  16. Petrogenesis of permian sulfide-bearing mafic-ultramafic intrusions insoutheast Chinese Altay and east Tianshan, NW China

    OpenAIRE

    Gao, Jianfeng; 高剑峰

    2012-01-01

    The Central Asia Orogenic Belt is one of the largest accretionary orogenic belts in the world. In this belt, many sulfide‐bearing mafic‐ultramafic intrusions occur along faults, including the Kalatongke complex in southeast Chinese Altay and the Huangshandong intrusion in east Tianshan. The Kalatongke complex is a composite body including ~308Ma dioritic intrusion and 287Ma sulfide‐bearing mafic intrusion. The dioritic intrusion consists of biotite‐hornblende gabbro, diorite and quartz d...

  17. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip......Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy...

  18. Mountain Meadows Dacite: Oligocene intrusive complex that welds together the Los Angeles Basin, northwestern Peninsular Ranges, and central Transverse Ranges, California

    Science.gov (United States)

    McCulloh, Thane H.; Beyer, Larry A.; Morin, Ronald W.

    2001-01-01

    Dikes and irregular intrusive bodies of distinctive Oligocene biotite dacite and serially related hornblende latite and felsite occur widely in the central and eastern San Gabriel Mountains, southern California, and are related to the Telegraph Peak granodiorite pluton. Identical dacite is locally present beneath Middle Miocene Topanga Group Glendora Volcanics at the northeastern edge of the Los Angeles Basin, where it is termed Mountain Meadows Dacite. This study mapped the western and southwestern limits of the dacite distribution to understand the provenance of derived redeposited clasts, to perceive Neogene offsets on several large strike-slip faults, to test published palinspastic reconstructions, and to better understand the tectonic boundaries that separate contrasting pre-Tertiary rock terranes where the Peninsular Ranges meet the central and western Transverse Ranges and the Los Angeles Basin. Transported and redeposited clasts of dacite-latite occur in deformed lower Miocene and lower middle Miocene sandy conglomerates (nonmarine, nearshore, and infrequent upper bathyal) close to the northern and northeastern margins of the Los Angeles Basin for a distance of nearly 60 km. Tie-lines between distinctive source suites and clast occurrences indicate that large tracts of the ancestral San Gabriel Mountains were elevated along range-bounding faults as early as 16–15 Ma. The tie-lines prohibit very large strike-slip offsets on those faults. Transport of eroded dacite began south of the range as early as 18 Ma. Published and unpublished data about rocks adjacent to the active Santa Monica-Hollywood-Raymond oblique reverse left-lateral fault indicate that cumulative left slip totals 13–14 km and total offset postdates 7 Ma. This cumulative slip, with assembly of stratigraphic and paleogeographic data, invalidates prior estimates of 60 to 90 km of left slip on these faults beginning about 17–16 Ma. A new and different palinspastic reconstruction of a region

  19. Network intrusion detection

    Institute of Scientific and Technical Information of China (English)

    Oboile Tirelo; YANG Chun-hua

    2003-01-01

    Nowadays, network computer systems play an increasingly important role in society and economy. They have become the targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is why the computer security has become an essential concern for network administrators. Too often, intrusions wreak havoc inside LANs and the time and cost to repair the damage can grow to extreme proportions. Instead of using passive measures to fix and patch security holes once they have been exploited, it is more effective to adopt a protective approach to intrusions. In addition to the well-established intrusion prevention techniques such as data encryption and message integrity, user authentication and user authorization, as well as the avoidance of security flaws inherent to many off-the-shelf applications, intrusion detection techniques can be viewed as an addition safeguard for network computers. The paper discusses traditional and new security designs, the approach to implementing best-practice security measures and the method to trace the malicious computer attackers.

  20. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    Science, pages 576–585. Springer Berlin / Heidelberg, June 2010. • Jing Xiao-Pei and Wang Hou -Xiang. “A new immunity intrusion detection model based on...2008. • Hongying Zheng, Meiju Hou , and Yu Wang. “An efficient hybrid clustering-PSO algorithm for anomaly intrusion detection.” Journal of Software...Technology, 2(6):1790– 1799, 2010. [34] Lee, Suchul, Hyunchul Kim, Dhiman Barman, Sungryoul Lee, Chong -kwon Kim, Ted Kwon, and Yanghee Choi. “NeTraMark: a

  1. Magma chamber processes in central volcanic systems of Iceland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Tegner, Christian

    2009-01-01

    New field work and petrological investigations of the largest gabbro outcrop in Iceland, the Hvalnesfjall gabbro of the 6-7 Ma Austurhorn intrusive complex, have established a stratigraphic sequence exceeding 800 m composed of at least 8 macrorhythmic units. The bases of the macrorhythmic units...... olivine basalts from Iceland that had undergone about 20% crystallisation of olivine, plagioclase and clinopyroxene and that the macrorhythmic units formed from thin magma layers not exceeding 200-300 m. Such a "mushy" magma chamber is akin to volcanic plumbing systems in settings of high magma supply...... rate including the mid-ocean ridges and present-day magma chambers over the Iceland mantle plume. The Austurhorn central volcano likely formed in an off-rift flank zone proximal to the Iceland mantle plume during a major rift relocation....

  2. Data Mining and Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Zibusiso Dewa

    2016-01-01

    Full Text Available The rapid evolution of technology and the increased connectivity among its components, imposes new cyber-security challenges. To tackle this growing trend in computer attacks and respond threats, industry professionals and academics are joining forces in order to build Intrusion Detection Systems (IDS that combine high accuracy with low complexity and time efficiency. The present article gives an overview of existing Intrusion Detection Systems (IDS along with their main principles. Also this article argues whether data mining and its core feature which is knowledge discovery can help in creating Data mining based IDSs that can achieve higher accuracy to novel types of intrusion and demonstrate more robust behaviour compared to traditional IDSs.

  3. Wireless Intrusion Prevention Systems

    Directory of Open Access Journals (Sweden)

    Jack TIMOFTE

    2008-01-01

    Full Text Available The wireless networks have changed the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats. While an attacker needs physical access to a wired network in order to launch an attack, a wireless network allows anyone within its range to passively monitor the traffic or even start an attack. One of the countermeasures can be the use of Wireless Intrusion Prevention Systems.

  4. Experimental modelling of ground deformation associated with shallow magma intrusions

    Science.gov (United States)

    Galland, O.

    2012-04-01

    Active volcanoes experience ground deformation as a response to the dynamics of underground magmatic systems. The analysis of ground deformation patterns may provide important constraints on the dynamics and shape of the underlying volcanic plumbing systems. Nevertheless, these analyses usually take into account simplistic shapes (sphere, dykes, sills) and the results cannot be verified as the modelled systems are buried. In this contribution, I will present new results from experimental models of magma intrusion, in which both the evolution of ground deformation during intrusion and the shape of the underlying intrusion are monitored in 3D. The models consisted of a molten vegetable oil, simulating low viscosity magma, injected into cohesive fine-grained silica flour, simulating the brittle upper crust; oil injection resulted is sheet intrusions (dykes, sills and cone sheets). The initial topography in the models was flat. While the oil was intruding, the surface of the models slightly lifted up to form a smooth relief, which was mapped through time. After an initial symmetrical development, the uplifted area developed asymmetrically; at the end of the experiments, the oil always erupted at the steepest edge of the uplifted area. After the experiment, the oil solidified, the intrusion was excavated and the shape of its top surface mapped. The comparison between the uplifted zone and the underlying intrusions showed that (1) the complex shapes of the uplifted areas reflected the complex shapes of the underlying intrusions, (2) the time evolution of the uplifted zone was correlated with the evolution of the underlying intrusion, and (3) the early asymmetrical evolution of the uplifted areas can be used to predict the location of the eruption of the oil. The experimental results also suggest that complex intrusion shapes (inclined sheet, cone sheet, complex sill) may have to be considered more systematically in analyses of ground deformation patterns on volcanoes.

  5. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

    CERN Document Server

    Farid, Dewan Md; Rahman, Mohammad Zahidur; 10.5121/ijnsa.2010.2202

    2010-01-01

    In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposed algorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS). We tested the performance of our proposed algorithm with existing learn...

  6. Evidencias de procesos de fraccionamiento y mezcla de magmas en el Complejo Intrusivo Las Angosturas, Sistema de Famatina Evidence for fractionation and mixing processes in Las Angosturas Intrusive Complex, Famatina System, Argentina

    Directory of Open Access Journals (Sweden)

    Clara E. Cisterna

    2004-03-01

    Full Text Available El Complejo Intrusivo Las Angosturas constituye el norte de la sierra de Narváez, en el Sistema de Famatina, noroeste de Argentina. Se trata de granitoides de edad ordovícica inferior cuya composición varía de tonalitas y leucotonalitas a granodioritas y monzogranitos, con biotita y hornblenda. En estas rocas se destaca la abundancia de enclaves de composición granodiorítica a tonalítica y diorítica a basáltica; cuya morfología, dimensiones y relaciones con el encajante es variable e indicativa de procesos de interacción de magmas de composición contrastada. Los datos petrográficos, mineralógicos y químicos permiten indicar como mecanismo más adecuado para la evolución de la serie de granitoides una diferenciación por cristalización fraccionada juntamente con un proceso de mezcla, definido por la interacción de un magma granodiorítico con un fundido básico, de origen profundo. El emplazamiento de los granitoides se produce en un arco magmático activo, conocido como arco famatiniano, al igual que para otras intrusiones de similar posición estratigráfica en el noroeste de Argentina.Las Angosturas Intrusive Complex forms the northern segment of the sierra de Narváez, in the Famatina System of north-western Argentina. It consists of Lower Ordovician granitoids whose composition varies from tonalite and leucotonalite to granodiorite and monzogranite, with biotite and hornblende as the main mafic minerals. There remarkable abundance of granodioritic to tonalitic and dioritic to basic enclaves, whose morphology, size and relationships with the are variable is indicative of interactive processes between magmas of differing compositions. Petrographical, mineralogical and chemical studies suggest that the most appropriate mechanism for the evolution of the granitod series is one of differentiation by crystal fractionation, together with a process of mixing, involving the interaction between a granodioritic magma with a basic melt

  7. Comparison of platinum, palladium, and rhodium distributions in some layered intrusions with special reference to the late differentiates (upper zone) of the Bushveld complex, South Africa.

    Science.gov (United States)

    Page, N.J.; Von Gruenewaldt, G.; Haffty, J.; Aruscavage, P. J.

    1982-01-01

    The Stillwater, Fiskenaesset and Bushveld complexes have many similarities. The trends of the Pt/(Pt + Pd) and its correlation with Mg/(Mg + Fe2+) are presented. Presumably the Pt/(Pt + Pd) variations are related to changes in major mineral compositions. -K.A.R.

  8. Solvents and vapor intrusion pathways.

    Science.gov (United States)

    Phillips, Scott D; Krieger, Gary R; Palmer, Robert B; Waksman, Javier C

    2004-08-01

    Vapor intrusion must be recognized appropriately as a separate pathway of contamination. Although many issues resemble those of other forms of contamination (particularly its entryway, which is similar to that of radon seepage), vapor intrusion stands apart as a unique risk requiring case-specific action. This article addresses these issues and the current understanding of the most appropriate and successful remedial actions.

  9. Intrusive growth of sclerenchyma fibers

    NARCIS (Netherlands)

    Snegireva, A.V.; Ageeva, M.V.; Amenitskii, S.I.; Chernova, T.E.; Ebskamp, M.; Gorshkova, T.A.

    2010-01-01

    Intrusive growth is a type of cell elongation when the rate of its longitudinal growth is higher than that of surrounding cells; therefore, these cells intrude between the neighboring cells penetrating the middle lamella. The review considers the classical example of intrusive growth, e.g., elongati

  10. Using Jquery with Snort to Visualize Intrusion

    Directory of Open Access Journals (Sweden)

    Alaa El - Din Riad

    2012-01-01

    Full Text Available The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive / immersive technologies. Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human user. Authors have found that the representations can be quite effective at conveying the needed information and resolving the relationships extremely rapidly. To facilitate the creation of novel visualizations this paper presents a new framework that is designed with using data visualization technique by using Jquery Php for analysis and visualizes snort result data for user.

  11. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Dewan Md. Farid

    2010-04-01

    Full Text Available In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposedalgorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS. We tested the performance of our proposed algorithm with existing learning algorithms by employing on the KDD99 benchmark intrusion detection dataset. The experimental results prove that the proposed algorithm achieved high detection rates (DR andsignificant reduce false positives (FP for different types of network intrusions using limited computational resources

  12. Granitoid intrusions and related deposits

    Institute of Scientific and Technical Information of China (English)

    孟良义; 李绪俊

    1996-01-01

    Taking the Bainaimiao copper and gold deposits, Inner Mongolia and the Wushan copper deposits, Jiangxi Province as examples, a discussion is devoted to the relationship between the granitoid intrusions and related deposits from different lines of evidence: the spatial distribution, country rocks and alteration of the deposits, trace element contents and vertical zoning of elements in deposits, the metallogenic preference of granitoid intrusions, the metallogenic models and stable isotopic geology. It is concluded that the ore-bearing fluids mainly come from granitoid magmas and granitoid intrusions are closely associated with the related deposits in space.

  13. Novel Model for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Li Jia-chun; Li Zhi-tang

    2003-01-01

    It's very difficult that the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variations of attack signature. In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed.

  14. Novel Model for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Li; Jia-chun; Li; Zhi-tang

    2003-01-01

    It's very difficult that the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variation of attack signature.In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed.

  15. Intrusion detection using pattern recognition methods

    Science.gov (United States)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  16. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    Science.gov (United States)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  17. Recent advances in vapor intrusion site investigations.

    Science.gov (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart

    2017-02-22

    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed.

  18. Lithologic mapping of mafic intrusions in East Greenland using Landsat Thematic Mapper data

    Science.gov (United States)

    Naslund, H. Richard; Birnie, R. W.; Parr, J. T.

    1989-01-01

    The East Greenland Tertiary Igneous Province contains a variety of intrusive and extrusive rock types. The Skaergaard complex is the most well known of the intrusive centers. Landsat thematic mapping (TM) was used in conjunction with field spectrometer data to map these mafic intrusions. These intrusions are of interest as possible precious metal ore deposits. They are spectrally distinct from the surrounding Precambrian gneisses. However, subpixel contamination by snow, oxide surface coatings, lichen cover and severe topography limit the discrimination of lithologic units within the gabbro. Imagery of the Skaergaard and surrounding vicinity, and image processing and enhancement techniques are presented. Student theses and other publications resulting from this work are also listed.

  19. Intrusion Detection using unsupervised learning

    Directory of Open Access Journals (Sweden)

    Kusum bharti

    2010-08-01

    Full Text Available Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge datasets. But sometime kmean clustering fails to give best result because of class dominance problem and no class problem. So for removing these problems we are proposing two new algorithms for cluster to class assignment. According to our experimental results the proposed algorithm are having high precision and recall for low class instances.

  20. Building Intrusion Tolerant Software System

    Institute of Scientific and Technical Information of China (English)

    PENG Wen-ling; WANG Li-na; ZHANG Huan-guo; CHEN Wei

    2005-01-01

    In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in constructing multilevel secure software architecture, by detecting with hash value, by placing an "antigen" word next to the return address on the stack that is similar to human immune system, and by adding "Honey code" nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.

  1. Network Intrusion Detection based on GMKL Algorithm

    Directory of Open Access Journals (Sweden)

    Li Yuxiang

    2013-06-01

    Full Text Available According to the 31th statistical reports of China Internet network information center (CNNIC, by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing the information in the computer system or network we can detect any possible behaviors that can damage the availability, integrity and confidentiality of the computer resource, and make timely treatment to these behaviors which have important research significance to improve the operation environment of network and network service. At present, the Neural Network, Support Vector machine (SVM and Hidden Markov Model, Fuzzy inference and Genetic Algorithms are introduced into the research of network intrusion detection, trying to build a healthy and secure network operation environment. But most of these algorithms are based on the total sample and it also hypothesizes that the number of the sample is infinity. But in the field of network intrusion the collected data often cannot meet the above requirements. It often shows high latitudes, variability and small sample characteristics. For these data using traditional machine learning methods are hard to get ideal results. In view of this, this paper proposed a Generalized Multi-Kernel Learning method to applied to network intrusion detection. The Generalized Multi-Kernel Learning method can be well applied to large scale sample data, dimension complex, containing a large number of heterogeneous information and so on. The experimental results show that applying GMKL to network attack detection has high classification precision and low abnormal practical precision.

  2. Final OSWER Vapor Intrusion Guidance

    Science.gov (United States)

    EPA is preparing to finalize its guidance on assessing and addressing vapor intrusion, which is defined as migration of volatile constituents from contaminated media in the subsurface (soil or groundwater) into the indoor environment. In November 2002, EPA issued draft guidance o...

  3. Experiences with network intrusion detection

    NARCIS (Netherlands)

    Coolen, R.; Luiijf, H.A.M.; Geloven, W.J.F. van; Bakker, E.A.

    2002-01-01

    This paper describes our experience with several commercial Network Intrusion Detection Systems (NIDSs)deployed in a network connected to the Internet. Specific problems in the operation of NIDS are highlighted, and a number of solutions to identified problems will be presented. Finally, we shall pr

  4. Occurrence of seawater intrusion overshoot

    NARCIS (Netherlands)

    Morgan, L.K.; Bakker, M.; Werner, A.D.

    2015-01-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position. Recent

  5. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O;

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  6. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...

  7. 江西相山火山-侵入杂岩及其包体稀土元素地球化学%REE-Geochemistry of Mesozoic Volcanic-Intrusive Complex and Dark Inclusions in Xiangshan District,Jiangxi Pronvince

    Institute of Scientific and Technical Information of China (English)

    段芸; 赵连泽; 范洪海; 王德滋

    2001-01-01

    ,which are very c lose to the upper crust value in southeast China,while that for the dioritic enclaves is -6.5,whichindicates involvement of a deeper source component.   Mesozoic vocanic-intrusive complex in Xianshan district was generat ed by the pa rtial melting of sialic lithosphere and belongs to the S-type in origin,whi ch is consistent with the popular point of view.However,discovery of diorit ic enclaves implies possible participation of lower crust oreven upper mantle component.

  8. Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

    OpenAIRE

    Jiang, Hayang; Xie, Gaogang; Salamatian, Kavé; Mathy, Laurent

    2013-01-01

    Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. Both hardware accelerated and parallel software-based NIDS solutions, based on commodity multi-core and GPU processors, have been proposed to overcome these challenges. Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. ...

  9. Zircon Recycling in Arc Intrusions

    Science.gov (United States)

    Miller, J.; Barth, A.; Matzel, J.; Wooden, J.; Burgess, S.

    2008-12-01

    Recycling of zircon has been well established in arc intrusions and arc volcanoes, but a better understanding of where and how zircons are recycled can help illuminate how arc magma systems are constructed. To that end, we are conducting age, trace element (including Ti-in-zircon temperatures; TzrnTi) and isotopic studies of zircons from the Late Cretaceous (95-85 Ma) Tuolumne Intrusive Suite (TIS) in the Sierra Nevada Batholith (CA). Within the TIS zircons inherited from ancient basement sources and/or distinctly older host rocks are uncommon, but recycled zircon antecrysts from earlier periods of TIS-related magmatism are common and conspicuous in the inner and two most voluminous units of the TIS, the Half Dome and Cathedral Peak Granodiorites. All TIS units have low bulk Zr ([Zr]825°C), [Zr] in the TIS is a factor of 2 to 3 lower than saturation values. Low [Zr] in TIS rocks might be attributed to a very limited supply of zircon in the source, by disequilibrium melting and rapid melt extraction [1], by melting reactions involving formation of other phases that can incorporate appreciable Zr [2], or by removal of zircon at an earlier stage of magma evolution. Based on a preliminary compilation of literature data, low [Zr] is common to Late Cretaceous N.A. Cordilleran granodioritic/tonalitic intrusions (typically Tzrnsat [3]. A corollary is that slightly older zircon antecrysts that are common in the inner units of the TIS could be considered inherited if they are derived from remelting of slightly older intrusions. Remelting at such low temperatures in the arc would require a source of external water. Refs: [1] Sawyer, J.Pet 32:701-738; [2] Fraser et al, Geology 25:607-610; [3] Harrison et al, Geology 35:635- 638

  10. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  11. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  12. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2015-09-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  13. Classification and Importance of Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Rajasekaran K

    2012-08-01

    Full Text Available An intrusion detection system (IDS is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Due to a growing number of intrusion events and also because the Internet and local networks have become so ubiquitous, organizations are increasingly implementing various systems that monitor IT security breaches. This includes an overview of the classification of intrusion detection systems and introduces the reader to some fundamental concepts of IDS methodology: audit trail analysis and on-the-fly processing as well as anomaly detection and signature detection approaches. This research paper discusses the primary intrusion detection techniques and the classification of intrusion Detection system.

  14. Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting

    CERN Document Server

    Tran, Tich Phuoc; Tran, Dat; Nguyen, Cuong Duc

    2009-01-01

    This article applies Machine Learning techniques to solve Intrusion Detection problems within computer networks. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for security experts, that is, currently available defense systems suffer from low detection capability and high number of false alarms. To overcome such performance limitations, we propose a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), which integrates an adaptive boosting technique and a semi parametric neural network to obtain good tradeoff between accuracy and generality. As the result, learning bias and generalization variance can be significantly minimized. Substantial experiments on KDD 99 intrusion benchmark indicate that our model outperforms other state of the art learning algorithms, with significantly improved detection accuracy, minimal false alarms and relatively small computational complexity.

  15. Research on artificial neural network intrusion detection photochemistry based on the improved wavelet analysis and transformation

    Science.gov (United States)

    Li, Hong; Ding, Xue

    2017-03-01

    This paper combines wavelet analysis and wavelet transform theory with artificial neural network, through the pretreatment on point feature attributes before in intrusion detection, to make them suitable for improvement of wavelet neural network. The whole intrusion classification model gets the better adaptability, self-learning ability, greatly enhances the wavelet neural network for solving the problem of field detection invasion, reduces storage space, contributes to improve the performance of the constructed neural network, and reduces the training time. Finally the results of the KDDCup99 data set simulation experiment shows that, this method reduces the complexity of constructing wavelet neural network, but also ensures the accuracy of the intrusion classification.

  16. Association Rules Applied to Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    We discuss the basic intrusion detection techniques, and focus on how to apply association rules to intrusion detection. Begin with analyzing some close relations between user's behaviors, we discuss the mining algorithm of association rules and apply to detect anomaly in IDS. Moreover, according to the characteristic of intrusion detection, we optimize the mining algorithm of association rules, and use fuzzy logic to improve the system performance.

  17. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    Pabitra Nath

    2010-04-01

    An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the refractive index of the medium affects the reflectance of the incident light signal and thus modulates the back-reflected signal. Refractive index variation as small as 0.002 RIU can be measured using the present technique. The advantages of the technique are its simplicity, cost efficiency and usefulness in monitoring refractive indices of acidic solutions.

  18. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country.

  19. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  20. Vapour Intrusion into Buildings - A Literature Review

    Science.gov (United States)

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  1. Intrusion Preventing System using Intrusion Detection System Decision Tree Data Mining

    Directory of Open Access Journals (Sweden)

    Syurahbil

    2009-01-01

    Full Text Available Problem statement: To distinguish the activities of the network traffic that the intrusion and normal is very difficult and to need much time consuming. An analyst must review all the data that large and wide to find the sequence of intrusion on the network connection. Therefore, it needs a way that can detect network intrusion to reflect the current network traffics. Approach: In this study, a novel method to find intrusion characteristic for IDS using decision tree machine learning of data mining technique was proposed. Method used to generate of rules is classification by ID3 algorithm of decision tree. Results: These rules can determine of intrusion characteristics then to implement in the firewall policy rules as prevention. Conclusion: Combination of IDS and firewall so-called the IPS, so that besides detecting the existence of intrusion also can execute by doing deny of intrusion as prevention.

  2. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    Energy Technology Data Exchange (ETDEWEB)

    Redus, Kenneth, S.

    2003-02-26

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R&D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex.

  3. Analysis of transient saltwater intrusion in costal aquifers

    Science.gov (United States)

    Chang, Y.; Yeh, H.

    2009-12-01

    In a costal aquifer, the seawater intrusion is a classic environmental and economical problem in groundwater hydrology. For modeling this phenomenon, the Henry’s formulation was usually adopted to describe the coupled system of flow and transport equations with variable density. However, it is an arduous task to solve such a problem due to the complexity of the coupled governing equations. For practical applicability, the mixed boundary condition which differs from the Dirichlet boundary condition at the coastal side in Henry’s problem is considered in this study. A depth of interface between freshwater and seawater is specified at the coast boundary and the Neumann and Dirichlet conditions are used, respectively, to describe the costal boundary. The perturbation method with a small parameter is used to decouple the groundwater flow and transport equations and derive the solution for the transient saltwater intrusion model. The model will be compared with some results obtained from finite element simulations.

  4. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  5. Deep intrusions, lateral magma transport and related uplift at ocean island volcanoes

    Science.gov (United States)

    Klügel, Andreas; Longpré, Marc-Antoine; García-Cañada, Laura; Stix, John

    2015-12-01

    Oceanic intraplate volcanoes grow by accumulation of erupted material as well as by coeval or discrete magmatic intrusions. Dykes and other intrusive bodies within volcanic edifices are comparatively well studied, but intrusive processes deep beneath the volcanoes remain elusive. Although there is geological evidence for deep magmatic intrusions contributing to volcano growth through uplift, this has rarely been demonstrated by real-time monitoring. Here we use geophysical and petrological data from El Hierro, Canary Islands, to show that intrusions from the mantle and subhorizontal transport of magma within the oceanic crust result in rapid endogenous island growth. Seismicity and ground deformation associated with a submarine eruption in 2011-2012 reveal deep subhorizontal intrusive sheets (sills), which have caused island-scale uplift of tens of centimetres. The pre-eruptive intrusions migrated 15-20 km laterally within the lower oceanic crust, opening pathways that were subsequently used by the erupted magmas to ascend from the mantle to the surface. During six post-eruptive episodes between 2012 and 2014, further sill intrusions into the lower crust and upper mantle have caused magma to migrate up to 20 km laterally, resulting in magma accumulation exceeding that of the pre-eruptive phase. A comparison of geobarometric data for the 2011-2012 El Hierro eruption with data for other Atlantic intraplate volcanoes shows similar bimodal pressure distributions, suggesting that eruptive phases are commonly accompanied by deep intrusions of sills and lateral magma transport. These processes add significant material to the oceanic crust, cause uplift, and are thus fundamentally important for the growth and evolution of volcanic islands. We suggest that the development of such a magma accumulation zone in the lower oceanic crust begins early during volcano evolution, and is a consequence of increasing size and complexity of the mantle reservoir system, and potentially

  6. A Study and Comparative Analysis of Conditional Random Fields for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Deepa Guleria

    2012-07-01

    Full Text Available Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for security experts, that is, currently available defense systems suffer from low detection capability and high number of false alarms. An intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper we study the Machine Learning and data mining techniques to solve Intrusion Detection problems within computer networks and compare the various approaches with conditional random fields and address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach.

  7. The role of estrogen in intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Chervonsky, Liza; Felmingham, Kim L; Bryant, Richard A

    2013-11-01

    Intrusive memories are highly vivid, emotional and involuntary recollections which cause significant distress across psychological disorders including posttraumatic disorder (PTSD). Recent evidence has potentially extended our understanding of the development of intrusive memories by identifying biological factors which significantly impact on memories for emotionally arousing stimuli. This study investigated the role of stress on the development of intrusions for negative and neutral images, and indexed the potential contributions of sex (estrogen and progesterone) and stress (noradrenaline and cortisol) hormones. Whilst viewing the images, half the participants underwent a cold pressor stress (CPS) procedure to induce stress while the control participants immersed their hands in warm water. Saliva samples were collected to index estrogen, progesterone and noradrenergic and cortisol response. Participants (55 university students, 26 men, 29 women) viewed a series of negatively arousing and neutral images. Participants completed recall and intrusions measures 2 days later. Negative images resulted in greater recall and more intrusions than neutral images. In the cold water condition females recalled fewer neutral memories than males. Cortisol increase predicted decreased recall of negative memories in males, and estrogen predicted increased intrusions of negative images in women. These findings are consistent with evidence that circulating levels of ovarian hormones influence memory for emotionally arousing events, and provides the first evidence of the influence of sex hormones on intrusive memories. These results provide one possible explanation for the higher incidence of anxiety disorders in women.

  8. Signature Based Intrusion Detection System Using SNORT

    Directory of Open Access Journals (Sweden)

    Vinod Kumar

    2012-11-01

    Full Text Available Now a day’s Intrusion Detection systems plays very important role in Network security. As the use of internet is growing rapidly the possibility of attack is also increasing in that ratio. People are using signature based IDS’s. Snort is mostly used signature based IDS because of it is open source software. World widely it is used in intrusion detection and prevention domain. Basic analysis and security engine (BASE is also used to see the alerts generated by Snort. In the paper we have implementation the signature based intrusion detection using Snort. Our work will help to novel user to understand the concept of Snort based IDS.

  9. Internet Intrusion Detection System Service in a Cloud

    Directory of Open Access Journals (Sweden)

    Amirreza Zarrabi

    2012-09-01

    Full Text Available Intrusion Detection Systems (IDS have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and signs of attack. IDS aroused the concern of users as an important computer network security technology. In recent times, with the advent of Cloud Computing, the concepts of Software as a Service (SaaS, where vendors provide key software products as services over the internet that can be accessed by users to perform complex tasks, have become increasingly popular. Cloud Computing is a method to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. We introduce a Cloud Intrusion Detection System Services (CIDSS which is developed based on Cloud Computing and can make up for the deficiency of traditional intrusion detection, and proved to be great scalable. CIDSS can be utilized to overcome the critical challenge of keeping the client secure from cyber attacks while benefit the features which are presented by Cloud Computing technology.

  10. Grey-theory based intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    Qin Boping; Zhou Xianwei; Yang Jun; Song Cunyi

    2006-01-01

    To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling.With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international.

  11. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  12. A phased approach to network intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1991-01-01

    This paper describes the design and development of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The development of this system is based on three basic assumptions: (1) that statistical analysis of computer system and user activates may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, (2) that expert system techniques can be applied to security auditing and intrusion detection, and (3) that successful intrusion detection may take place while monitoring a limited set of network activities. The Network Anomaly Detection and Intrusion Reporter (NADIR) design intent was to duplicate and improve the audit record review activities which had previously been undertaken by security personnel, to replace the manual review of audit logs with a near realtime expert system.

  13. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš

    2012-12-01

    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  14. Immune Based Intrusion Detector Generating Algorithm

    Institute of Scientific and Technical Information of China (English)

    DONG Xiao-mei; YU Ge; XIANG Guang

    2005-01-01

    Immune-based intrusion detection approaches are studied. The methods of constructing self set and generating mature detectors are researched and improved. A binary encoding based self set construction method is applied. First,the traditional mature detector generating algorithm is improved to generate mature detectors and detect intrusions faster. Then, a novel mature detector generating algorithm is proposed based on the negative selection mechanism. Accord ing to the algorithm, less mature detectors are needed to detect the abnormal activities in the network. Therefore, the speed of generating mature detectors and intrusion detection is improved. By comparing with those based on existing algo rithms, the intrusion detection system based on the algorithm has higher speed and accuracy.

  15. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  16. Intrusion Detection System Using Advanced Honeypots

    CERN Document Server

    Singh, Ram Kumar

    2009-01-01

    The exponential growth of Internet traffic has made public servers increasingly vulnerable to unauthorized accesses and intrusions. In addition to maintaining low latency for the client, filtering unauthorized accesses has become one of the major concerns of a server maintainer. This implementation of an Intrusion Detection System distinguishes between the traffic coming from clients and the traffic originated from the attackers, in an attempt to simultaneously mitigate the problems of both latency and security. We then present the results of a series of stress and scalability tests, and suggest a number of potential uses for such a system. As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. Using honeypots provides effective solution to increase the security.

  17. A system for distributed intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  18. Cluster based Intrusion Detection System for Manets

    Directory of Open Access Journals (Sweden)

    Nisha Dang

    2012-07-01

    Full Text Available Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for Manets. They communicate in dynamic topology which continuously changes as nodes are not stable. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. But still there is some scope of malicious actions. So, Intrusion detection systems are proposed to detect any intruder in the network and its malicious activities. Cluster based intrusion detection system is also designed to restrict the intruders activities in clusters of mobile nodes. In clusters each node run some intrusion detection code to detect local as well as global intrusion. In this paper we have taken insight of intrusion detection systems and different attacks on Manet security. Then we proposed how overhead involved in cluster based intrusion detection system can be reduced.

  19. Analysis on the thermal history and uplift process of Zijinshan intrusive complex in the eastern Ordos basin%鄂尔多斯盆地东缘紫金山侵入岩热演化史与隆升过程分析

    Institute of Scientific and Technical Information of China (English)

    陈刚; 丁超; 徐黎明; 章辉若; 胡延旭; 杨甫; 李楠; 毛小妮

    2012-01-01

    运用LA-ICP MS锆石U-Pb定年、角闪石和黑云母40Ar-39Ar定年、锆石和磷灰石裂变径迹(FT)分析等构造热年代学研究方法,探讨分析了鄂尔多斯盆地东缘紫金山侵入岩的热演化历史及其抬升冷却过程.紫金山侵入岩主要由次透辉二长岩和正长岩组成,锆石U-Pb测年给出的岩浆侵位-结晶年龄为136.7 Ma,角闪石和黑云母40Ar-39Ar测年获得的岩浆结晶-固结年龄集中在133.1~130.4 Ma,表明紫金山侵入岩主要形成于早白垩世的136.7~130.4 Ma.侵入岩T-t轨迹与磷灰石FT模拟热史路径综合揭示了鄂尔多斯盆地东缘紫金山侵入岩抬升冷却的三个构造热演化阶段:1)136~120 Ma侵位岩浆结晶-固结阶段,岩体平均冷却速率高达52℃/Ma;2)120~30 Ma岩体相对缓慢抬升冷却阶段,平均抬升冷却速率为2.5℃/Ma;3) 30 Ma以来岩体快速抬升冷却阶段,平均抬升冷却速率3.6℃/Ma,尤以近10 Ma以来的快速抬升冷却最为显著,抬升冷却速率接近7℃/Ma.结合区域构造动力学环境分析认为,鄂尔多斯盆地东缘的紫金山岩浆活动与华北克拉通早白垩世构造体制转换过程的大规模岩浆活动属于相同时期、统一构造作用的产物,早白垩世末期以来由慢到快的差异抬升过程主要受控于华北克拉通东部(古)太平洋体系与其西南部特提斯体系之间相互联合、彼此消长的构造作用.%Thermochronological data of in-situ zircon U-Pb, hornblende and biotite 40Ar-39Ar, and zircon and apatite fission track (FT) are presented in this paper for studying the thermal history and uplift-cooling process of Zijinshan intrusive complex at the eastern margin of the Ordos basin in the central North China Craton (NCC). Alkaline intrusive rocks dominate the complex with the diopside monzonite and syenite as the dating samples in this work. Zircon U-Pb dating of the monzonite provides the initial crystallization age of the Early magmatic intrusion

  20. Markov Graph Model Computation and Its Application to Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Markov model is usually selected as the base model of user action in the intrusion detection system (IDS). However, the performance of the IDS depends on the status space of Markov model and it will degrade as the space dimension grows. Here, Markov Graph Model (MGM) is proposed to handle this issue. Specification of the model is described, and several methods for probability computation with MGM are also presented. Based on MGM,algorithms for building user model and predicting user action are presented. And the performance of these algorithms such as computing complexity, prediction accuracy, and storage requirement of MGM are analyzed.

  1. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  2. Modal Composition and Age of Intrusions in North-Central and Northeast Nevada

    Science.gov (United States)

    du Bray, Edward A.; Crafford, A. Elizabeth Jones

    2007-01-01

    Introduction Data presented in this report characterize igneous intrusions of north-central and northeast Nevada and were compiled as part of the Metallogeny of the Great Basin project conducted by the U.S. Geological Survey (USGS) between 2001 and 2007. The compilation pertains to the area bounded by lats 38.5 and 42 N., long 118.5 W., and the Nevada-Utah border (fig. 1). The area contains numerous large plutons and smaller stocks but also contains equally numerous smaller, shallowly emplaced intrusions, including dikes, sills, and endogenous dome complexes. Igneous intrusions (hereafter, intrusions) of multiple ages are major constituents of the geologic framework of north-central and northeast Nevada (Stewart and Carlson, 1978). Mesozoic and Cenozoic intrusions are particularly numerous and considered to be related to subduction along the west edge of the North American plate during this time. Henry and Ressel (2000) and Ressel and others (2000) have highlighted the association between magmatism and ore deposits along the Carlin trend. Similarly, Theodore (2000) has demonstrated the association between intrusions and ore deposits in the Battle Mountain area. Decades of geologic investigations in north-central and northeast Nevada (hereafter, the study area) demonstrate that most hydrothermal ore deposits are spatially, and probably temporally and genetically, associated with intrusions. Because of these associations, studies of many individual intrusions have been conducted, including those by a large number of Master's and Doctoral thesis students (particularly University of Nevada at Reno students and associated faculty), economic geologists working on behalf of exploration and mining companies, and USGS earth scientists. Although the volume of study area intrusions is large and many are associated with ore deposits, no synthesis of available data that characterize these rocks has been assembled. Compilations that have been produced for intrusions in Nevada

  3. Cretaceous volcanic-intrusive magmatism in western Guangdong and its geological significance

    Institute of Scientific and Technical Information of China (English)

    GENG; Hongyan; XU; Xisheng; S.Y.O'Reilly; ZHAO; Ming; SUN; Tao

    2006-01-01

    Systematic zircon LA-ICPMS U-Pb dating reveals that Cretaceous volcanic-intrusive activities developed in western Guangdong. Representative volcanic rocks, i.e. Maanshan and Zhougongding rhyodacites, have zircon U-Pb isotopic ages of 100±1 Ma, and the intrusive ones including the Deqing monzonitic granite body and the Xinghua granodiorite body in the Shidong complex, as well as the Tiaocun granodiorite body in the Guangping complex yield ages of 99±2 Ma, ca.100 Ma, and 104±3 Ma respectively. The biotite-granites of the Shidong complex main body (461±35 Ma) and that of the Guangping complex (444±6 Ma) are Caledonian. In spite of the big time interval between Cretaceous volcanic-intrusive magmatisms and Caledonian intrusive ones, both of them are characterized by enrichment in Rb, Th, Ce, Zr, Hf, Sm, depletion in Ba, Nb, Ta, P, Ti, Eu, and weakly REE tetrad effect. Eu negative anomalies are: Cretaceous volcanic rocks (Eu/Eu*=0.74), Cretaceous intrusive rocks (Eu/Eu*=0.35-0.58), Caledonian biotite granites (Eu/Eu*=0.31-0.34). Studies of Sr-Nd isotope data show that all these igneous rocks have high initial 87Sr/86Sr ratios (0.7105-0.7518), and low εNd(t) values (-7.23--11.39) with their Nd two-stage model ages ranging from 1.6-2.0 Ga, which suggest that they all derived from the Proterozoic crustal basement of southeast China.The occurrence of Cretaceous volcanic-intrusive magmatisms in western Guangdong is related with the important lithospheric extension event in southeast China (including Nanling region) at ca. 100 Ma.The "volcanic line" defined by the large scale Mesozoic intermediate-acidic volcanic magmatisms in southeast China may further extend to the southwest margin of Nanling region.

  4. U-Pb age in zircon of intrusive granite at Acopiara complex, Crystal region, domain Central Ceara, Brazil; Idade U-PB em zircao de granito intrusivo no Complexo Acopiara, Regiao de Cristais, Dominio Ceara Central

    Energy Technology Data Exchange (ETDEWEB)

    Neri, T.F.O.; Hamelak, G.M.S.; Azevedo, L.R.; Mattos, I.C.; Verissimo, C.U.V.; Nogueira Neto, J.A., E-mail: neri@ufc.br [Universidade Federal do Ceara (UFC), Fortaleza (Brazil). Departamento de Geologia; Lima, M.N. [Universidade Federal de Goias (UFGO), Goiania, GO (Brazil). Curso de Geologia

    2015-07-01

    Granitic body mineralogically composed by two micas, located at Crystal region, Ceara Central domain and intruded into lithotypes from Acopiara complex, provided an age of ∼526 Ma, indicating important period of magma generation of granitic composition associated with crustal anatexia, during Paleozoic.

  5. A New Method for Intrusion Detection using Manifold Learning Algorithm

    Directory of Open Access Journals (Sweden)

    Guoping Hou

    2013-07-01

    Full Text Available Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN has proven to be powerful for the intrusion detection. However, very little work has discussed the optimization of the input intrusion features for the ANN. Generally, the intrusion features contain a certain number of useless features, which is useless for the intrusion detection. Large dimensions of the feature data will also affect the intrusion detection performance of the ANN. In order to improve the ANN performance, a new approach for network intrusion detection based on nonlinear feature dimension reduction and ANN is proposed in this work. The manifold learning algorithm was used to reduce the intrusion feature vector. Then an ANN classifier was employed to identify the intrusion. The efficiency of the proposed method was evaluated with the real intrusion data. The test result shows that the proposed approach has good intrusion detection performance.

  6. Isotopic age dating of the alkaline intrusive complex and its related molybdenum polymetallic deposit at Hekanzi, western Liaoning Province%辽西河坎子碱性侵入杂岩体及钼多金属矿床同位素年代学研究

    Institute of Scientific and Technical Information of China (English)

    刘勇; 聂凤军; 方俊钦

    2012-01-01

    The newly discovered Hekanzi deposit is a medium-size porphyry molybdenum deposit in western Liaoning Province. Intrusive complexes are widely distributed in the study area, with the Mesozoic alkaline and calc-alka-line rocks being the most developed alkaline rocks. They intruded into the Precambrian and Paleozoic volcanic-sedimentary rocks in the forms of batholiths, stocks, and dykes. Alkaline intrusive rocks are mainly miascite, alkaline syenite and alkaline diabase. The calc-alkaline rocks are mainly granite porphyry, granodiorite, biotite granite and K-feldspar granite. Isotopic ages of the Hekanzi alkaline granite and its related Mo polymetallic deposit have been determined. The rock-forming age of the biotite-orthoclase granite is (235.3 ± 1.0) Ma with MSWD value of 0.68. Re-Os isotopic data of six molybdenite separates define a correlation line corresponding to an age of (224.0 ?1.3) Ma with MSWD value of 0.72. The metallic minerals in the ore are pyrite, chalcopy-rite, molybdenite, pyrrhotite, marcasite and a little scheetine. Gangue minerals are mainly calcite, fluorite, garnet, serpentine, peridotite, dolomite, feldspar, plagioclase and quartz. The NE-trending, NS-trending and NW-trending fault zones are widely distributed in the alkaline intrusive complex and its related molybdenum polymetallic deposit at Hekanzi.%对辽西河坎子地区与碱性杂岩体相关的钼多金属矿床进行了同位素年代学研究.所获黑云母正长花岗岩锆石LA-ICP-MS U-Pb同位素加权平均年龄为(235.3±1.0) Ma,MSWD值为0.68;河坎子钼多金属矿床内辉钼矿的Re-Os同位素等时线年龄为(224.0±1.3) Ma,MSWD值为0.72.碱性杂岩体与相关的钼多金属矿床具有密切的空间关系,两者的形成时间亦比较接近,据此可推测,河坎子碱性杂岩体与相关的钼多金属矿床均为印支期构造-岩浆作用及流体活动的产物.印支期内频繁的岩浆-热液活动为该地区内钼、铜、金多金属元素的活

  7. Effective analysis of cloud based intrusion detection system

    Directory of Open Access Journals (Sweden)

    Sanjay Ram

    2012-08-01

    Full Text Available The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS. People are paid more attention on intrusion detection which as an important computer network security technology. According to the development trend of intrusion detection, detecting all kinds of intrusions effectively requires a global view of the monitored network, Here, discuss about new intrusion detection mechanism based on cloud computing, which can make up for the deficiency of traditional intrusion detection, and proved to be great scalable.

  8. An Adaptive Clustering Algorithm for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    QIU Juli

    2007-01-01

    In this paper,we introduce an adaptive clustering algorithm for intrusion detection based on wavecluster which was introduced by Gholamhosein in 1999 and used with success in image processing.Because of the non-stationary characteristic of network traffic,we extend and develop an adaptive wavecluster algorithm for intrusion detection.Using the multiresolution property of wavelet transforms,we can effectively identify arbitrarily shaped clusters at different scales and degrees of detail,moreover,applying wavelet transform removes the noise from the original feature space and make more accurate cluster found.Experimental results on KDD-99 intrusion detection dataset show the efficiency and accuracy of this algorithm.A detection rate above 96% and a false alarm rate below 3% are achieved.

  9. Intrusion Detection System: Security Monitoring System

    Directory of Open Access Journals (Sweden)

    ShabnamNoorani,

    2015-10-01

    Full Text Available An intrusion detection system (IDS is an ad hoc security solution to protect flawed computer systems. It works like a burglar alarm that goes off if someone tampers with or manages to get past other security mechanisms such as authentication mechanisms and firewalls. An Intrusion Detection System (IDS is a device or a software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.Intrusion Detection System (IDS has been used as a vital instrument in defending the network from this malicious or abnormal activity..In this paper we are comparing host based and network based IDS and various types of attacks possible on IDS.

  10. An Overview on Intrusion Detection in Manet

    Directory of Open Access Journals (Sweden)

    Rajesh D. Wagh

    2015-05-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring of mobile devices network connected without wires and hence MANET has become a very popular technology now days. A MANETS are the networks that are building, when some mobile nodes come in the mobility range of each other for data transfer and communication. In MANET, nodes are not stable hence the communication topology is not stable due to this vulnerable for attacks. MANET devices are connected via wireless links without using an existing network infrastructure or centralized administration due to which MANETs are not able to diverse types of attacks and intrusions. Hence intrusion detection has attracted many researchers. This paper gives an overview and different methods to detect intrusion in MANET.

  11. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  12. Design of Secure Distributed Intrusion Detection Systems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Intrusion Detection System (IDS) have received a great deal of attention because of their excellent ability of preventing network incidents. Recently, many efficient approaches have been proposed to improve detection ability of IDS. While the self-protection ability of IDS is relatively worse and easy to be exploited by attackers, this paper gives a scheme of Securely Distributed Intrusion Detection System (SDIDS). This system adopts special measurements to enforce the security of IDS components. A new secure mechanism combining role-based access control and attribute certificate is used to resist attack to communication.

  13. Adaptive Genetic Algorithm Model for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    K. S. Anil Kumar

    2012-09-01

    Full Text Available Intrusion detection systems are intelligent systems designed to identify and prevent the misuse of computer networks and systems. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Thus the emerging network security systems need be part of the life system and this ispossible only by embedding knowledge into the network. The Adaptive Genetic Algorithm Model - IDS comprising of K-Means clustering Algorithm, Genetic Algorithm and Neural Network techniques. Thetechnique is tested using multitude of background knowledge sets in DARPA network traffic datasets.

  14. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  15. Intrusion Detection Approach Using Connectionist Expert System

    Institute of Scientific and Technical Information of China (English)

    MA Rui; LIU Yu-shu; DU Yan-hui

    2005-01-01

    In order to improve the detection efficiency of rule-based expert systems, an intrusion detection approach using connectionist expert system is proposed. The approach converts the AND/OR nodes into the corresponding neurons, adopts the three-layered feed forward network with full interconnection between layers,translates the feature values into the continuous values belong to the interval [0, 1 ], shows the confidence degree about intrusion detection rules using the weight values of the neural networks and makes uncertain inference with sigmoid function. Compared with the rule-based expert system, the neural network expert system improves the inference efficiency.

  16. Intrusion Detection Using Cost-Sensitive Classification

    CERN Document Server

    Mitrokotsa, Aikaterini; Douligeris, Christos

    2008-01-01

    Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not detecting at- tacks. For this reason, we examine how cost-sensitive classification methods can be used in Intrusion Detection systems. The performance of the approach is evaluated under different experimental conditions, cost matrices and different classification models, in terms of expected cost, as well as detection and false alarm rates. We find that even under unfavourable conditions, cost-sensitive classification can improve performance significantly, if only slightly.

  17. Complexity

    CERN Document Server

    Gershenson, Carlos

    2011-01-01

    The term complexity derives etymologically from the Latin plexus, which means interwoven. Intuitively, this implies that something complex is composed by elements that are difficult to separate. This difficulty arises from the relevant interactions that take place between components. This lack of separability is at odds with the classical scientific method - which has been used since the times of Galileo, Newton, Descartes, and Laplace - and has also influenced philosophy and engineering. In recent decades, the scientific study of complexity and complex systems has proposed a paradigm shift in science and philosophy, proposing novel methods that take into account relevant interactions.

  18. Application of Data Mining to Network Intrusion Detection: Classifier Selection Model

    CERN Document Server

    Nguyen, Huy

    2010-01-01

    As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attention from the research community. The uncertainty to explore if certain algorithms perform better for certain attack classes constitutes the motivation for the reported herein. In this paper, we evaluate performance of a comprehensive set of classifier algorithms using KDD99 dataset. Based on evaluation results, best algorithms for each attack category is chosen and two classifier algorithm selection models are proposed. The simulation result comparison indicates that noticeable performance improvement and real-time intrusion detection can be achieved as we apply the proposed models to detect different kinds of network at...

  19. Management of multiple intrusive luxative injuries: A case report with 7-year follow-up

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2014-01-01

    Full Text Available This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 7 years. Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 7 years, no clinical or radiographic pathology was detected.

  20. Chemical Observations of a Polar Vortex Intrusion

    Science.gov (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  1. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2014-01-01

    indicating a possible role of sulfide in the sulfur nutrition beside the detoxification function. Our results suggest different adaptations of Z. marina to reduced sediments and sulfide intrusion ranging from bacterial and chemical reoxidation of sulfide to sulfate to incorporation of sulfide into organic...

  2. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight wee

  3. Intrusion Detection System Visualization of Network Alerts

    Science.gov (United States)

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  4. Data Mining Approaches for Intrusion Detection

    Science.gov (United States)

    2007-11-02

    In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to use data mining techniques...two general data mining algorithms that we have implemented: the association rules algorithm and the frequent episodes algorithm. These algorithms can

  5. Simulation of network intrusion detection system with GPenSim

    OpenAIRE

    2011-01-01

    In recent years, network has penetrated into every aspect of our life with its rapid growth and popularization. More and more serious network security problems have occurred together with this process, especially network intrusion problem. It has seriously affected the normal use of network, so research of network intrusion detection has become one of the hottest research areas. This thesis simulated a network intrusion detection system based on particle filter to solve the network intrusion ...

  6. Efficiency of Svm and Pca to Enhance Intrusion Detection System

    OpenAIRE

    Soukaena Hassan Hashem

    2013-01-01

    Intrusion detection system (IDS) is a system that gathers and analyzes information from various areas within a computer or a network to identify attacks made against these components. This research proposed an Intrusion Detection Model (IDM) for detection intrusion attempts, the proposal is a hybrid IDM because it considers both features of network packets and host features that are sensitive to most intrusions. The dataset used to build the hybrid IDM is the proposed HybD (Hybrid Dataset) da...

  7. Towards Multi-Stage Intrusion Detection using IP Flow Records

    OpenAIRE

    Muhammad Fahad Umer; Muhammad Sher; Imran Khan

    2016-01-01

    Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packet-based intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for attack detection. IP flow records contain summarized traffic information. However, flow data is very ...

  8. How stratospheric are deep stratospheric intrusions?

    Science.gov (United States)

    Trickl, T.; Vogelmann, H.; Giehl, H.; Scheel, H.-E.; Sprenger, M.; Stohl, A.

    2014-09-01

    Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l.) next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH) and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The CO mixing ratio in

  9. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-06-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 and 2004. These investigations had been based on data filtering by using low relative humidity and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. For quantifying the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dew-point-mirror instrument at the Zugspitze summit station rarely registers relative humidity (RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are dryer by roughly one order of magnitude than indicated in the in-situ measurements. Even in thin layers frequently RH values clearly below 1% have been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO and, thus, the intrusion air mass originate in the shallow "mixing layer" around the

  10. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-09-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The

  11. NADIR (Network Anomaly Detection and Intrusion Reporter): A prototype network intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1990-01-01

    The Network Anomaly Detection and Intrusion Reporter (NADIR) is an expert system which is intended to provide real-time security auditing for intrusion and misuse detection at Los Alamos National Laboratory's Integrated Computing Network (ICN). It is based on three basic assumptions: that statistical analysis of computer system and user activities may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, that expert system techniques can be applied to security auditing and intrusion detection, and that successful intrusion detection may take place while monitoring a limited set of network activities such as user authentication and access control, file movement and storage, and job scheduling. NADIR has been developed to employ these basic concepts while monitoring the audited activities of more than 8000 ICN users.

  12. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  13. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  14. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  15. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  16. A Comprehensive Study in Data Mining Frameworks for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    R.Venkatesan

    2012-12-01

    Full Text Available Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on expanding every day. An Intrusion Detection System (IDS is a system for detecting intrusions and reporting to the authority or to the network administration. Data mining techniques have been successfully applied in many fields like Network Management, Education, Science, Business, Manufacturing, Process control, and Fraud Detection. Data Mining for IDS is the technique which can be used mainly to identify unknown attacks and to raise alarms when security violations are detected. The purpose of this survey paper is to describe the methods/ techniques which are being used for Intrusion Detection based on Data mining concepts and the designed frame works for the same. We are also going to review the related works for intrusion detection.

  17. ISDTM:An Intrusion Signatures Description Temporal Model

    Institute of Scientific and Technical Information of China (English)

    OuYangMing-guang; ZhouYang-bo

    2003-01-01

    ISDTM, based on an augmented Allen's interval temporal logic (ITL) and first-order predicate calculus, is a formal temporal model for representing intrusion signatures.It is augmented with some real time extensions which enhance the expressivity. Intrusion scenarios usually are the set of events and system states, wherethe temporal sequence is their basic relation. Intrusion signatures description, therefore, is to represent such temporal relations in a sense. While representing these signatures, ISDTM decomposes the intrusion process into the sequence of events according to their relevant intervals, and then specifies network states in these Intervals. The uncertain intrusion signatures as well as basic temporal modes of events, which consist of the parallel mode,the sequential mode and the hybrid mode, can be succinctly and naturally represented in ISDTM. Mode chart is the visualization of intrusion signatures in ISDTM, which makes the formulas more readable. The intrusion signatures descriptions in ISDTM have advantages of compact construct, concise syntax, scalability and easy implementation.

  18. The fate of mafic and ultramafic intrusions in the continental crust

    Science.gov (United States)

    Roman, Alberto; Jaupart, Claude

    2016-11-01

    Geochemical and petrological data indicate that the bulk continental crust results from the fractionation of basaltic magmas followed by the foundering of residual mafic cumulates. Structural and geological evidence for foundering has been elusive and it is argued that it lies in the shapes of mafic intrusions that have been preserved in the crust. Numerical calculations of visco-elasto-plastic deformation induced by a dense intrusive body in continental crust have been carried out for a wide range of physical conditions. Three regimes are defined on the basis of the amount of dense material that remains at the original emplacement level as well as on the shape of the residual body. With strong encasing rocks, the intrusion deforms weakly in a sagging regime characterized by downwarping of the floor. At the other extreme, the intrusion sinks through weak surroundings, leaving behind a very small volume of material. In an intermediate regime, the intrusion does not sink wholesale and undergoes a dramatic change of shape. A residual body is preserved with a shape that depends on the aspect ratio of the initial intrusion. For aspect ratios of order one, the residual body is funnel-shaped above a thin and deep vertical extension. For the small aspect ratios that typify large igneous complexes such as the Bushveld, South Africa, the residual body is characterized by thick peripheral lobes with inward-dipping igneous layers and a thinner central area that has lost some of the basal cumulates. The transitions between these regimes depend on the rheology and temperature of encasing rocks.

  19. A Survey on Intrusion Detection in MANETs.

    Science.gov (United States)

    BakeyaLakshmi, P.; Santhi, K.

    2012-10-01

    A mobile ad hoc network is an infrastructureless network that changes its links dynamically, which makes routing in MANET a difficult process. As Mobile Ad-Hoc Network (MANET) has become a very important technology, research concerning its security problem, especially, in intrusion detection has attracted many researchers. Feature selection methodology plays a vital role in the data analysis process. PCA is used to analyze the selected features. This is because, redundant and irrelevant features often reduce performance of the intrusion detection system. It performs better in increasing speed and predictive accuracy. This survey aims to select and analyze the network features using principal component analysis. While performing various experiments, normal and attack states are simulated and the results for the selected features are analyzed.

  20. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....../or liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  1. Intrusion Detection in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadya El MOUSSAID

    2017-01-01

    Full Text Available The recent advances in electronic and robotics industry have enabled the manufacturing of sensors capable of measuring a set of application-oriented parameters and transmit them back to the base station for analysis purposes. These sensors are widely used in many applications including the healthcare systems forming though a Wireless Body Sensor Networks. The medical data must be highly secured and possible intrusion has to be fully detected to proceed with the prevention phase. In this paper, we propose a new intrusion superframe schema for 802.15.6 standard to detect the cloning attack. The results proved the efficiency of our technique in detecting this type of attack based on 802.15.6 parameters performances coupled with frequency switching at the radio model.

  2. An immune based dynamic intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    LI Tao

    2005-01-01

    With the dynamic description method for self and antigen, and the concept of dynamic immune tolerance for lymphocytes in network-security domain presented in this paper, a new immune based dynamic intrusion detection model (Idid) is proposed. In Idid, the dynamic models and the corresponding recursive equations of the lifecycle of mature lymphocytes, and the immune memory are built. Therefore, the problem of the dynamic description of self and nonself in computer immune systems is solved, and the defect of the low efficiency of mature lymphocyte generating in traditional computer immune systems is overcome. Simulations of this model are performed, and the comparison experiment results show that the proposed dynamic intrusion detection model has a better adaptability than the traditional methods.

  3. Multilayer Statistical Intrusion Detection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Noureddine Boudriga

    2008-12-01

    Full Text Available The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs. This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  4. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  5. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  6. A Survey on VANET Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Mohammed ERRITALI

    2013-04-01

    Full Text Available In recent years, the security issues on Vehicular ad hoc networks (VANETs have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security services offered by dedicated equipment such as firewalls and authentication servers. Attackcountermeasures such as digital signature and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have limited prevention in general, and they are designed for a set of known attacks. They are unlikely to avoid most recent attacks that are designed to circumvent existing security measures. For this reason, there is a need of second technique to “detect and notify” these newer attacks, i.e. “intrusion detection”. This article aims to present and classifycurrent techniques of Intrusion Detection System (IDS aware VANETs.

  7. Sensing Danger: Innate Immunology for Intrusion Detection

    CERN Document Server

    Uwe, Aickelin

    2008-01-01

    The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms.

  8. A Review of Vapor Intrusion Models

    OpenAIRE

    Yao, Yijun; Suuberg, Eric M.

    2013-01-01

    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulatio...

  9. Geochemical Characteristics of Rare Earth Elements of Guidong Granitic Complex and Relationship with Uranium Mineralization

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhanshi; Hua Renmin; Liu Xiaodong; Deng Ping; Wu Lieqin

    2007-01-01

    Guidong granitic complex is constituted by Luxi intrusion, Xiazhuang intrusion, Maofeng intrusion, Sundong intrusion, Aizi intrusion and Siqian intrusion, which emplaced in Indosinian and early Yanshanian Periods. These intrusions varied from each other not only in major element content, aluminium saturation index, but also in values of ΣREE, δEu, and LREE/HREE, (La/Yb)N, (La/Sm)N and (Gd/Yb)N. The Maofeng intrusion, which has the closest relationship with uranium mineralization, belongs to strong peraluminous granites. Having undergone much intense fluid-rock interaction, it is characterized by typical M-type tetrad effects and lowest values of ΣREE, δEu, LREE/HREE, (La/Yb)N, (La/Sm)N and (Gd/Yb)N ratios than other studied intrusions.

  10. Intrusion Detection with Multi-Connected Representation

    Directory of Open Access Journals (Sweden)

    Abdelkader Khobzaoui

    2016-01-01

    Full Text Available Recently, considerable attention has been given to data mining techniques to improve the performance of intrusion detection systems (IDS. This has led to the application of various classification and clustering techniques for the purpose of intrusion detection. Most of them assume that behaviors, both normal and intrusions, are represented implicitly by connected classes. We state that such assumption isn't evident and is a source of the low detection rate and false alarm. This paper proposes a suitable method able to reach high detection rate and overcomes the disadvantages of conventional approaches which consider that behaviors must be closed to connected representation only. The main strategy of the proposed method is to segment sufficiently each behavior representation by connected subsets called natural classes which are used, with a suitable metric, as tools to build the expected classifier. The results show that the proposed model has many qualities compared to conventional models; especially regarding those have used DARPA data set for testing the effectiveness of their methods. The proposed model provides decreased rates both for false negative rates and for false positives.

  11. A BOOSTING APPROACH FOR INTRUSION DETECTION

    Institute of Scientific and Technical Information of China (English)

    Zan Xin; Han Jiuqiang; Zhang Junjie; Zheng Qinghua; Han Chongzhao

    2007-01-01

    Intrusion detection can be essentially regarded as a classification problem,namely,distinguishing normal profiles from intrusive behaviors.This paper introduces boosting classification algorithm into the area of intrusion detection to learn attack signatures.Decision tree algorithm is used as simple base learner of boosting algorithm.Furthermore,this paper employs the Principle Component Analysis(PCA)approach,an effective data reduction approach,to extract the key attribute set from the original high-dimensional network traffic data.KDD CUP 99 data set is used in these exDeriments to demonstrate that boosting algorithm can greatly improve the clas.sification accuracy of weak learners by combining a number of simple"weak learners".In our experiments,the error rate of training phase of boosting algorithm is reduced from 30.2%to 8%after 10 iterations.Besides,this Daper also compares boosting algorithm with Support Vector Machine(SVM)algorithm and shows that the classification accuracy of boosting algorithm is little better than SVM algorithm's.However,the generalization ability of SVM algorithm is better than boosting algorithm.

  12. Intrusion detection using rough set classification

    Institute of Scientific and Technical Information of China (English)

    张连华; 张冠华; 郁郎; 张洁; 白英彩

    2004-01-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of"IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  13. Artificial Intrusion Detection Techniques: A Survey

    Directory of Open Access Journals (Sweden)

    Ashutosh Gupta

    2014-08-01

    Full Text Available Networking has become the most integral part of our cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, we find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately. Many methods have been devised which are really very useful but they can only detect the attacks which already took place. These methods will always fail whenever there is a foreign attack which is not famous or which is new to the networking world. In order to detect new intrusions in the network, researchers have devised artificial intelligence technique for Intrusion detection prevention system. In this paper we are going to cover what types evolutionary techniques have been devised and their significance and modification.

  14. Intrusion detection using rough set classification

    Institute of Scientific and Technical Information of China (English)

    张连华; 张冠华; 郁郎; 张洁; 白英彩

    2004-01-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modem learning algorithm,is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of"IF-THEN" rules,which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  15. Count out your intrusions: effects of verbal encoding on intrusive memories.

    Science.gov (United States)

    Krans, Julie; Naring, Gerard; Becker, Eni S

    2009-11-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development. Participants viewed an aversive film under one of three conditions: counting backwards in 3s ("verbal interference"), verbalising emotions and thoughts ("verbal enhancement"), or without an extra task. A dual-process account of PTSD would predict that verbal interference would increase intrusion frequency compared to no task, whereas verbal enhancement would lead to a decrease. In contrast, mainstream memory theory predicts a decrease in intrusion frequency from any concurrent task that diverts attention away from the trauma film. The main finding was that the verbal interference task led to a decrease in intrusive memories of the film compared to the other two conditions. This finding does not support a dual-process account of PTSD, but is in line with general theories of memory and attention.

  16. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    CERN Document Server

    Gomez, Andres; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machin...

  17. Immune System Approaches to Intrusion Detection - A Review

    CERN Document Server

    Kim, Jungwon; Aickelin, Uwe; Greensmith, Julie; Tedesco, Gianni; Twycross, Jamie

    2008-01-01

    The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.

  18. Orthopedic intrusion of premaxilla with distraction devices before alveolar bone grafting in patients with bilateral cleft lip and palate.

    Science.gov (United States)

    Liou, Eric Jein-Wein; Chen, Philip K T; Huang, C Shing; Chen, Y Ray

    2004-03-01

    Surgical repositioning of the downward displaced premaxilla in bilateral cleft lip and palate patients remains a controversial and perplexing issue because of its detrimental effects on the growth of the premaxilla. The purpose of this prospective clinical study was to introduce and evaluate the treatment results of an innovative technique for nonsurgically intruding the downward displaced premaxilla. Eight consecutive cases of bilateral cleft lip and palate at the age of mixed dentition were included for the correction of their premaxillary deformities. A pair of intraoral tooth-borne distraction devices was used for the orthopedic intrusion. Serial lateral and posteroanterior cephalometric radiographs were taken periodically for evaluating the growth of the premaxilla 1 year before the intrusion, changes during the intrusion, and growth/relapse up to 1 year after the intrusion. There was no overgrowth of the premaxilla or overeruption of the maxillary incisors during the 1-year observing period before the orthopedic intrusion. The treatment results revealed that the downward displaced premaxillae were all corrected within 1 month. Cephalometrically, 46 percent of the correction resulted from a true orthopedic intrusion and another 54 percent from a dentoalveolar effect in which the maxillary incisors were intruded and the premaxillary dentoalveolus was shortened. The cephalometric evaluations also implied that what occurred during the orthopedic intrusion was mostly the sutural contraction osteogenesis/osteolysis in the vomeropremaxillary suture combined with slightly mechanical upward displacement of the vomeronasal septum complex and nasal bones. The orthopedic intrusion of the premaxilla with distraction devices is an effective nonsurgical method for correcting the downward displaced premaxilla before alveolar bone grafting in patients with bilateral cleft lip and palate, and the results remained stable after 1 year.

  19. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas

    2014-07-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  20. Frequency of intrusive luxation in deciduous teeth and its effects.

    Science.gov (United States)

    Carvalho, Vivian; Jacomo, Diana Ribeiro; Campos, Vera

    2010-08-01

    The aims of this study were three-fold: First, to determine the prevalence of partial and total intrusion of the primary anterior teeth. Second, to investigate the sequelae of total and partial intrusive luxation in the primary anterior teeth and in their successors and finally, to establish whether the sequelae on both deciduous and permanent teeth were related to the child's age at the time of the intrusion. Data collected from records of 169 boys and 138 girls, all between the ages of zero and 10 years, who were undergoing treatment during the period of March 1996 to December 2004. The sample was composed of 753 traumatized deciduous teeth, of which 221 presented intrusive luxation injury. Children with ages ranging from one to 4 years were the most affected with falls being the main cause of intrusion. Of all intruded teeth 128 (57.9%) were totally intruded and 93 (42.1%) partially. Pulp necrosis/premature loss and color change were the most frequent sequelae in both total and partial intrusions. Concerning permanent dentition, the most common disturbances were color change and/or enamel hypoplasia. Both types of intrusion caused eruption disturbance. Total intrusion was the most frequent type of intrusive luxation. There was no significant correlation between the child's age at the time of intrusion and the frequency of subsequent sequela on primary injured teeth (P = 0.035), between the age at the time of injury and the developmental disturbances on permanent teeth (P = 0.140).

  1. Paleomagnetism of Siberian Trap Intrusions: Implications for the Timing and Intensity of the Magmatic Activity

    Science.gov (United States)

    Latyshev, Anton; Veselovskiy, Roman; Mirsayanova, Elina; Ulyahina, Polina

    2016-04-01

    Large Igneous Provinces (LIPs) are the areas of the exceptional interest due to associated Cu-Ni-Pt deposits, problems of the causal link between volcanic hazards and mass extinctions, and questions about mantle plume dynamics. High-precise U-Pb and 40Ar/39Ar dating determined the duration of the main phase of the most voluminous Siberian Trap province formation as 1-2 Ma (Kamo et al., 2003; Reichow et al., 2008). Recent paleomagnetic investigations demonstrated the predominance of pulsating volcanic activity during LIPs formation (Chenet et al., 2009; Pavlov et al., 2015). We perform the results of detailed paleomagnetic study of intrusive complexes from Tunguska syncline and Angara-Taseeva depression (Siberian Trap province). Our data taken together with the previous paleomagnetic results from trap intrusions revealed two different styles of magmatic activity. In the central part of Tunguska syncline emplacement of was rather even without sharp bursts. Local intrusive events coeval to volcanic eruptions took place within spatially limited areas. In contrast, in the periphery of Tunguska syncline several short and powerful peaks of magmatic activity happened on the background of weak prolonged magmatism. These events resulted in huge Padunsky, Tulunsky and some other sills in the southern part of the Siberian platform. According to our paleomagnetic data, the duration of such pulses did not exceed 10-100 thousand years. Taking into account our paleomagnetic data and recent U-Pb ages for Siberian trap intrusions from (Burgess, Bowring, 2015), it is possible to correlate intrusive complexes with the volcanic section. In particular, formation the largest Tulunsky and Padunsky sills happened right after the termination of the main phase of Permian-Triassic volcanic activity on the Siberian platform. This work was supported by grants RFBR # 16-35-60114 and 15-35-20599 and Ministry of Education and Science of the Russian Federation (grant 14.Z50.31.0017).

  2. Constraints on the formation of geochemically variable plagiogranite intrusions in the Troodos Ophiolite, Cyprus

    Science.gov (United States)

    Freund, Sarah; Haase, Karsten M.; Keith, Manuel; Beier, Christoph; Garbe-Schönberg, Dieter

    2014-02-01

    The geochemistry and petrology of tonalitic to trondhjemitic samples ( n = 85) from eight different plagiogranite intrusions at the gabbro/sheeted dyke transition of the Troodos Ophiolite were studied in order to determine their petrogenetic relationship to the mafic plutonic section and the lava pile. The plagiogranitic rocks have higher SiO2 contents than the majority of the glasses of the Troodos lava pile, but lie on a continuation of the chemical trends defined by the extrusive rocks, indicating that the shallow intrusions generally represent crystallised magmas. We define three different groups of plagiogranites in the Troodos Ophiolite based on different incompatible element contents and ratios. The first and most common plagiogranite group has geochemical similarities to the tholeiitic lavas forming the lavas and sheeted dyke complex in the Troodos crust, implying that these magmas formed at a spreading axis. The second plagiogranite group occurs in one intrusion that is chemically related to late-stage and off-axis boninitic lavas and dykes. One intrusion next to the Arakapas fault zone consists of incompatible element-enriched plagiogranites which are unrelated to any known mafic crustal rocks. The similarities of incompatible element ratios between plagiogranites, lavas and mafic plutonic rocks, the continuous chemical trends defined by plagiogranites and mafic rocks, as well as incompatible element modelling results, all suggest that shallow fractional crystallisation is the dominant process responsible for formation of the felsic magmas.

  3. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  4. Rapid laccolith intrusion driven by explosive volcanic eruption

    Science.gov (United States)

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-11-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ~0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ~20-200 m and overpressures (~1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  5. Multi-agent cooperative intrusion response in mobile adhoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Zou Futai; Jiang Xinghao; Li Jianhua

    2007-01-01

    The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.

  6. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems

    CERN Document Server

    Greensmith, Julie; Twycross, Jamie

    2010-01-01

    In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, anti-virus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological parad...

  7. Performance Assessment of Network Intrusion-Alert Prediction

    Science.gov (United States)

    2012-09-01

    personnel information, credit card information theft, etc. The focus has shifted to attacks that can cause significant damage. Intrusion detection...Maintaining access Miscellanous Reverse engineering RFID tools Table 3. BackTrack Intrusion-detection System/Intrusion-prevention System Penetration...high processing power. 22 Machine 1’s network interface card connected to the mirroring port on the first port of the Ethernet switch. Machine 2’s

  8. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    failures or defects. Anomaly: refers to malicious and intrusive event plus abnormal yet non-intrusive behavior including (faulty and noisy /messy...detection: missed detection in the presence of a real intrusion. Note: Any large network is a very “ noisy ” environment even at the packet level. 3.0.4... Hotelling , pages 448–485, 1960. [266] J. Tukey. Exploratory Data Analysis. Addision-Wesley, Reading,MA, 1977. [267] A. Tversky and D. Kahneman. Loss

  9. Intelligent Intrusion Detection System Model Using Rough Neural Network

    Institute of Scientific and Technical Information of China (English)

    YAN Huai-zhi; HU Chang-zhen; TAN Hui-min

    2005-01-01

    A model of intelligent intrusion detection based on rough neural network (RNN), which combines the neural network and rough set, is presented. It works by capturing network packets to identify network intrusions or malicious attacks using RNN with sub-nets. The sub-net is constructed by detection-oriented signatures extracted using rough set theory to detect different intrusions. It is proved that RNN detection method has the merits of adaptive, high universality,high convergence speed, easy upgrading and management.

  10. Forensic Analysis of Windows Registry Against Intrusion

    Directory of Open Access Journals (Sweden)

    Haoyang Xie

    2012-03-01

    Full Text Available Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains allof the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys thathave forensic values. This paper also discusses how the Windows Registry forensic keys can be applied in intrusion detection.

  11. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  12. Types of saltwater intrusion of the Changjiang Estuary

    Institute of Scientific and Technical Information of China (English)

    茅志昌; 沈焕庭; JamesT.Liu; D.Eisma

    2001-01-01

    The Changjiang Estuary is characterized by multi-order bifurcations, unsteady submerged sandbars, mid-channel sandbars, creeks and riffles. The following four types of saltwater intrusion are found: (1) direct intrusion from the sea; (2) intrusion during tidal flooding; (3) intrusion from tidal flats overflow; and (4) salt water coming upstream through other waterways. These result in a complicated temporal and spatial salinity distribution. A high chlorinity concentration zone exists from the Liuhekou to the Sidongkou along the South Branch. The salinity during neap tide or ordinary tide is higher than during spring tide.

  13. Zircon geochronology of intrusive rocks from Cap de Creus, eastern Pyrenees

    OpenAIRE

    2014-01-01

    New petrological and U–Pb zircon geochronological information has been obtained from intrusive plutonic rocks and migmatites from the Cap de Creus massif (Eastern Pyrenees) in order to constrain the timing of the thermal and tectonic evolution of this northeasternmost segment of Iberia during late Palaeozoic time. Zircons from a deformed syntectonic quartz diorite from the northern Cap de Creus Tudela migmatitic complex yield a mean age of 298.8±3.8 Ma. A syntectonic granodiori...

  14. An Excel Macro to Plot the HFE-Diagram to Identify Sea Water Intrusion Phases.

    Science.gov (United States)

    Giménez-Forcada, Elena; Sánchez San Román, F Javier

    2015-01-01

    A hydrochemical facies evolution diagram (HFE-D) is a multirectangular diagram, which is a useful tool in the interpretation of sea water intrusion processes. This method note describes a simple method for generating an HFE-D plot using the spreadsheet software package, Microsoft Excel. The code was applied to groundwater from the alluvial coastal plain of Grosseto (Tuscany, Italy), which is characterized by a complex salinization process in which sea water mixes with sulfate or bicarbonate recharge water.

  15. Advanced Trace Pattern For Computer Intrusion Discovery

    CERN Document Server

    Rahayu, S Siti; Shahrin, S; Zaki, M Mohd; Faizal, M A; Zaheera, Z A

    2010-01-01

    The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker's and victim's perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker's, victim's and multi-step (attacker/victim)'s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forens...

  16. A Bayesian Networks in Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    M. Mehdi

    2007-01-01

    Full Text Available Intrusion detection systems (IDSs have been widely used to overcome security threats in computer networks. Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms caused by incorrect classification of events in current systems. We propose a new approach of an anomaly Intrusion detection system (IDS. It consists of building a reference behaviour model and the use of a Bayesian classification procedure associated to unsupervised learning algorithm to evaluate the deviation between current and reference behaviour. Continuous re-estimation of model parameters allows for real time operation. The use of recursive Log-likelihood and entropy estimation as a measure for monitoring model degradation related with behavior changes and the associated model update show that the accuracy of the event classification process is significantly improved using our proposed approach for reducing the missing-alarm.

  17. Characterizing and Improving Distributed Intrusion Detection Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  18. Research on the dry intrusion accompanying the low vortex precipitation

    Institute of Scientific and Technical Information of China (English)

    YAO; XiuPing; WU; GuoXiong; ZHAO; BingKe; YU; YuBin; YANG; GuiMing

    2007-01-01

    By employing the 6.7μm satellite vapor cloud images and NCEP/NCAR 1°×1° reanalysis datasets, the characteristics and mechanism of the dry intrusion, as well as its impacts on the low vortex precipitation at the Meiyu front are explored in this paper. It is found that the formation,development and maintenance of the low vortex precipitation at the Meiyu front are closely related to the evolution of the dry intrusion. The dry intrusion is characterized by high potential vorticity (PV), low humidity and cold air. The dry intrusion exhibits as an obvious dark zone on vapor cloud images, an area in which atmospheric relative humidity is lower than 60%. However, the features of the dry intrusion on the vapor images are clearer than that of the humidity field, for the former is the digital vapor cloud images with high temporal and spatial resolution, and it can be used to explore the finer characteristics of the development, evolution and supplement of the intrusion during the development of the low vortex. The dry intrusion impacts accompanying the low vortex precipitation at the Meiyu front come from all levels of the troposphere, with the strongest intrusion located at the upper troposphere. The dry and cold air intrudes the vicinity of the low vortex from the upper isentropic surface to the lower one, slanting east-ward from lower to higher level. The low vortex precipitation region is usually situated in front of the dry intrusion where the relative humidity gradient is higher. The research also reveals that the mechanism of the dry intrusion is that the high potential vorticity descends from the upper troposphere to the lower level, therefore, the dry intrusion can be used as an important index of the high PV forcing. To the west of the low vortex precipitation, the upper level northerlies descend across the isentropic surface, then the dry cold advection can trigger the instable development in the midlow troposphere. The dry intru-sion enhances the low vortex

  19. Ordovician Intrusive-related Gold-Copper Mineralization in West-Central New South Wales, Australia

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Three major types of Ordovician intrusive-related gold-copper deposits are recognized in central-west New South Wales,, Australia: porphyry, skam and high sulphidation epithermal deposits.These deposits are mainly distributed within two Ordovician volcano-intrusive belts of the Lachlan Fold Be1t: the Orange-Wellington Belt and the Parkes-Narromine Belt. Available isotopic age data suggest that mineralization of the three types of deposits is essentially coeval with the Ordovician intrusive rocks (480-430 Ma). Porphyry gold-copper deposits can be further divided into two groups. The first group is associated with monzoniteshowing shoshonitic features represented by Cadia and Goonumbla. The second group is associated with diorite and dacite, including the Copper Hill and Cargo gold-copper deposits. Gold skarn is associated with Late Ordovician (430-439 Ma) monzonitic intrusive complexes in the Junction Reefs area (Sheahan-Grants, Frenchmans, and Cornishmens), Endeavour 6, 7 and 44, Big and Little Cadia. The epithermal gold deposits with high sulphidation including Gidginbung (Temora) and Peak Hill mainly occur within Ordovician andesite and volcaniclastic rocks, and are associated with advanced argillic alteration. Available isotopic age data indicate that both alteration and mineralization of the porphyry, skam and epithermal gold-copper deposits are broadly coeval with the Late Ordovician hoshonitic mangmatism, which is thought to result from the melting of sub-continental lithosphere caused by Palaeozoic subduction events. The Ordovician intrusive-related gold-copper deposits are restricted to two longitudinal parallel volcano-intrusive belts, rarely extending outside them. Diagonal intra-belt trends of mineralization are common, particularly at the intersections of longitudinal and transverse (oblique) fault/fracture zones basedon the authors'review of available geological data. The locations of these gold-copper deposits are obviously influenced by transverse

  20. New developments in the laser-2-focus technique for non-intrusive velocity measurements in gasturbine components

    Science.gov (United States)

    Schodl, Richard; Förster, Wolfgang

    1992-04-01

    Further improvement of aircraft engines with respect to fuel consumption and emission reduction requires costly and difficult investigations which are impossible without modern measuring techniques. The Institute of Propulsion Technology is primarily concerned with investigations on turbomachinery components (e.g. compressors, combustors, turbines), where very often extremely difficult conditions prevail (high flow velocities, complex geometries, rotating flow channels). For this reason non-intrusive measuring techniques play an important role. The Laser-2-Focus technique for non-intrusive velocity measurements developed in the institute has won high regard worldwide. Developments in optics and electronics have resulted in this technique having a considerably greater area of application.

  1. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, Marco; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  2. Enhancing Battlemind: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2014-05-01

    with IT  Posttraumatic Checklist (PCL)  Depression Anxiety Stress Scale (DASS)  Insomnia Severity Index (ISI)  Several other measures were...Commitment Therapy; meditation ; skill building Coping With Intrusive Thoughts 2 Coping with Intrusive Thoughts: Skills Everyone Can Use Submitted...studied in depression (Hall et al., 1997; Wenzlaff, 2002; Wenzlaff, Wegner, & Roper, 1988), anxiety disorders (Gross & Eifert, 1990; Ladouceur et al

  3. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities.

  4. An improved unsupervised clustering-based intrusion detection method

    Science.gov (United States)

    Hai, Yong J.; Wu, Yu; Wang, Guo Y.

    2005-03-01

    Practical Intrusion Detection Systems (IDSs) based on data mining are facing two key problems, discovering intrusion knowledge from real-time network data, and automatically updating them when new intrusions appear. Most data mining algorithms work on labeled data. In order to set up basic data set for mining, huge volumes of network data need to be collected and labeled manually. In fact, it is rather difficult and impractical to label intrusions, which has been a big restrict for current IDSs and has led to limited ability of identifying all kinds of intrusion types. An improved unsupervised clustering-based intrusion model working on unlabeled training data is introduced. In this model, center of a cluster is defined and used as substitution of this cluster. Then all cluster centers are adopted to detect intrusions. Testing on data sets of KDDCUP"99, experimental results demonstrate that our method has good performance in detection rate. Furthermore, the incremental-learning method is adopted to detect those unknown-type intrusions and it decreases false positive rate.

  5. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas

    2014-06-01

    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  6. Network Security using Linux Intrusion Detection System / IJORCS

    Directory of Open Access Journals (Sweden)

    Arul Anitha

    2011-12-01

    Full Text Available Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic being a Linux based Intrusion Detection System(LIDs, takes the advantage of the security of a Linux box and secures the other nodes in the perimeter of the network. It is capable of detecting intrusions and probes as and when they occur and capable of responding to “already” successful attacks, thus causing minimal or no damage to the entire network. For better performance, this Linux Intrusion Detection System should be part of a defense in depth strategy such as Firewall and Intrusion Prevention.

  7. Multi-core Processors based Network Intrusion Detection Method

    Directory of Open Access Journals (Sweden)

    Ziqian Wan

    2012-09-01

    Full Text Available It is becoming increasingly hard to build an intrusion detection system (IDS, because of the higher traffic throughput and the rising sophistication of attacking. Scale will be an important issue to address in the intrusion detection area. For hardware, tomorrow’s performance gains will come from multi-core architectures in which a number of CPU executes concurrently. We take the advantage of multi-core processors’ full power for intrusion detection in this work. We present an intrusion detection system based on the Snort open-source IDS that exploits the computational power of MIPS multi-core architecture to offload the costly pattern matching operations from the CPU, and thus increase the system’s processing throughput. A preliminary experiment demonstrates the potential of this system. The experiment results indicate that this method can be used effectively to speed up intrusion detection systems.

  8. Intrusion-Tolerant Based Survivable Model of Database System

    Institute of Scientific and Technical Information of China (English)

    ZHUJianming; WANGChao; MAJianfeng

    2005-01-01

    Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Intrusiontolerant systems extend traditional secure systems to be able to survive or operate through attacks, thus it is an approach for achieving survivability. This paper proposes survivable model of database system based on intrusion-tolerant mechanisms. The model is built on three layers security architecture, to defense intrusion at the outer layer, to detect intrusion at the middle layer, and to tolerate intrusion at the inner layer. We utilize the techniques of both redundancy and diversity and threshold secret sharing schemes to implement the survivability of database and to protect confidential data from compromised servers in the presence of intrusions. Comparing with the existing schemes, our approach has realized the security and robustness for the key functions of a database system by using the integration security strategy and multiple security measures.

  9. Intrusive Thoughts Mediate the Association between Neuroticism and Cognitive Function.

    Science.gov (United States)

    Munoz, Elizabeth; Sliwinski, Martin J; Smyth, Joshua M; Almeida, David M; King, Heather A

    2013-11-01

    Although research has established a negative association between trait neuroticism and cognition, little is known about the mechanisms that underlie this relationship. We examined the tendency to experience intrusive thoughts and negative affect as potential mediators of the relationship between neuroticism and cognitive performance. We hypothesized that the tendency to experience intrusive thoughts reflects ineffective attentional control and would account for the relationship between neuroticism and cognitive performance over and above the mediating effect of negative affect. Three hundred seventeen adults (Mage =49.43) completed a series of attention-demanding cognitive tasks as well as self-report measures of intrusive thoughts, negative affect, and neuroticism. Intrusive thoughts mediated the association between trait neuroticism and cognitive performance beyond negative affect. These findings are consistent with the hypothesis that the tendency to experience intrusive thoughts is a mechanism through which trait neuroticism influences cognitive performance.

  10. Boron isotope method for study of seawater intrusion

    Institute of Scientific and Technical Information of China (English)

    肖应凯; 尹德忠; 刘卫国; 王庆忠; 魏海珍

    2001-01-01

    A distinct difference in boron isotopes between seawater and terrestrial water is emphasized by δ11B values reported for seawater and groundwater, with an average of 38.8‰ and in the range of -8.9‰ to 9.8‰, respectively. The isotopic composition of boron in groundwater can be used to quantify seawater intrusion and identify intrusion types, e.g. seawater or brine intrusions with different chemical and isotopic characteristics, by using the relation of δ11B and chloride concentration. The feasibility of utilizing boron isotope in groundwater for studying seawater intrusion in Laizhou Bay Region, China, is reported in this study, which shows that boron isotope is a useful and excellent tool for the study of seawater intrusion.

  11. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  12. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    Science.gov (United States)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  13. Multimodal Evolution Approach to Multidimensional Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Weng Guang'an; Yu Shengsheng; Zhou Jingli

    2006-01-01

    An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors,respectively, and experiments performed on two real data sets ( machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stability, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones.

  14. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  15. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  16. One-Step Fabrication of Microchannels with Integrated Three Dimensional Features by Hot Intrusion Embossing

    Science.gov (United States)

    Debono, Mike; Voicu, Dan; Pousti, Mohammad; Safdar, Muhammad; Young, Robert; Kumacheva, Eugenia; Greener, Jesse

    2016-01-01

    We build on the concept of hot intrusion embossing to develop a one-step fabrication method for thermoplastic microfluidic channels containing integrated three-dimensional features. This was accomplished with simple, rapid-to-fabricate imprint templates containing microcavities that locally control the intrusion of heated thermoplastic based on their cross-sectional geometries. The use of circular, rectangular and triangular cavity geometries was demonstrated for the purposes of forming posts, multi-focal length microlense arrays, walls, steps, tapered features and three-dimensional serpentine microchannels. Process variables, such as temperature and pressure, controlled feature dimensions without affecting the overall microchannel geometry. The approach was demonstrated for polycarbonate, cycloolefin copolymer and polystyrene, but in principle is applicable to any thermoplastic. The approach is a step forward towards rapid fabrication of complex, robust, microfluidic platforms with integrated multi-functional elements. PMID:27916849

  17. One-Step Fabrication of Microchannels with Integrated Three Dimensional Features by Hot Intrusion Embossing

    Directory of Open Access Journals (Sweden)

    Mike Debono

    2016-11-01

    Full Text Available We build on the concept of hot intrusion embossing to develop a one-step fabrication method for thermoplastic microfluidic channels containing integrated three-dimensional features. This was accomplished with simple, rapid-to-fabricate imprint templates containing microcavities that locally control the intrusion of heated thermoplastic based on their cross-sectional geometries. The use of circular, rectangular and triangular cavity geometries was demonstrated for the purposes of forming posts, multi-focal length microlense arrays, walls, steps, tapered features and three-dimensional serpentine microchannels. Process variables, such as temperature and pressure, controlled feature dimensions without affecting the overall microchannel geometry. The approach was demonstrated for polycarbonate, cycloolefin copolymer and polystyrene, but in principle is applicable to any thermoplastic. The approach is a step forward towards rapid fabrication of complex, robust, microfluidic platforms with integrated multi-functional elements.

  18. Intrusion Triggering of Explosive Eruptions: Lessons Learned from EYJAFJALLAJÖKULL 2010 Eruptions and Crustal Deformation Studies

    Science.gov (United States)

    Sigmundsson, F.; Hreinsdottir, S.; Hooper, A. J.; Arnadottir, T.; Pedersen, R.; Roberts, M. J.; Oskarsson, N.; Auriac, A.; Decriem, J.; Einarsson, P.; Geirsson, H.; Hensch, M.; Ofeigsson, B. G.; Sturkell, E. C.; Sveinbjornsson, H.; Feigl, K.

    2010-12-01

    Gradual inflation of magma chambers often precedes eruptions at highly active volcanoes. During eruptions, rapid deflation occurs as magma flows out and pressure is reduced. Less is known about the deformation style at moderately active volcanoes, such as Eyjafjallajökull, Iceland, where an explosive summit eruption of trachyandesite beginning on 14 April 2010 caused exceptional disruption to air traffic. This eruption was preceded by an effusive flank eruption of olivine basalt from 20 March - 12 April 2010. Geodetic and seismic observations revealed the growth of an intrusive complex in the roots of the volcano during three months prior to eruptions. After initial horizontal growth, modelling indicates both horizontal and sub-vertical growth in three weeks prior the first eruption. The behaviour is attributed to subsurface variations in crustal stress and strength originating from complicated volcano foundations. A low-density layer may capture magma allowing pressure to build before an intrusion can ascend towards higher levels. The intrusive complex was formed by olivine basalt as erupted on the volcano flank 20 March - 12 April; the intrusive growth halted at the onset of this eruption. Deformation associated with the eruption onset was minor as the dike had reached close to the surface in the days before. Isolated eruptive vents opening on long-dormant volcanoes may represent magma leaking upwards from extensive pre-eruptive intrusions formed at depth. A deflation source activated during the summit eruption of trachyandesite is distinct from, and adjacent to, all documented sources of inflation in the volcano roots. Olivine basalt magma which recharged the volcano appears to have triggered the summit eruption, although the exact mode of triggering is uncertain. Scenarios include stress triggering or propagation of olivine basalt into more evolved magma. The trachyandesite includes crystals that can be remnants of minor recent intrusion of olivine basalt

  19. Amphibole-rich intrusive mafic and ultramafic rocks in arc settings: implications for the H2O budget

    Science.gov (United States)

    Tiepolo, M.; Langone, A.; Morishita, T.; Esna-Ashari, A.; Tribuzio, R.

    2011-12-01

    Although amphibole is rarely a phenocryst of arc lavas, many intermediate and silicic magmas in arc settings are considered residual after cryptic amphibole crystallization at mid-low crustal levels (e.g., Davidson et al., 2007). Amphibole-rich mafic and ultramafic intrusive rocks (hornblendites, amphibole-gabbros to amphibole-diorites) are reported worldwide in orogenic settings. These amphibole-rich plutonics could be the "hidden" amphibole reservoir invoked in the arc crust. They usually possess chemical and textural heterogeneities recording the magmatic processes occurring in the mid to low crust (e.g., Tiepolo et al., 2011). Being amphibole-rich, these intrusive rocks are an important source of information on the possible role played by amphibole in arc magma petrogenesis. In particular, for the capability of amphibole to incorporate H2O and elements with a marked affinity for the fluid phase, these rocks are also useful to track the origin and evolution of subduction related fluids. We present here geochemical and geochronologic data on amphibole-rich ultramafic intrusive rocks from different localities worldwide: i) Alpine Orogen (Adamello Batholith and Bregell intrusions); ii) Ross Orogen (Husky Ridge intrusion - Antarctica); iv) Japan Arc (Shikanoshima Island intrusion); v) Sanandaj-Sirjan Zone, Central Iran (Aligoordaz granitoid complex). The coupling of textural information, micro-chemical data and "in situ" zircon geochronology has allowed us to show that these ultramafic intrusive rocks share striking petrologic and geochemical similarities. They are thus the expression of a common magmatic activity that is independent from the age and from the local geological setting and thus related to a specific petrogenetic process. Amphibole-rich mafic and ultramafic intrusive rocks are retained a common feature of collisional-systems worldwide. Amphibole is thus expected to play a major role in the differentiation of arc magmas and in particular in the H2O

  20. The role of stress during memory reactivation on intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders.

  1. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  2. Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hichem Sedjelmaci

    2011-08-01

    Full Text Available Wireless sensor network (WSN is regularly deployed in unattended and hostile environments. The WSN isvulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the mostefficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low falsealarm.

  3. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  4. Non-intrusive practitioner pupil detection for unmodified microscope oculars.

    Science.gov (United States)

    Fuhl, Wolfgang; Santini, Thiago; Reichert, Carsten; Claus, Daniel; Herkommer, Alois; Bahmani, Hamed; Rifai, Katharina; Wahl, Siegfried; Kasneci, Enkelejda

    2016-12-01

    Modern microsurgery is a long and complex task requiring the surgeon to handle multiple microscope controls while performing the surgery. Eye tracking provides an additional means of interaction for the surgeon that could be used to alleviate this situation, diminishing surgeon fatigue and surgery time, thus decreasing risks of infection and human error. In this paper, we introduce a novel algorithm for pupil detection tailored for eye images acquired through an unmodified microscope ocular. The proposed approach, the Hough transform, and six state-of-the-art pupil detection algorithms were evaluated on over 4000 hand-labeled images acquired from a digital operating microscope with a non-intrusive monitoring system for the surgeon eyes integrated. Our results show that the proposed method reaches detection rates up to 71% for an error of ≈3% w.r.t the input image diagonal; none of the state-of-the-art pupil detection algorithms performed satisfactorily. The algorithm and hand-labeled data set can be downloaded at:: www.ti.uni-tuebingen.de/perception.

  5. 南祁连党河南山地区鸡叫沟复式岩体岩石地球化学特征及构造环境%Lithogeochemistry of Jijiaogou intrusive complex in the Danghenanshan area, South Qilian Mountain and its tectonic implications

    Institute of Scientific and Technical Information of China (English)

    张莉莉; 戴霜; 张翔; 张瑞; 张明震; 汪禄波; 刘海娇

    2013-01-01

    通过对党河南山北坡东段鸡叫沟岩体的岩体地质特征和岩石地球化学特征研究,发现该岩体为一加里东期中酸性复式岩体,岩浆活动有4期,依次为岩枝(脉)状产出的辉石闪长岩、辉石正长闪长岩,岩株状产出的(角闪)石英二长岩,岩脉状产出的黑云二长花岗岩和脉状产出的细粒二长花岗岩.第1,2期(石英二长岩锆石U-Pb年龄为455.3±5.6 Ma)构成该复式岩体的主体部分.总体上,4期岩体均富含碱质(碱度率平均为2.72%)、高钾(平均值为4.24%)、贫钛(均小于1.3%),属钾玄岩系列.岩石富集大离子亲石元素和轻稀土元素,具负Eu异常.进一步分析发现,从第1期到第4期,岩石铝质、钾质质量分数渐次升高,稀土总量降低.同时发现前2期、后2期岩体岩石地球化学特征分别大体相似,而且后2期岩体比前2期岩体贫稀土和不相容元素(第4期比第3期尤甚).岩浆演化程度从第1期到第4期逐渐增加,尤其后2期岩浆演化程度很高(DI 平均值达95.9).综合判断显示前2期岩体岩浆源岩为基性岩熔融,形成环境为岛弧环境;后2期岩浆原岩为变质沉积岩,形成于造山环境.%The geologic features and geochemical characteristics of the Jijiaogou intrusive complex in the east of the north slope of the Danghenanshan were summed up and it was found that it is a caledonian neutral-acidic plutonic complex with the four phase of magmatic activities. The first phase is the apophysis-shaped pyroxene diorite and pyroxene syenite diorite, the second is the stock-shaped quartz monzonite, the third is the apophysis-shaped biotite monzogranite and the fourth is the vein-shaped fine-grained monzogranite. The first and second phases (quartz monzonite with the zircon U-Pb age of 455.3±5.6 Ma) constitute the main part of the complex. In general, all rocks are rich in alkali (with an averaged alkalinity rate of 2.72%), high potassium (the averaged value is 4.24%) and poor in

  6. Vapor intrusion from entrapped NAPL sources and groundwater plumes

    Science.gov (United States)

    Illangasekare, Tissa H.; Sakaki, Toshihiro; Christ, John; Petri, Bejamin; Sauck, Carolyn; Cihan, Abdullah

    2010-05-01

    Volatile organic compounds (VOC) are commonly found entrapped as non-aqueous phase liquids (NAPLs) in the soil pores or dissolved in groundwater at industrial waste sites and refineries. Vapors emitted from these contaminant sources readily disperse into the atmosphere, into air-filled void spaces within the soil, and migrate below surface structures, leading to the intrusion of contaminant vapors into indoor air through basements and other underground structures. This process referred to as vapor intrusion (VI) represents a potential threat to human health, and is a possible exposure pathway of concern to regulatory agencies. To assess whether this exposure pathway is present, remediation project managers often rely in part on highly simplified screening level models that do not take into consideration the complex flow dynamics controlled by subsurface heterogeneities and soil moisture conditions affected by the mass and heat flux boundary conditions at the land/atmospheric interface. A research study is under way to obtain an improved understanding of the processes and mechanisms controlling vapor generation from entrapped NAPL sources and groundwater plumes, their subsequent migration through the subsurface, and their attenuation in naturally heterogeneous vadose zones under various natural physical, climatic, and geochemical conditions. Experiments conducted at multiple scales will be integrated with analytical and numerical modeling and field data to test and validate existing VI theories and models. A set of preliminary experiments where the fundamental process of vapor generation from entrapped NAPL sources and dissolved plumes under fluctuating water were investigated in small cells and two-dimensional test tanks. In another task, intermediate scale experiments were conducted to generate quantitative data on how the heat and mass flux boundary conditions control the development of dynamic VI pathways. The data from the small cell and tank experiments were

  7. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  8. Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique

    Directory of Open Access Journals (Sweden)

    Oluwafemi Oriola

    2012-12-01

    Full Text Available For effective security incidence response on the network, a reputable approach must be in place at bothprotected and unprotected region of the network. This is because compromise in the demilitarized zonecould be precursor to threat inside the network. The improved complexity of attacks in present times andvulnerability of system are motivations for this work. Past and present approaches to intrusion detectionand prevention have neglected victim and attacker properties despite the fact that for intrusion to occur,an overt act by an attacker and a manifestation, observable by the intended victim, which results fromthat act are required. Therefore, this paper presents a threat characterization model for attacks from thevictim and the attacker perspective of intrusion using data mining technique. The data mining techniquecombines Frequent Temporal Sequence Association Mining and Fuzzy Logic. Apriori Association Miningalgorithm was used to mine temporal rule patterns from alert sequences while Fuzzy Control System wasused to rate exploits. The results of the experiment show that accurate threat characterization in multipleintrusion perspectives could be actualized using Fuzzy Association Mining. Also, the results proved thatsequence of exploits could be used to rate threat and are motivated by victim properties and attackerobjectives.

  9. Risk-based evaluation of total petroleum hydrocarbons in vapor intrusion studies.

    Science.gov (United States)

    Brewer, Roger; Nagashima, Josh; Kelley, Michael; Heskett, Marvin; Rigby, Mark

    2013-06-13

    This paper presents a quantitative method for the risk-based evaluation of Total Petroleum Hydrocarbons (TPH) in vapor intrusion investigations. Vapors from petroleum fuels are characterized by a complex mixture of aliphatic and, to a lesser extent, aromatic compounds. These compounds can be measured and described in terms of TPH carbon ranges. Toxicity factors published by USEPA and other parties allow development of risk-based, air and soil vapor screening levels for each carbon range in the same manner as done for individual compounds such as benzene. The relative, carbon range makeup of petroleum vapors can be used to develop weighted, site-specific or generic screening levels for TPH. At some critical ratio of TPH to a targeted, individual compound, the overwhelming proportion of TPH will drive vapor intrusion risk over the individual compound. This is particularly true for vapors associated with diesel and other middle distillate fuels, but can also be the case for low-benzene gasolines or even for high-benzene gasolines if an adequately conservative, target risk is not applied to individually targeted chemicals. This necessitates a re-evaluation of the reliance on benzene and other individual compounds as a stand-alone tool to evaluate vapor intrusion risk associated with petroleum.

  10. Risk-Based Evaluation of Total Petroleum Hydrocarbons in Vapor Intrusion Studies

    Directory of Open Access Journals (Sweden)

    Roger Brewer

    2013-06-01

    Full Text Available This paper presents a quantitative method for the risk-based evaluation of Total Petroleum Hydrocarbons (TPH in vapor intrusion investigations. Vapors from petroleum fuels are characterized by a complex mixture of aliphatic and, to a lesser extent, aromatic compounds. These compounds can be measured and described in terms of TPH carbon ranges. Toxicity factors published by USEPA and other parties allow development of risk-based, air and soil vapor screening levels for each carbon range in the same manner as done for individual compounds such as benzene. The relative, carbon range makeup of petroleum vapors can be used to develop weighted, site-specific or generic screening levels for TPH. At some critical ratio of TPH to a targeted, individual compound, the overwhelming proportion of TPH will drive vapor intrusion risk over the individual compound. This is particularly true for vapors associated with diesel and other middle distillate fuels, but can also be the case for low-benzene gasolines or even for high-benzene gasolines if an adequately conservative, target risk is not applied to individually targeted chemicals. This necessitates a re-evaluation of the reliance on benzene and other individual compounds as a stand-alone tool to evaluate vapor intrusion risk associated with petroleum.

  11. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  12. KUROSHIO INTRUSION INTO THE SOUTH CHINA SEA

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-hua; FAN Hai-mei; QU Yuan-yuan

    2006-01-01

    In this article, the circulation of the South China Sea (SCS), which is idealized as the rectangular basin with constant depth, is studied under Kuroshio boundary forces. Starting from the linearly quasi-geostrophic vorticity equation, the solution of the SCS circulation is given in the form of corrected Fourier series under proper boundary conditions. The results show that the intruded current flows westward and separates into the northward branch and the southward branch before arriving at the western boundary. The southward branch flows out of the SCS through the southwestern passage, at the same time, the induced cyclonic (anti-clockwise) ring almost occupies the middle and southern parts, and concomitant anti-cyclonic (clockwise) vortex appears between the cyclone and the western boundary. While the northward branch outflows through the northeastern passage, the anti-cyclonic (clockwise) ring is triggered at the northern part of the SCS. The above two vortexes are both intensified if the south-entering and the north-leaving current loop intrusion are superposed. The outer flow of the northern vortex flows westward, then northward, and then eastward, and it is very similar to the configuration of the SCS Warm Current (SCSWC) at the northern part of the SCS, thus, a kind of generating mechanism of the SCSWC is presented.

  13. An expert system application for network intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Dubois, D.H.; Stallings, C.A.

    1991-01-01

    The paper describes the design of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The Network Anomaly Detection and Intrusion Reporter (NADIR) differs in one respect from most intrusion detection systems. It tries to address the intrusion detection problem on a network, as opposed to a single operating system. NADIR design intent was to copy and improve the audit record review activities normally done by security auditors. We wished to replace the manual review of audit logs with a near realtime expert system. NADIR compares network activity, as summarized in user profiles, against expert rules that define network security policy, improper or suspicious network activities, and normal network and user activity. When it detects deviant (anomalous) behavior, NADIR alerts operators in near realtime, and provides tools to aid in the investigation of the anomalous event. 15 refs., 2 figs.

  14. Vapor Intrusion Facility Boundaries - Approximate Extent of Contamination

    Data.gov (United States)

    U.S. Environmental Protection Agency — Theses polygons represent the approximate extent of contamination for Vapor Intrusion facilities. Polygons for non-Federal Facility sites were updated in January,...

  15. SVM Intrusion Detection Model Based on Compressed Sampling

    Directory of Open Access Journals (Sweden)

    Shanxiong Chen

    2016-01-01

    Full Text Available Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. Massive data processing is the bottleneck of network software and hardware equipment in intrusion detection. If we can reduce the data dimension in the stage of data sampling and directly obtain the feature information of network data, efficiency of detection can be improved greatly. In the paper, we present a SVM intrusion detection model based on compressive sampling. We use compressed sampling method in the compressed sensing theory to implement feature compression for network data flow so that we can gain refined sparse representation. After that SVM is used to classify the compression results. This method can realize detection of network anomaly behavior quickly without reducing the classification accuracy.

  16. Tropical upper tropospheric humidity variations due to potential vorticity intrusions

    Science.gov (United States)

    Sandhya, M.; Sridharan, S.; Indira Devi, M.

    2015-09-01

    Four cases (March 2009, May 2009, April 2010 and February 2012) are presented in which the ERA-interim relative humidity (RH) shows consistent increase by more than 50 % in the upper troposphere (200-250 hPa) over tropics at the eastward side of the potential vorticity (PV) intrusion region. The increase in RH is confirmed with the spaceborne microwave limb sounder observations and radiosonde observations over Gadanki (13.5° N, 79.2° E) and is observed irrespective of whether the PV intrusions are accompanied by deep convection or not. It is demonstrated that the increase in RH is due to poleward advection induced by the PV intrusions in their eastward side at the upper tropospheric heights. It is suggested that the low-latitude convection, which is not necessarily triggered by the PV intrusion, might have transported water vapour to the upper tropospheric heights.

  17. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against obse

  18. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  19. Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks

    CERN Document Server

    Shafi, Muhammad Imran; Hayat, Sikandar; Sohail, Imran

    2010-01-01

    Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Prevention Systems (IPSs) show a good level of success in detecting and preventing intrusion attempts to networks, they show a visible deficiency in their performance when they are employed on fast networks. In this paper we have presented a design including quantitative and qualitative methods to identify improvement areas in IPSs. Focus group is used for qualitative analysis and experiment is used for quantitative analysis. This paper also describes how to reduce the responding time for IPS when an intrusion occurs on network, and how can IPS be made to perform its tasks successfully without effecting network speed nega...

  20. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — AI Signal Research, Inc. proposes to develop a Non-Intrusive Vibration Measurement System (NI-VMS) for turbopumps which will provide effective on-board/off-board...

  1. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  2. Intrusion Prevention/Intrusion Detection System (IPS/IDS for Wifi Networks

    Directory of Open Access Journals (Sweden)

    Michal Korcak

    2014-07-01

    Full Text Available The nature of wireless networks itself created new vulnerabilities that in the classical wired network s do not exist. This results in an evolutional requireme nt to implement new sophisticated security mechanis m in form of Intrusion Detection and Prevention Systems. This paper deals with security issues of small off ice and home office wireless networks. The goal of our work is to design and evaluate wireless IDPS with u se of packet injection method. Decrease of attacker’s traffic by 95% was observed when compared to attacker’s traffic without deployment of proposed I DPS system.

  3. Managing Temporal and Spatial Variability in Vapor Intrusion Data

    Science.gov (United States)

    2012-03-28

    Managing Temporal and Spatial Variability in Vapor Intrusion Data Todd McAlary, M.Sc., P.Eng., P.G. Geosyntec Consultants, Inc...TITLE AND SUBTITLE Managing Temporal and Spatial Variability in Vapor Intrusion Data 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Koc (mL/g) OSWER indoor conc. at 10-6 risk (ppb) Vapour pressure (atm) Water solubility (g/l) 1,1,1-Trichloroethane 110 400

  4. Intrusion and extrusion of water in hydrophobic mesopores

    OpenAIRE

    Barrat, Jean-Louis; Lefevre, Benoit; Bocquet, Lyderic; Saugey, Anthony; Vigier, Gérard; Gobin, Pierre-François; Charlaix, Elisabeth

    2003-01-01

    We present experimental and theoretical results on intrusion-extrusion cycles of water in hydrophobic mesoporous materials, characterized by independent cylindrical pores. The intrusion, which takes place above the bulk saturation pressure, can be well described using a macroscopic capillary model. Once the material is saturated with water, extrusion takes place upon reduction of the externally applied pressure; Our results for the extrusion pressure can only be understood by assuming that th...

  5. Environmental data processor of the adaptive intrusion data system

    Energy Technology Data Exchange (ETDEWEB)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components.

  6. A Subset Feature Elimination Mechanism for Intrusion Detection System

    OpenAIRE

    Herve Nkiama; Syed Zainudeen Mohd Said; Muhammad Saidu

    2016-01-01

    several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the emergence of new technologies such as Cloud Computing or Big Data, large amount of network traffic are generated and the intrusion detection system must dynamically collected and analyzed the data produce by the incoming traffic. However in a large dataset not all features con...

  7. The effects of nicotine on intrusive memories in nonsmokers.

    Science.gov (United States)

    Hawkins, Kirsten A; Cougle, Jesse R

    2013-12-01

    Correlational research suggests that smoking increases risk of posttraumatic stress disorder (PTSD), though such research by nature cannot rule out third variable explanations for this relationship. The present study used an analogue trauma film design to experimentally test the effects of nicotine on the occurrence of intrusive memories. Fifty-four healthy nonsmokers were randomly assigned to ingest either a nicotine or placebo lozenge before viewing a film depicting motor vehicle accidents. Participants recorded intrusive memories immediately after the film and for a week via diary. Participants in the nicotine condition reported significantly more intrusive memories immediately after watching the film, yet no group differences emerged on intrusions or intrusion-related distress reported during the following week. Among participants low in dispositional rumination, those who had ingested a nicotine lozenge reported more intrusions in the subsequent week than those in the placebo condition. These findings provide novel experimental evidence for the role of nicotine in increasing risk of PTSD and suggest that nicotine may contribute to trauma-related rumination but not heightened reactivity to trauma cues.

  8. Towards Multi-Stage Intrusion Detection using IP Flow Records

    Directory of Open Access Journals (Sweden)

    Muhammad Fahad Umer

    2016-10-01

    Full Text Available Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packet-based intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for attack detection. IP flow records contain summarized traffic information. However, flow data is very large in high-speed networks and cannot be processed in real-time by the intrusion detection system. In this paper, an efficient multi-stage model for intrusion detection using IP flows records is proposed. The first stage in the model classifies the traffic as normal or malicious. The malicious flows are further analyzed by a second stage. The second stage associates an attack type with malicious IP flows. The proposed multi-stage model is efficient because the majority of IP flows are discarded in the first stage and only malicious flows are examined in detail. We also describe the implementation of our model using machine learning techniques.

  9. Saltwater intrusion in coastal regions of North America

    Science.gov (United States)

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  10. Biochemical and Clinical Assessments of Segmental Maxillary Posterior Tooth Intrusion

    Science.gov (United States)

    Tasanapanont, Jintana; Wattanachai, Tanapan; Apisariyakul, Janya; Pothacharoen, Peraphan; Kongtawelert, Prachya; Midtbø, Marit

    2017-01-01

    Objective. To compare chondroitin sulphate (CS) levels around maxillary second premolars, first molars, and second molars between the unloaded and the loaded periods and to measure the rates of intrusion of maxillary posterior teeth during segmental posterior tooth intrusion. Materials and Methods. In this prospective clinical study, 105 teeth (from 15 patients exhibiting anterior open bite and requiring maxillary posterior tooth intrusion) were studied. Competitive ELISA was used to detect CS levels. Dental casts (during the unloaded and loaded periods) were scanned, and posterior tooth intrusion distances were measured. Results. During the unloaded period, the median CS levels around maxillary second premolars, first molars, second molars (experimental teeth), and mandibular first molars (negative control) were 0.006, 0.055, 0.056, and 0.012 and during the loaded period were 2.592, 5.738, 4.727, and 0.163 ng/μg of total protein, respectively. The median CS levels around experimental teeth were significantly elevated during the loaded period. The mean rates of maxillary second premolar and first and second molar intrusion were 0.72, 0.58, and 0.40 mm/12 weeks, respectively. Conclusions. Biochemical and clinical assessments suggested that the segmental posterior tooth intrusion treatment modality with 50 g of vertical force per side was sufficient. Trial Registration. The study is registered as TCTR20170206006. PMID:28321256

  11. A Fiber-Optical Intrusion Alarm System Based on Quasi-Distributed Fiber Bragg Grating Sensors

    Institute of Scientific and Technical Information of China (English)

    Qi Jiang; Yun-Jiang Rao; De-Hong Zeng

    2008-01-01

    A fiber-optical intrusion alarm system based on quasi-distributed fiber Bragg grating (FBG) sensors is demonstrated in this paper. The algorithms of empirical mode decomposition (EMD) and wavelet packet characteristic entropy are adopted to determine the intrusion location. The intrusion alarm software based on the Labview is developed, and it is also proved by the experiments. The results show that such a fiber-optical intrusion alarm system can offer the automatic intrusion alarm in real-time.

  12. High-resolution seismic imaging of the Kevitsa mafic-ultramafic Cu-Ni-PGE hosted intrusion, northern Finland

    Science.gov (United States)

    Malehmir, Alireza; Koivisto, Emilia; Wjins, Chris; Tryggvason, Ari; Juhlin, Christopher

    2014-05-01

    Kevitsa, in northern Finland, is a large nickel/copper ore body hosted by a massive mafic-ultramafic intrusion with measured and indicated resources of 240 million tons (cutoff 0.1%) grading 0.30% Ni and 0.41% Cu. Mining started in 2012 with an open pit that will extend down to about 550-600 m depth. The expected mine life is more than 20 years. Numerous boreholes are available in the area, but the majority of them are shallow and do not provide a comprehensive understanding of the dimensions of the intrusion. However, a number of boreholes do penetrate the basal contact of the intrusion. Most of these are also shallow and concentrated at the edge of the intrusion. A better knowledge of the geometry of the intrusion would provide a framework for near-mine and deep exploration in the area, but also a better understanding of the geology. Exact mapping of the basal contact of the intrusion would also provide an exploration target for the contact-type mineralization that is often more massive and richer in Ni-Cu than the disseminated mineralization away from the contact. With the objective of better characterizing the intrusion, a series of 2D profiles were acquired followed by a 3D reflection survey that covered an area of about 3 km by 3 km. Even though the geology is complex and the seismic P-wave velocity ranges between 5 to 8 km/s, conventional processing results show gently- to steeply-dipping reflections from depths of approximately 2 km to as shallow as 100 m. Many of these reflections are interpreted to originate from either fault systems or internal magmatic layering within the Kevitsa main intrusion. Correlations between the 3D surface seismic data and VSP data, based upon time shifts or phase changes along the reflections, support the interpretation that numerous faults are imaged in the volume. Some of these faults cross the planned open-pit mine at depths of about 300-500 m, and it is, therefore, critical to map them for mine planning. The seismic 3D

  13. Intrusion of incisors in adult patients with marginal bone loss.

    Science.gov (United States)

    Melsen, B; Agerbaek, N; Markenstam, G

    1989-09-01

    Elongated and spaced incisors are common problems in patients suffering from severe periodontal disease. Thirty patients characterized by marginal bone loss and deep overbite were treated by intrusion of incisors. Three different methods for intrusion were applied: (1) J hooks and extraoral high-pull headgear, (2) utility arches, (3) intrusion bent into a loop in a 0.17 x 0.25-inch wire, and (4) base arch as described by Burstone. The intrusion was evaluated from the displacement of the apex, incision, and the center of resistance of the most prominent or elongated central incisor. Change in the marginal bone level and the amount of root resorption were evaluated on standardized intraoral radiographs. The pockets were assessed by standardized probing and the clinical crown length was measured on study casts. The results showed that the true intrusion of the center of resistance varied from 0 to 3.5 mm and was most pronounced when intrusion was performed with a base arch. The clinical crown length was generally reduced by 0.5 to 1.0 mm. The marginal bone level approached the cementoenamel junction in all but six cases. All cases demonstrated root resorption varying from 1 to 3 mm. The total amount of alveolar support--that is, the calculated area of the alveolar wall--was unaltered or increased in 19 of the 30 cases. The dependency of the results on the oral hygiene, the force distribution, and the perioral function was evaluated in relation to the individual cases. It was obvious that intrusion was best performed when (1) forces were low (5 to 15 gm per tooth) with the line of action of the force passing through or close to the center of resistance, (2) the gingiva status was healthy, and (3) no interference with perioral function was present.

  14. HUMAN CANCER IS A PARASITE SPREAD VIA INTRUSION IN GENOME

    Directory of Open Access Journals (Sweden)

    Sergey N. Rumyantsev

    2013-03-01

    Full Text Available The present article is devoted to further development of new paradigm about the biology of human cancer: the hypothesis of parasitic nature, origin and evolution of the phenomenon. The study included integrative reconsidering, and reinterpretation of the make-ups, traits and processes existing both in human and animal cancers. It was demonstrated that human cancer possesses nearly analogous set of traits characteristic of transmissible animal cancer. Undoubted analogies are seen in the prevalence, clinical exposure, progression of disease, origin of causative agents, immune response against invasion and especially in the intrinsic deviations of the leading traits of cancerous cells. Both human and animal cancers are highly exceptional pathogens. But in contrast to contagious animal cancers the cells of of human cancer can not pass between individuals as usual infectious agents. Exhaustive evidence of the parasitic nature and evolutionary origin of human cancer was revealed and interpreted. In contrast to animal cancer formed of solitary cell lineage, human cancer consists of a couple of lineages constructed under different genetic regulations and performed different structural and physiological functions. The complex make-up of cancer composition remains stable over sequential propagation. The subsistence of human cancer regularly includes obligatory interchange of its successive forms. Human cancer possesses its own biological watch and the ability to gobble its victim, transmit via the intrusion of the genome, perform intercommunications within the tumor components and between the dispersed subunits of cancer. Such intrinsic traits characterize human cancer as a primitively structured parasite that can be classified in Class Mammalians, Species Genomeintruder malevolent (G.malevolent.

  15. How Saccade Intrusions Affect Subsequent Motor and Oculomotor Actions

    Science.gov (United States)

    Terao, Yasuo; Fukuda, Hideki; Tokushige, Shin-ichi; Inomata-Terada, Satomi; Ugawa, Yoshikazu

    2017-01-01

    In daily activities, there is a close spatial and temporal coupling between eye and hand movements that enables human beings to perform actions smoothly and accurately. If this coupling is disrupted by inadvertent saccade intrusions, subsequent motor actions suffer from delays, and lack of coordination. To examine how saccade intrusions affect subsequent voluntary actions, we used two tasks that require subjects to make motor/oculomotor actions in response to a visual cue. One was the memory guided saccade (MGS) task, and the other the hand reaction time (RT) task. The MGS task required subjects to initiate a voluntary saccade to a memorized target location, which is indicated shortly before by a briefly presented cue. The RT task required subjects to release a button on detection of a visual target, while foveating on a central fixation point. In normal subjects of various ages, inadvertent saccade intrusions delayed subsequent voluntary motor, and oculomotor actions. We also studied patients with Parkinson's disease (PD), who are impaired not only in initiating voluntary saccades but also in suppressing unwanted reflexive saccades. Saccade intrusions also delayed hand RT in PD patients. However, MGS was affected by the saccade intrusion differently. Saccade intrusion did not delay MGS latency in PD patients who could perform MGS with a relatively normal latency. In contrast, in PD patients who were unable to initiate MGS within the normal time range, we observed slightly decreased MGS latency after saccade intrusions. What explains this paradoxical phenomenon? It is known that motor actions slow down when switching between controlled and automatic behavior. We discuss how the effect of saccade intrusions on subsequent voluntary motor/oculomotor actions may reflect a similar switching cost between automatic and controlled behavior and a cost for switching between different motor effectors. In contrast, PD patients were unable to initiate internally guided MGS in

  16. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    Directory of Open Access Journals (Sweden)

    Telma Martins de Araújo

    2008-10-01

    Full Text Available INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os ortodontistas, tornando a intrusão, tanto de dentes anteriores quanto posteriores, um procedimento cada vez mais simples, do ponto de vista mecânico. OBJETIVO: pretende-se, então, neste artigo, descrever e demonstrar, clinicamente, as diversas possibilidades de utilização dos mini-implantes como recurso de ancoragem para o movimento de intrusão.INTRODUCTION: Among all different varieties of orthodontically induced tooth movement, intrusion is, without doubt, one of the most difficult movements to be reached. Conventional intrusive biomechanics, although possible, may lead to undesirable side-effects. These events, in most cases, are related to the difficulty in obtaining an efficient anchorage unit. Then, mini-implants, because of their high success rates of effective skeletal anchorage, are valuable devices to orthodontists, transforming the intrusion movement, both at the anterior and the posterior regions, a more and more uncomplicated biomechanical procedure. AIM: to describe and show, clinically, different ways of using mini-implants as an anchorage system to intrusion movement.

  17. Perception of the English intrusive stops by Korean listeners

    Science.gov (United States)

    Han, Jeong-Im

    2002-05-01

    This paper reports results of an experiment examining Korean listeners' perception of English intrusive stops in nasal-obstruent clusters. The experiment tests (1) how often intrusive stops are perceived; (2) how language-specific syllable structure constraints influence the perception, given the fact that Korean does not allow consonant clusters in syllable onsets and codas; (3) whether even the perception of phonetic variables like intrusive stops, not phonemes, could be improved by learning. Ninety English non-words with a monosyllable structure of CVC1C2 were created, where C1=/m,n,N/, and C2=/p,k,s/. The stimuli including additional 90 filler items were recorded by three native English speakers and one representative data among them was given to three groups of native Korean listeners in terms of their English proficiency. Each was asked to monitor the target sounds [Warner and Weber, J. Phonetics 29, 23-52 (2001)]. The preliminary results show that identification of intrusive stops in English is totally dependent on Korean syllable structure, so even stimuli with strong acoustic cues were misparsed. Nonetheless, there's a high correlation between perception of intrusive stops and listeners' English proficiency, showing the possibility of the improvement of perception by learning.

  18. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jingyu Wang

    2011-02-01

    Full Text Available Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in new enterprise data center, this paper constructs a virtualization intrusion tolerance system based on cloud computing by researching on the existing virtualization technology, and then presents a method of intrusion tolerance to protect sensitive data in cloud data center based on virtual adversary structure by utilizing secret sharing. This system adopts the method of hybrid fault model, active and passive replicas, state update and transfer, proactive recovery and diversity, and initially implements to tolerate F faulty replicas in N=2F+1 replicas and ensure that only F+1 active replicas to execute during the intrusion-free stage. The remaining replicas are all put into passive mode, which significantly reduces the resource consuming in cloud platform. At last we prove the reconstruction and confidentiality property of sensitive data by utilizing secret sharing.

  19. A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Hossein Jadidoleslamy

    2011-10-01

    Full Text Available Networks protection against different types of attacks is one of most important posed issue into the network andinformation security application domains. This problem on Wireless Sensor Networks (WSNs, in attention to theirspecial properties, has more importance. Now, there are some of proposed architectures and guide lines to protectWireless Sensor Networks (WSNs against different types of intrusions; but any one of them do not has acomprehensive view to this problem and they are usually designed and implemented in single-purpose; but, theproposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete andcomprehensive Intrusion Detection Architecture (IDA. The main contribution of this architecture is its hierarchicalstructure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and itsrequired security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-basedIntrusion Detection System (CIDS on cluster-heads and Wireless Sensor Network wide level Intrusion DetectionSystem (WSNIDS on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA are:static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchicalrouting protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified bydesigning a questionnaire, representing it to some (about 50 people experts and then, analyzing and evaluating itsacquired results.

  20. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  1. Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS

    CERN Document Server

    Sangeetha, S; 10.5121/ijnsa.2010.2204

    2010-01-01

    The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS consist of semantic IDS and Fuzzy based IDS. Rule based IDS looks for the specific pattern which is defined as malicious. A non-intrusive regular pattern can be malicious if it occurs several times with a short time interval. For detecting such malicious activities, FASIDS is proposed in this paper. At application layer, HTTP traffic's header and payload are analyzed for possible intrusion. In the proposed misuse detection module, the semantic intrusion detection system works on the basis of rules that define various application layer misuses that are found in the network. An attack identified by the IDS is based on a corresponding rule in the rule-base. An event that doesn't make a 'hit' on the rule-base is given to a Fuzzy Intrusion Detection System (FIDS) for further analysis.

  2. Orthodontic intrusive movement to reduce infrabony defects in periodontal pacients

    Directory of Open Access Journals (Sweden)

    Aldrieli Regina Ambrósio

    2008-01-01

    Full Text Available The adult tends to be an excellent orthodontic patient, because he/she is motivated and cooperative. Nevertheless, many adult patientspresent periodontal problems. Intrusive movement is usually necessary against an area with infrabony defects, and in order for treatmentto be successful, it is necessary for all related aspects to be well understood. The aim of this study was to discuss the feasibility and efficacy of orthodontic intrusion as a means of reducing infrabony defects caused by periodontal disease. The methodology used was reviewed in the literature, from which articles were selected using the MEDLINE, LILACS and BBO databases. After periodontal treatment and maintenance with suitable bacterial plaque control has been performed, orthodontic treatment with intrusive tooth movement can be performed in case of pathological tooth migration and extrusion. The segmented arch technique is the most indicated for intruding teeth with infrabony defects because it is capable of developing light and continuous forces. Furthermore, although studies did not confirm, they suggested that orthodontic intrusion could lead to the formation of new periodontal support tissue. With a multidisciplinary approach, it is possible to successfully perform intrusion movements in teeth that present infrabony defects, provided that periodontal inflammation has been treated and the patient presents an excellent level of plaque control. Among the benefits of this approach are: better appearance, better access to dental hygiene, restitution of incisal occlusion and reduction in non axial load.

  3. Distributed intrusion detection for mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Jiang Xinghao; Wu Yue; Liu Ning

    2008-01-01

    Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments.

  4. SEAWATER INTRUSION TYPES AND REGIONAL DIVISIONS IN THE SOUTHERN COAST OF LAIZHOU BAY

    Institute of Scientific and Technical Information of China (English)

    孟广兰; 韩有松; 王少青; 王珍岩

    2002-01-01

    The southern coast of Laizhou Bay, Bohai Sea, is one of the areas in China most seriously impacted by seawater intrusion. Based on the sources of intruding waterbedies, seawater intrusion can be divided into two types: intrusion of saline water derived from modern seawater, and intrusion of subsurface brine and saline water derived from paleo-seawater in shallow Quaternary sediments. There are some distinct differences in their formation, mechanism and damage. The subsurface brine intrusion is a special type, which can cause very serious disaster. The coastal landform and the Quaternary hydrogeological environment are predominant factors in the classification of seawater intrusion types. Various coastal environments in different coastal sections result in three types of intrusion: seawater intrusion, saline groundwater intrusion, and mixed seawater and saline water intrusion, in the southern coast of Laizhou Bay, which can be divided into four areas: the sea-water intrusion area in the northern Laizhou City coast, the mixed seawater and saline groundwater intrusion area in the Baisha River-Jiaolai River mouth plain area, the mixed seawater and saline groundwater intrusion area in the Weihe River mouth plain area northern Changyi county coast, and the saline ground-water intrusion area in the northern Shouguang plains.

  5. HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK

    Directory of Open Access Journals (Sweden)

    Seyedeh Yasaman Rashida

    2013-06-01

    Full Text Available In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and manage misuse and anomaly detects.

  6. Research of Intrusion Detection Technology and its Formal Modeling

    Directory of Open Access Journals (Sweden)

    PENG Yali

    2009-10-01

    Full Text Available The intrusion detection technology is one of the most important dynamic security technologies, which can be used in the critical security system construction and the basic service protection. Apparently, applying formal specification to the procedure of developing an intrusion detection system can fulfill their security requirement and win the confidence of users of the secured systems. Taking a DDoS intrusion detection system as an example, we establish integrity sub-regular database through analyzing the default characteristics and universal characteristics in communication of DDoS attack, which can guarantee fast and effective detection in each appeared DDoS attack. At the same time, we use the association rules mining algorithm mine new rules and their association pattern to detect the unknown attack, and illustrate how Z can be used to specify and model the security-critical systems.

  7. Intrusion Awareness Based on Data Fusion and SVM Classification

    Directory of Open Access Journals (Sweden)

    Ramnaresh Sharma

    2012-06-01

    Full Text Available Network intrusion awareness is important factor for risk analysis of network security. In the current decade various method and framework are available for intrusion detection and security awareness. Some method based on knowledge discovery process and some framework based on neural network. These entire model take rule based decision for the generation of security alerts. In this paper we proposed a novel method for intrusion awareness using data fusion and SVM classification. Data fusion work on the biases of features gathering of event. Support vector machine is super classifier of data. Here we used SVM for the detection of closed item of ruled based technique. Our proposed method simulate on KDD1999 DARPA data set and get better empirical evaluation result in comparison of rule based technique and neural network model.

  8. Intrusion Awareness Based on Data Fusion and SVM Classification

    Directory of Open Access Journals (Sweden)

    Ramnaresh Sharma

    2012-06-01

    Full Text Available Network intrusion awareness is important factor forrisk analysis of network security. In the currentdecade various method and framework are availablefor intrusion detection and security awareness.Some method based on knowledge discovery processand some framework based on neural network.These entire model take rule based decision for thegeneration of security alerts. In this paper weproposed a novel method for intrusion awarenessusing data fusion and SVM classification. Datafusion work on the biases of features gathering ofevent. Support vector machine is super classifier ofdata. Here we used SVM for the detection of closeditem of ruled based technique. Our proposedmethod simulate on KDD1999 DARPA data set andget better empirical evaluation result in comparisonof rule based technique and neural network model.

  9. Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS

    CERN Document Server

    Jemili, Farah; Ahmed, Mohamed Ben

    2009-01-01

    This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a classifier permitting to extract the necessary knowledge in order to identify the presence or not of an intrusion in a session and in the positive case to recognize its type and to predict the possible intrusions that will follow it. The proposed system takes into account the uncertainty and imprecision that can affect the statistical data of the historic. The systematic utilization of an unique probability distribution to represent this type of knowledge supposes a too rich subjective information and risk to be in part arbitrary. One of the first objectives of this work was therefore to permit the consistency between the manner of which we represent information and information which we really dispose.

  10. Distributed intrusion detection system based on fuzzy rules

    Science.gov (United States)

    Qiao, Peili; Su, Jie; Liu, Yahui

    2006-04-01

    Computational Intelligence is the theory and method solving problems by simulating the intelligence of human using computer and it is the development of Artificial Intelligence. Fuzzy Technique is one of the most important theories of computational Intelligence. Genetic Fuzzy Technique and Neuro-Fuzzy Technique are the combination of Fuzzy Technique and novel techniques. This paper gives a distributed intrusion detection system based on fuzzy rules that has the characters of distributed parallel processing, self-organization, self-learning and self-adaptation by the using of Neuro-Fuzzy Technique and Genetic Fuzzy Technique. Specially, fuzzy decision technique can be used to reduce false detection. The results of the simulation experiment show that this intrusion detection system model has the characteristics of distributed, error tolerance, dynamic learning, and adaptation. It solves the problem of low identifying rate to new attacks and hidden attacks. The false detection rate is low. This approach is efficient to the distributed intrusion detection.

  11. CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bishan Ying

    2014-01-01

    Full Text Available The nature of wireless sensor networks (WSNs makes them very vulnerable to adversary's malicious attacks. Therefore, network security is an important issue to WSNs. Due to the constraints of WSN, intrusion detection in WSNs is a challengeable task. In this paper, we present a novel intrusion detection mechanism for WSNs, which is composed of a secure data communication algorithm and an intrusion detection algorithm. The major contribution of this paper is that we propose an original secure mechanism to defend WSNs against malicious attacks by using the information generated during data communication. The approach is able to protect the data communication in a WSN even if some sensor nodes are compromised by adversary. The proposed approach is easy to be implemented and performed in resource-constrained WSN. We also evaluate the proposed approach by a simulation experiment and analyze the simulation results in detail.

  12. Intrusion detection based on system calls and homogeneous Markov chains

    Institute of Scientific and Technical Information of China (English)

    Tian Xinguang; Duan Miyi; Sun Chunlai; Li Wenfa

    2008-01-01

    A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.

  13. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai

    2012-12-01

    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  14. A Cooperative Network Intrusion detection Based on Fuzzy SVMs

    Directory of Open Access Journals (Sweden)

    Shaohua Teng

    2010-04-01

    Full Text Available There is a large number of noise in the data obtained from network, which deteriorates intrusion detection performance. To delete the noise data, data preprocessing is done before the construction of hyperplane in support vector machine (SVM. By introducing fuzzy theory into SVM, a new method is proposed for network intrusion detection.  Because the attack behavior is different for different network protocol, a different fuzzy membership function is formatted, such that for each class of protocol there is a SVM. To implement this approach, a fuzzy SVM-based cooperative network intrusion detection system with multi-agent architecture is presented. It is composed of three types of agents corresponding to TCP, UDP, and ICMP protocols, respectively. Simulation experiments are done by using KDD CUP 1999 data set, results show that the training time is significantly shortened, storage space requirement is reduced, and classification accuracy is improved.

  15. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Science.gov (United States)

    Trickl, Thomas; Vogelmann, Hannes; Fix, Andreas; Schäfler, Andreas; Wirth, Martin; Calpini, Bertrand; Levrat, Gilbert; Romanens, Gonzague; Apituley, Arnoud; Wilson, Keith M.; Begbie, Robert; Reichardt, Jens; Vömel, Holger; Sprenger, Michael

    2016-07-01

    A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison). The measurements were carried out at four observational sites: Payerne (Switzerland), Bilthoven (the Netherlands), Lindenberg (north-eastern Germany), and the Zugspitze mountain (Garmisch-Partenkichen, German Alps), and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg). The dryness hardens the findings of a preceding study ("Part 1", Trickl et al., 2014) that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in "Part 1" from the Zugspitze CO observations. The trajectories qualitatively explain

  16. Alteration of Eudialyte and implications for the REE, ZR, and NB resources of the layered Kakortokites in the ILÍMAUSSAQ intrusion, South West Greenland

    DEFF Research Database (Denmark)

    Borst, Anouk Margaretha; Waight, Tod Earle; Smit, Matthijs Arjen

    2014-01-01

    The layered kakortokites in the southern part of the Ilímaussaq Intrusion are of great economic interest due to their high concentrations of REE, Zr, Nb and Ta. The prospective metals are largely contained in eudialyte, a complex sodium‐zirconosilicate and one of the major cumulus phases. Eudialyte...

  17. Non-intrusive Ensemble Kalman filtering for large scale geophysical models

    Science.gov (United States)

    Amour, Idrissa; Kauranne, Tuomo

    2016-04-01

    Advanced data assimilation techniques, such as variational assimilation methods, present often challenging implementation issues for large-scale models, both because of computational complexity and because of complexity of implementation. We present a non-intrusive wrapper library that addresses this problem by isolating the direct model and the linear algebra employed in data assimilation from each other completely. In this approach we have adopted a hybrid Variational Ensemble Kalman filter that combines Ensemble propagation with a 3DVAR analysis stage. The inverse problem of state and covariance propagation from prior to posterior estimates is thereby turned into a time-independent problem. This feature allows the linear algebra and minimization steps required in the variational step to be conducted outside the direct model and no tangent linear or adjoint codes are required. Communication between the model and the assimilation module is conducted exclusively via standard input and output files of the model. This non-intrusive approach is tested with the comprehensive 3D lake and shallow sea model COHERENS that is used to forecast and assimilate turbidity in lake Säkylän Pyhäjärvi in Finland, using both sparse satellite images and continuous real-time point measurements as observations.

  18. Hybrid Optimization of Support Vector Machine for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    XI Fu-li; YU Song-nian; HAO Wei

    2005-01-01

    Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques. But the randomicity of parameter selection in its implement often prevents it achieving expected performance. By utilizing genetic algorithm (GA) to optimize the parameters in data preprocessing and the training model of SVM simultaneously, a hybrid optimization algorithm is proposed in the paper to address this problem. The experimental results demonstrate that it's an effective method and can improve the perfornance of SVM-based intrusion detection system further.

  19. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  20. Research and Implementation of Unsupervised Clustering-Based Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Luo Min; Zhang Huan-guo; Wang Li-na

    2003-01-01

    An unsupervised clustering-based intrusion de tection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. With the classified data instances, anomaly data clusters can be easily identified by normal cluster ratio and the identified cluster can be used in real data detection. The benefit of the algorithm is that it doesnt need labeled training data sets. The experiment concludes that this approach can detect unknown intrusions efficiently in the real network connections via using the data sets of KDD99.

  1. Research and Implementation of Unsupervised Clustering-Based Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    LuoMin; ZhangHuan-guo; WangLi-na

    2003-01-01

    An unsupervised clustering-based intrusion detection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. With the classified data instances, anomaly data clusters can be easily identified by normal duster ratio and the identified cluster can be used in real data detection. The benefit of the algorithm is that it doesn't need labeled training data sets. The experiment coneludes that this approach can detect unknown intrusions efficiently in the real network connections via using the data sets of KDD99.

  2. SEAWATER INTRUSION TYPES AND REGIONAL DIVISIONS IN THE SOUTHERN COAST OF LAIZHOU BAY

    Institute of Scientific and Technical Information of China (English)

    孟广兰; 韩有松; 王少青; 王珍岩

    2002-01-01

    The southern coast of Laizhou Bay, Bohai Sea, is one of the areas in China most seriously impacted by seawater intrusion. Based on the sources of intruding wate rbodies, seawater intrusion can be divided into two types: intrusion of saline water derived from modern seawater, and intrusion of subsurface brine and saline water derived from paleo-seawater in shallow Quaternary sediments. There are so me distinct differences in their formation, mechanism and damage. The subsurface brine intrusion is a special typ e, which can cause very serious disaster.The coastal landform and the Quaternary hydrogeological environment are pr edominant factors in the classification of seawater intrusion types. Various coastal environments in diff erent coastal sections result in three types of intrusion: seawater intrusion, saline groundwater intrusion, and mixed seawater and saline water intrusion, in the southern coast of Laizhou Bay, which can be divided into four areas: the seawater intrusion area in the northern Laizhou City coast, the mixed seawater and saline groundwater in trusion area in the Baisha River-Jiaolai River mouth plain area, the mixed seawater and saline groundwater intrus ion area in the Weihe River mouth plain area northern Changyi county coast, and the saline groundwater intrusion area in the northern Shouguang plains.

  3. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  4. Geology and Geochemistry of Reworking Gold Deposits in Intrusive Rocks of China—Ⅰ. Features of the Intrusive Rocks

    Institute of Scientific and Technical Information of China (English)

    王秀璋; 程景平; 等

    1998-01-01

    Most gold deposits in intrusive rocks were formed as a result of reworking processes.the intrusive rocks containing gold deposits and consisting of ultramafic-mafic,intermediateacid and alkaline rocks of the Archean,Proterozoic,Caledonian,Hercynian and Yenshanian periods occur in cratons,activated zones of cratons and fold belts.Among them,ultramaficmafic rocks,diorite,alkaline rocks,and anorthosite are products of remelting in the mantle or mantle-crust or mantle with crustal contamination,However,auriferous intermediate-acid rocks are products of metasomatic-remelting in auriferous volcainc rocks or auriferous volcanosedimentary rocks in the deep crust.

  5. Lunar Intrusive Domes on the Floor of Grimaldi and Near Aristillus

    Science.gov (United States)

    Wöhler, C.; Lena, R.; Pau, K. C.

    2010-03-01

    In this contribution we examine two large lunar domes of probably intrusive origin. The morphometric properties of the domes are derived, and geophysical parameters (intrusion depth, magma pressure) are estimated based on modelling.

  6. 10 CFR 63.321 - Individual protection standard for human intrusion.

    Science.gov (United States)

    2010-01-01

    ... IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.321 Individual protection standard for human intrusion. (a) DOE...

  7. The effect of intrusive orthodontic force on dental pulp of adults versus adolescents

    Directory of Open Access Journals (Sweden)

    Mostafa Abtahi

    2016-01-01

    Conclusion: Mild intrusive force in closed apex teeth causes no significant histologic changes in adolescents and adults. However, it seems that inflammatory-related histologic pulpal changes are more severe in adults after one month of intrusion.

  8. The Phalaborwa Syenite Intrusions along the West-Central Boundary of the Kruger National Park

    Directory of Open Access Journals (Sweden)

    C. Frick

    1986-12-01

    Full Text Available The geology of the Phalaborwa Complex is described and emphasis placed on the distribution of the large number of syenite intrusions. The petrography of the different textural types of syenites is discussed and it is shown that porphyritic, granular, gneissic and hypidiomorphic syenites are present. The petrography shows that the deformation textures, which are present in some of the syenites, may have formed during the emplacement of syenitic magmas which contained a high concentration of crystals. The geochemistry of the syenites is discussed and it is shown that they were not derived from an alkali basaltic magma through fractional crystallisation, but that they may rather represent alkali basaltic magmas which were contaminated by granitic material. The mode of emplacement of the Phalaborwa Complex is discussed and the relationship between the pyroxenites is explained.

  9. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  10. Poseidon: a 2-tier anomaly-based intrusion detection system

    NARCIS (Netherlands)

    Bolzoni, Damiano; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection r

  11. An Overview of IP Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Schaffrath, Gregor; Sadre, Ramin; Morariu, Cristian; Pras, Aiko; Stiller, Burkhard

    2010-01-01

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches,

  12. SSHCure: a flow-based SSH intrusion detection system

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hofstede, Rick; Sperotto, Anna; Sadre, Ramin; Pras, Aiko

    2012-01-01

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  13. Network Intrusion Detection System Based On Machine Learning Algorithms

    Directory of Open Access Journals (Sweden)

    Vipin Das

    2010-12-01

    Full Text Available Network and system security is of paramount importance in the present data communication environment. Hackers and intruders can create many successful attempts to cause the crash of the networks and web services by unauthorized intrusion. New threats and associated solutions to prevent these threats are emerging together with the secured system evolution. Intrusion Detection Systems (IDS are one of these solutions. The main function of Intrusion Detection System is to protect the resources from threats. It analyzes and predicts the behaviours of users, and then these behaviours will be considered an attack or a normal behaviour. We use Rough Set Theory (RST and Support Vector Machine (SVM to detect network intrusions. First, packets are captured from the network, RST is used to pre-process the data and reduce the dimensions. The features selected by RST will be sent to SVM model to learn and test respectively. The method is effective to decrease the space density of data. The experiments compare the results with Principal Component Analysis (PCA and show RST and SVM schema could reduce the false positive rate and increase the accuracy.

  14. Corporate Mergers in the Publishing Industry: Helpful or Intrusive?

    Science.gov (United States)

    Rudman, Herbert C.

    1990-01-01

    Examines the effects of corporate mergers in the publishing industry on the publishing of textbooks and standardized tests. Concludes that restructuring, acquisitions, and mergers have an intrusive effect on established practices of academic publishing and may severely limit the access of scholars to the academic marketplace. (FMW)

  15. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    NARCIS (Netherlands)

    Picone, S.; Valstar, J.R.; Gaans, van P.; Grotenhuis, J.T.C.; Rijnaarts, H.H.M.

    2012-01-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the v

  16. MULTI SCALE TIME SERIES PREDICTION FOR INTRUSION DETECTION

    Directory of Open Access Journals (Sweden)

    G. Palanivel

    2014-01-01

    Full Text Available We propose an anomaly-based network intrusion detection system, which analyzes traffic features to detect anomalies. The proposed system can be used both in online as well as off-line mode for detecting deviations from the expected behavior. Although our approach uses network packet or flow data, it is general enough to be adaptable for use with any other network variable, which may be used as a signal for anomaly detection. It differs from most existing approaches in its use of wavelet transform for generating different time scales for a signal and using these scales as an input to a two-stage neural network predictor. The predictor predicts the expected signal value and labels considerable deviations from this value as anomalies. The primary contribution of our work would be to empirically evaluate the effectiveness of multi resolution analysis as an input to neural network prediction engine specifically for the purpose of intrusion detection. The role of Intrusion Detection Systems (IDSs, as special-purpose devices to detect anomalies and attacks in a network, is becoming more important. First, anomaly-based methods cannot achieve an outstanding performance without a comprehensive labeled and up-to-date training set with all different attack types, which is very costly and time-consuming to create if not impossible. Second, efficient and effective fusion of several detection technologies becomes a big challenge for building an operational hybrid intrusion detection system.

  17. Misleading reconstruction of seawater intrusion via integral depth sampling

    Science.gov (United States)

    Colombani, N.; Volta, G.; Osti, A.; Mastrocicco, M.

    2016-05-01

    Saltwater intrusion in coastal aquifers is an urgent issue for the actual and future groundwater supply and a detailed characterization of groundwater quality with depth is a fundamental prerequisite to correctly distinguish salinization processes. In this study, interpolated Cl- maps of the Po River delta coastal aquifer (Italy), gained with Integrated Depth Sampling (IDS) and Multi-Level Sampling (MLS) techniques, are compared. The data set used to build up the IDS and MLS interpolated Cl- maps come from numerous monitoring campaigns on surface and ground waters, covering the time frame from 2010 to 2014. The IDS interpolated Cl- map recalls the phenomenon of actual seawater intrusion, with Cl- concentration never exceeding that of seawater and the absence of hypersaline groundwater all over the study area. On the contrary, in the MLS interpolated Cl- maps the lower portion of the unconfined aquifer presents hypersaline groundwater making it necessary to consider salinization processes other than actual seawater intrusion, like upward flux from a saline aquitard. Results demonstrate the obligation of using MLS in reconstructing a reliable representation of the distribution of salinity, especially in areas where the density contrast between fresh and saline groundwater is large. Implications of the reported field case are not limited to the local situation but have a wider significance, since the IDS technique is often employed in saltwater intrusion monitoring even in recent works, with detrimental effect on the sustainable water resource management of coastal aquifers.

  18. Extension by faulting, stretching and magma intrusion in Ethiopia

    Science.gov (United States)

    Bastow, I. D.; Keir, D.

    2012-12-01

    The 2001-2004 Ethiopia Afar Geoscientific Lithospheric Experiment showed that high seismic wavespeed, dense, mafic crustal intrusions exist beneath many zones of Quaternary magmatism in the Main Ethiopian rift, and that crustal thinning is minimal. From these observations, a consensus quickly emerged that extension presently occurs not by ductile stretching and brittle faulting but by magma intrusion. Striking InSAR images and accompanying seismic data from the 2005 Afar diking episode provided further compelling evidence in support of the magma assisted rifting hypothesis. Patterns of mantle seismic anisotropy, constrained by a combination of body and surface-wave analysis showed that melt intrusion likely also plays an important role in accommodating extension at greater depths in the extending plate. Evidence from further north in Afar, however, where crustal thickness decreases abruptly into the Danakil Depression, is not so easily explained by the magma assisted rifting hypothesis. Subsidence of the newly forming margin towards and below sea level, and eruption of voluminous basalt flows, is likely the result of late-stage thinning of the heavily intruded, weakened plate just before the onset of seafloor spreading. Faulting, stretching and magma intrusion are thus each important, but at different times during breakup. Combining, not isolating, these mechanisms of strain in new rifting models and appreciating how plate strength varies during rifting is essential in developing a clearer understanding of the incomplete geological record that documents continental breakup over time.

  19. Predicting The Intrusion Layer From Deep Ocean Oil Spills

    Science.gov (United States)

    Wang, Dayang; Chow, Aaron; Adams, E. Eric

    2015-11-01

    Oil spills from deep ocean blowout events motivate our study of multiphase plumes in a water column. Key to understanding the long-term fate of these plumes is the ability to predict the depth and persistence of intrusion layers. While intrusion layers from multiphase plumes have been studied under stagnant conditions, their behavior in the presence of crossflow, especially in mild crossflow, remains poorly understood. The classical classification of plume behavior identifies two regimes: crossflow-dominant and stratification-dominant--but it does not account for the interplay between the two effects, leaving the transition region unexplored. We conduct laboratory tank experiments to investigate the behavior of intrusion layers under the simultaneous action of crossflow and stratification. Our experiments use an inverted frame of reference, using glass beads with a range of sizes to simulate oil droplets. We find that crossflow creates enhanced mixing, which in turn leads to a shallower intrusion layer of the released fluid (correspondingly, a deeper layer in the case of a deep ocean blowout). We develop a mathematical formulation that extends previous models to account for crossflow effects, and use field observations to validate the analytical and experimental findings.

  20. Revisiting anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, Damiano

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  1. SSHCure: SSH Intrusion Detection using NetFlow and IPFIX

    NARCIS (Netherlands)

    Hendriks, Luuk; Hofstede, Rick; Sperotto, Anna; Pras, Aiko

    2014-01-01

    With this poster, we present our SSH Intrusion Detection System named SSHCure: it is the first IDS capable of distinguishing successful attacks from unsuccessful attacks, thus detecting actual compromises. As powerful as SSH is to administrators, as attractive it is to anyone with malicious intents.

  2. Mitigating Intrusion and Vulnerabilities in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    I. Ohaeri

    Full Text Available The deployment of Cognitive Radio Networks has been greatly hindered in spite of its potentials by the rate at which intrusions and vulnerabilities replicate within every domain of the network. Cognitive Radio Network is expected to drive the next generat ...

  3. Implementation of Network Intrusion Detection System Based on Density-based Outliers Mining

    Institute of Scientific and Technical Information of China (English)

    Huang,Guangqiu; Peng,Xuyou; LV,Dingquan

    2005-01-01

    The paper puts forward a new method of densitybased anomaly data mining, the method is used to design the engine of network intrusion detection system (NIDS), thus a new NIDS is constructed based on the engine. The NIDS can find new unknown intrusion behaviors, which are used to updated the intrusion rule-base, based on which intrusion detections can be carried out online by the BM pattern match algorithm. Finally all modules of the NIDS are described by formalized language.

  4. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  5. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  6. A reactive transport investigation of a seawater intrusion experiment in a shallow aquifer, Skansehage Denmark

    DEFF Research Database (Denmark)

    Christensen, Flemming Damgaard; Engesgaard, Peter Knudegaard; Kipp, K.L.

    2001-01-01

    Previous investigations on seawater intrusion have mainly focused on either the physical density flow system with transport of a single non-reactive species or focused on the geochemical aspects neglecting density effects. This study focuses on both the geochemical and physical aspects of seawater...... intrusion and their interaction during an intrusion experiment in a shallow, small-scale coastal aquifer in Denmark....

  7. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    Science.gov (United States)

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  8. Experimental effects of pressure and fluorine on apatite saturation in mafic magmas, with reference to layered intrusions and massif anorthosites

    Science.gov (United States)

    Tollari, N.; Baker, D. R.; Barnes, S.-J.

    2008-08-01

    Apatite is a cumulate phase in the upper parts of some mafic layered intrusions and anorthositic complexes. We investigated the effect of pressure and fluorine on apatite saturation in mafic magmas to better understand under which conditions this mineral crystallizes. Apatite saturation gives information about the formation of silicate rocks, and is of interest in explaining the formation of apatite-oxide-rich rocks (e.g. nelsonites comprising approximately, one-third apatite and two-third Fe-Ti oxide). Two models of formation are proposed for this rock type: crystal fractionation followed by accumulation of apatite and Fe-Ti oxides and liquid immiscibility. New experiments carried out with mafic compositions at 500 MPa confirm that the most important variables on phosphate saturation are SiO2 and CaO. Fluorine addition leads to apatite saturation at lower SiO2 and higher CaO concentrations. Comparison of our results with those of previous experimental studies on liquid-liquid immiscibility at upper-to-mid-crustal conditions allows us to investigate the relative importance of apatite saturation versus liquid-liquid immiscibility in the petrogenesis of nelsonites and similar rocks. The liquid line of descent of three natural examples studied (the Sept-Îles intrusive suite, the anorthositic Complex of the Lac-St-Jean and the Skaergaard layered intrusion) do not cross the liquid-liquid immiscibility field before they reach apatite saturation. Thus, the apatite-oxide-rich rock associated with these three intrusive suites are best explained by crystal fractionation followed by accumulation of apatite and Fe-Ti oxides.

  9. Disequilibrium dihedral angles in layered intrusions: the microstructural record of fractionation

    Science.gov (United States)

    Holness, Marian; Namur, Olivier; Cawthorn, Grant

    2013-04-01

    The dihedral angle formed at junctions between two plagioclase grains and a grain of augite is only rarely in textural equilibrium in gabbros from km-scale crustal layered intrusions. The median of a population of these disequilibrium angles, Θcpp, varies systematically within individual layered intrusions, remaining constant over large stretches of stratigraphy with significant increases or decreases associated with the addition or reduction respectively of the number of phases on the liquidus of the bulk magma. The step-wise changes in Θcpp are present in Upper Zone of the Bushveld Complex, the Megacyclic Unit I of the Sept Iles Intrusion, and the Layered Series of the Skaergaard Intrusion. The plagioclase-bearing cumulates of Rum have a bimodal distribution of Θcpp, dependent on whether the cumulus assemblage includes clinopyroxene. The presence of the step-wise changes is independent of the order of arrival of cumulus phases and of the composition of either the cumulus phases or the interstitial liquid inferred to be present in the crystal mush. Step-wise changes in the rate of change in enthalpy with temperature (ΔH) of the cooling and crystallizing magma correspond to the observed variation of Θcpp, with increases of both ΔH and Θcpp associated with the addition of another liquidus phase, and decreases of both associated with the removal of a liquidus phase. The replacement of one phase by another (e.g. olivine ⇔ orthpyroxene) has little effect on ΔH and no discernible effect on Θcpp. An increase of ΔH is manifest by an increase in the fraction of the total enthalpy budget that is the latent heat of crystallization (the fractional latent heat). It also results in an increase in the amount crystallized in each incremental temperature drop (the crystal productivity). An increased fractional latent heat and crystal productivity result in an increased rate of plagioclase growth compared to that of augite during the final stages of solidification

  10. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora Group, Chhattisgarh Supergroup, India: Implications towards non-plume intrusive activity

    Indian Academy of Sciences (India)

    Priyabrata Das; Kaushik Das; Partha Pratim Chakraborty; S Balakrishnan

    2011-04-01

    Besides offering significant clues towards tracking the geochemical evolution of the mantle and architectural reconstruction of different ‘supercontinent’, geochronological and geochemical appraisal of igneous inputs are also important to bracket the depositional time frame of any lithopackage, particularly, the unfossiliferous sedimentary successions. The present study deals with diabasic intrusive within Mesoproterozoic Saraipalli Formation, which is an argillaceous constituent present at the basal part of nearly 400 m thick four-tiered unmetamorphosed but deformed sedimentary succession of Singhora Group, Chhattisgarh Supergroup, central India. The SE–NW trending intrusive comprises mainly of plagioclase and augite together with minor orthopyroxene, biotite and opaque minerals. Though some plagioclase laths are partially sericitized, the ophitic-to-subophitic texture of the rock is well preserved. Major and trace element geochemical data indicate that this intrusive is basalt-to-basaltic andesite in character and of subalkaline basalt affinity. Multi-element plot shows overall LILE-enrichment and enrichment of Pb and slight depletion of Nb and P, coupled with moderate La/Nb and Th/Nb ratios. Zr, Y and Nb ternary diagrams plot in the fields of within plate basalt. Selected HFSE ratios indicate a non-plume source with crustal assimilation/sediment mixing. Sm–Nd and Rb–Sr isotope data show that the intrusive has Srinitial and Ndinitial of 0.709377–0.706672 and 0.510919–0.510815, respectively. Positive tNd [t = 1420 Ma] values (+0.3 to + 2.3) indicate depleted isotopic nature of their protolith. The calculated DM age is 1.7–1.9 Ga. The mineral-whole rock isochron data (Sm–Nd systematics) of the intrusive implies an emplacement age of ca. 1420 Ma. Considering synchronous terrain boundary shear zone development in Bastar craton on the southeastern part of the Singhora basin, mafic magmatism in Eastern Ghats and large-scale basic intrusion in Sausar

  11. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis

    2017-01-09

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin\\'s shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  12. The intrusive complexof the Island of Giglio: geomagnetic characteristics of plutonic facies with low susceptibility contrast

    Directory of Open Access Journals (Sweden)

    R. Cavallini

    1998-06-01

    Full Text Available Two main plutonic facies characterize the intrusive complex of the Island of Giglio, and the trend of their contact at depth has been modelled using a 2D½ analysis based on a detailed geomagnetic survey in order to verify the geological hypothesis of the subsurface geometry of this contact. The magnetic anomaly connected with the discontinuity is quite low, due to the small difference between the magnetic susceptibilities of the two granitic facies. Development of this model of inversion of the magnetic field, which is in good agreement with the geological interpretation, was made possible by: 1 accurate control of the geomagnetic time variations and consequent temporal reduction, 2 a very low level of the artificial magnetic noise, 3 high density of the magnetic survey, 4 detailed knowledge of the mapped geologic contact between facies and of their petrologic characteristics, and 5 direct local measurements of the magnetic susceptibilities of the key lithologies. The model shows the trends of the geological contact, as projected in three E-W sections, that dips eastward in the range between 210 and 540, supporting the geologic hypothesis that the Pietrabona facies represents an external shell of the shallowly emplaced Giglio monzogranite intrusion.

  13. Quantifying crustal response to deep active intrusions with geodesy-based finite element modeling

    Science.gov (United States)

    Henderson, S. T.; Pritchard, M. E.; Elliott, J.

    2013-12-01

    The Altiplano-Puna Volcanic Complex (APVC, 21-24 S, 66-69 W) is a first order feature of the Central Andes Volcanic Arc. The APVC consists of over 10,000 km^3 of dacitic ignimbrites deposited in the late Miocene, making it one of the largest concentrations of silicic volcanism in the world. The persistent and intense magmatic flux in this region has likely contributed to the thickened crust (50-70 km), elevated geotherm (>50 C/km) and extensive partial melt (mass balance between source and sink reservoirs, and require physically realistic rheological parameters of the crust. Modeling is performed with Pylith finite element software on a cylindrical three dimensional domain with a radius of 300 km and depth of 200 km. Our models assume pressurization in a viscoelastic crust, and therefore describe crustal response rather than dynamic processes of fluid creation and motion. Surface deformation timescales are highly dependent on geothermal gradient and source pressurization history. While still inconclusive, the potential for an abrupt end to surface deformation has important implications for the characterization of creep versus relaxation processes occurring in response to deep intrusions. Ultimately, crustal scale numerical models provide a means to check petrologically-derived depths of fluid accumulation, in addition to theoretical estimates of softening that occurs with distributed partial melt. The specific models presented are tuned to the subsurface conditions of the APVC, but may be relevant to arc intrusions below the brittle-ductile transition elsewhere.

  14. EARLY WARNING MODEL OF NETWORK INTRUSION BASED ON D-S EVIDENCE THEORY

    Institute of Scientific and Technical Information of China (English)

    Tian Junfeng; Zhai Jianqiang; Du Ruizhong; Huang Jiancai

    2005-01-01

    Application of data fusion technique in intrusion detection is the trend of nextgeneration Intrusion Detection System (IDS). In network security, adopting security early warning technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and situation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accordingly.

  15. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik;

    2016-01-01

    Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non......-intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results...

  16. A Real Time Intrusion Aggregation And Prevention Technique

    Directory of Open Access Journals (Sweden)

    Fouzia Sultana

    2013-03-01

    Full Text Available Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts produced by low-level intrusion detection systems, firewalls, etc. belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. Thus, meta-alerts can be generated for the clusters that contain all the relevant information whereas the amount of data (i.e., alerts can be reduced substantially. Meta-alerts may then be the basis for reporting to security experts or for communication within a distributed intrusion detection system. We propose a novel technique for online alert aggregation which is based on a dynamic, probabilistic model of the current attack situation. Basically, it can be regarded as a data stream version of a maximum likelihood approach for the estimation of the model parameters. With three benchmark data sets, we demonstrate that it is possible to achieve reduction rates of up to 99.96 percent while the number of missing meta-alerts is extremely low. In addition, meta-alerts are generated with a delay of typically only a few seconds after observing the first alert belonging to a new attack instance. Two types of intrusions are detected in this work: Firstly a spam attack is detected based on the blacklisted IP addresses from Stop Forum Spam and secondly packet level intrusion is detected based on KDDcup data. A packet sniffer is designed which keeps sniffing and extracting all the packets that are exchanged over internet interface. The packets are filtered and the headers are extracted. The headers are further subdivided into TCP, IP and UDP headers. ICMP packets are then separated. The data is matched with the database intrusion entries using fast string matching techniques and possible attack entries are marked with different color codes. An attack signature may be visible in any header of the same packet. In such cases, the alerts are aggregated and a single

  17. Layered basic complex in oceanic crust, romanche fracture, equatorial atlantic ocean.

    Science.gov (United States)

    Melson, W G; Thompson, G

    1970-05-15

    A layered, basic igneous intrusion, analogous in mineralogy and texture to certain large, continental layered complexes, is exposed in the Romanche Fracture, equatorial Atlantic Ocean. Crustal intrusion of large masses of basic magmas with their subsequent gravity differentiation is probably one of a number of major processes involved in the formation of new oceanic crust during sea-floor spreading.

  18. A Pattern Matching Algorithm for Reducing False Positive in Signature Based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    T. Sree Kala,

    2016-04-01

    Full Text Available Nowadays the organizations are facing the number of threats every day in the form of viruses and attack etc. Since many different mechanisms were preferred by organizations in the form of intrusion detection and prevention system to protect its organizations from these kinds of attacks. Intrusion Detection System (IDS is considered as a system integrated with intelligent subsystems. In this paper the signature based intrusion detection system is discussed. There are different pattern matching algorithms available to detect intrusion. Brute force and Knuth-Morris-Pratt are the single keyword pattern matching algorithms. If one or more occurrence of pattern present in the input text, then there is an intrusion and the intrusion alarm will be sent. The occurrence of false alarm will be high in intrusion detection. In this paper the string matching algorithm to reduce the percentage of false alarm will be discussed.

  19. Management of intrusive luxation with immediate surgical repositioning

    Directory of Open Access Journals (Sweden)

    Mazumdar Dibyendu

    2009-01-01

    Full Text Available Intrusive luxation is one of the most severe forms of traumatic injuries in which the affected tooth is forced to displace deeper into the alveolus. As a consequence of this type of injury, maximum damage occurs to the pulp and all the supporting structures. This report presents a case of severe intrusive luxation of mature maxillary central and lateral incisor in a 40-year-old male. The intruded tooth was immediately repositioned (surgical extrusion and splinted within hours following injury. Antibiotic therapy was initiated at the time of repositioning and maintained for 5 days. Pulp removal and calcium hydroxide treatment of the root canal was carried out after repositioning. Splint was removed 2 months later. Definitive root canal treatment with Gutta percha was accomplished at a later appointment. Clinical and radiographic examination 6, 12 and 24 months after the surgical extrusion revealed satisfactory progressive apical and periodontal healing.

  20. Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Hossein Jadidoleslamy

    2012-09-01

    Full Text Available One of most important existent issues in information security application domain is Intrusion Detection System (IDS; IDS is a defensive-aggressive system to protect information, verifying and responding tooccurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and trackingprevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.

  1. A Neural Network Approach for Misuse and Anomaly Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    YAO Yu; YU Ge; GAO Fu-xiang

    2005-01-01

    An MLP(Multi-Layer Perceptron)/Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MLP and the memorial functionality of Elman. The system's sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced.

  2. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field with sca......Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... with scanning electron microscopy coupled to energy dispersive X-ray spectroscopy, chromatographic and spectrophotometric methods, and stable isotope tracing coupled with a mass balance of sulfur compounds. We found that Z. marina detoxified gaseous sediment-derived sulfide through incorporation and that most...

  3. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  4. Vapor intrusion in soils with multimodal pore-size distribution

    Directory of Open Access Journals (Sweden)

    Alfaro Soto Miguel

    2016-01-01

    Full Text Available The Johnson and Ettinger [1] model and its extensions are at this time the most widely used algorithms for estimating subsurface vapor intrusion into buildings (API [2]. The functions which describe capillary pressure curves are utilized in quantitative analyses, although these are applicable for porous media with a unimodal or lognormal pore-size distribution. However, unaltered soils may have a heterogeneous pore distribution and consequently a multimodal pore-size distribution [3], which may be the result of specific granulometry or the formation of secondary porosity related to genetic processes. The present paper was designed to present the application of the Vapor Intrusion Model (SVI_Model to unsaturated soils with multimodal pore-size distribution. Simulations with data from the literature show that the use of a multimodal model in soils with such pore distribution characteristics could provide more reliable results for indoor air concentration, rather than conventional models.

  5. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-04-19

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  6. Intrusion Protection against SQL Injection Attacks Using a Reverse Proxy

    Directory of Open Access Journals (Sweden)

    S. Fouzul Hidhaya

    2012-07-01

    Full Text Available In this era where Internet has captured the world, level of security that this Internet provides has not grown as fast as the Internet application. Internet has eased the life of human in numerous ways, but the drawbacks like the intrusions that are attached with the Internet applications sustains the growth of these applications. One such intrusion is the SQL Injection attacks (SQLIA. Since SQLIA contributes 25% of the total Internet attacks, much research is being carried out in this area. In this paper we propose a method to detect the SQL injection. We use a Reverse proxy and MD5 algorithm to check out SQL injection in user input. Using grammar expressions rules we check for SQL injection in URL’s. This system has been tested on standard test bed applications and our work has shown significant improvement detecting and curbing the SQLIA.

  7. IDPS: An Integrated Intrusion Handling Model for Cloud

    CERN Document Server

    Alsafi, Hassen Mohammed; Pathan, Al-Sakib Khan

    2012-01-01

    Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. In spite of being attractive, Cloud feature poses various new security threats and challenges when it comes to deploying Intrusion Detection System (IDS) in Cloud environments. Most Intrusion Detection Systems (IDSs) are designed to handle specific types of attacks. It is evident that no single technique can guarantee protection against future attacks. Hence, there is a need for an integrated scheme which can provide robust protection against a complete spectrum of threats. On the other hand, there is great need for technology that enables the network and its hosts to defend themselves with s...

  8. A survey on RBF Neural Network for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Henali Sheth

    2014-12-01

    Full Text Available Network security is a hot burning issue nowadays. With the help of technology advancement intruders or hackers are adopting new methods to create different attacks in order to harm network security. Intrusion detection system (IDS is a kind of security software which inspects all incoming and outgoing network traffic and it will generate alerts if any attack or unusual behavior is found in a network. Various approaches are used for IDS such as data mining, neural network, genetic and statistical approach. Among this Neural Network is more suitable approach for IDS. This paper describes RBF neural network approach for Intrusion detection system. RBF is a feed forward and supervise technique of neural network.RBF approach has good classification ability but its performance depends on its parameters. Based on survey we find that RBF approach has some short comings. In order to overcome this we need to do proper optimization of RBF parameters.

  9. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  10. NETWORK INTRUSION DETECTION METHOD BASED ON RS-MSVM

    Institute of Scientific and Technical Information of China (English)

    Xiao Yun; Han Chongzhao; Zheng Qinghua; Zhang Junjie

    2006-01-01

    A new method called RS-MSVM (Rough Set and Multi-class Support Vector Machine) is proposed for network intrusion detection. This method is based on rough set followed by MSVM for attribute reduction and classification respectively. The number of attributes of the network data used in this paper is reduced from 41 to 30 using rough set theory. The kernel function of HVDM-RBF (Heterogeneous Value Difference Metric Radial Basis Function), based on the heterogeneous value difference metric of heterogeneous datasets, is constructed for the heterogeneous network data. HVDM-RBF and one-against-one method are applied to build MSVM. DARPA (Defense Advanced Research Projects Agency) intrusion detection evaluating data were used in the experiment. The testing results show that our method outperforms other methods mentioned in this paper on six aspects: detection accuracy, number of support vectors, false positive rate, false negative rate, training time and testing time.

  11. Integrating Innate and Adaptive Immunity for Intrusion Detection

    CERN Document Server

    Tedesco, Gianni; Aickelin, Uwe

    2010-01-01

    Network Intrusion Detection Systems (NDIS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS's rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alters, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to an intrusion detection problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

  12. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  13. An Efficient Fuzzy Clustering-Based Approach for Intrusion Detection

    CERN Document Server

    Nguyen, Huu Hoa; Darmont, Jérôme

    2011-01-01

    The need to increase accuracy in detecting sophisticated cyber attacks poses a great challenge not only to the research community but also to corporations. So far, many approaches have been proposed to cope with this threat. Among them, data mining has brought on remarkable contributions to the intrusion detection problem. However, the generalization ability of data mining-based methods remains limited, and hence detecting sophisticated attacks remains a tough task. In this thread, we present a novel method based on both clustering and classification for developing an efficient intrusion detection system (IDS). The key idea is to take useful information exploited from fuzzy clustering into account for the process of building an IDS. To this aim, we first present cornerstones to construct additional cluster features for a training set. Then, we come up with an algorithm to generate an IDS based on such cluster features and the original input features. Finally, we experimentally prove that our method outperform...

  14. Enhancing Battlemind: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2015-09-01

    condition [t = -2.15, p = .03; t = -1.93, p = .05, respectively]. D AS S- An xi et y Ra ng e 0- 21 Results Depression, Anxiety, and Stress Scale ( DASS ...and interference) caused by the intrusions. The EIS has demonstrated good internal consistency and excellent test-retest reliability, as well as...PTSD. (32) General Psychological Symptoms. The Depression Anxiety Stress Scales- 21 ( DASS - 21 ) (33) is a 21 -item measure that distinguishes between

  15. Medical image of the week: alpha intrusion into REM sleep

    OpenAIRE

    Shetty S; Le T

    2015-01-01

    A 45-year-old woman with a past medical history of hypertension and chronic headaches was referred to the sleep laboratory for high clinical suspicion for sleep apnea based on a history of snoring, witnessed apnea and excessive daytime sleepiness. An overnight sleep study was performed. Images during N3 Sleep and REM sleep are shown (Figures 1 and 2). Alpha intrusion in delta sleep is seen in patients with fibromyalgia, depression, chronic fatigue syndrome, anxiety disorder, and primary sleep...

  16. Bounded Error Approximation Algorithms for Risk-Based Intrusion Response

    Science.gov (United States)

    2015-09-17

    bipartite graphs. Prior to our work, intrusion response had not been studied within a graph- theoretic framework. Some of our important contributions...include: (a) The partial vertex cover problem for matchings (PVCM) is poly time solvable, if either the vertices or the edges are weighted, but NP- hard , if...WPVCM is NP- hard . This means that partial vertex cover problem is unlikely to be solved exactly in polynomial time for vertex-weighted and edge

  17. Relationship between vapor intrusion and human exposure to trichloroethylene

    OpenAIRE

    ARCHER, NATALIE P.; BRADFORD, CARRIE M.; VILLANACCI, JOHN F.; CRAIN, NEIL E.; Corsi, Richard L; Chambers, David M.; BURK, TONIA; Blount, Benjamin C.

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and aro...

  18. Vapor intrusion in soils with multimodal pore-size distribution

    OpenAIRE

    Alfaro Soto Miguel; Hung Kiang Chang

    2016-01-01

    The Johnson and Ettinger [1] model and its extensions are at this time the most widely used algorithms for estimating subsurface vapor intrusion into buildings (API [2]). The functions which describe capillary pressure curves are utilized in quantitative analyses, although these are applicable for porous media with a unimodal or lognormal pore-size distribution. However, unaltered soils may have a heterogeneous pore distribution and consequently a multimodal pore-size distribution [3], which ...

  19. Animal intrusion status report for fiscal year 1989

    Energy Technology Data Exchange (ETDEWEB)

    Landeen, D.S.

    1990-08-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  20. Resilient Intrusion Tolerance through Proactive and Reactive Recovery

    OpenAIRE

    Sousa, Paulo; Bessani, Alysson Neves; Correia, Miguel; Neves, Nuno Ferreira; Veríssimo, Paulo

    2007-01-01

    Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as recoveries are faster than an upper-bound on fault production assumed at system deployment time. In this work, we propose a complementary approach that combines proactive recovery with services that allow correct replicas to react and recover replicas that they detect or suspect to be compromised. One key feature of our proactive-react...

  1. Probabilistic risk assessment for six vapour intrusion algorithms

    OpenAIRE

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against observed concentrations for benzene, ethylbenzene and trichloroethylene. The screening-level algorithms are ranked according to accuracy and conservatism in predicting observed soil air and indoor air ...

  2. PREDICTING THE CONSEQUENCES OF SEAWATER INTRUSION AND PROTECTION PROJECTS

    Institute of Scientific and Technical Information of China (English)

    袁益让; 梁栋; 芮洪兴

    2001-01-01

    The simulation of this process and the effects of protection irojects lays the foundation of its effective control and defence. The mathematical model of the problem and upwind splitting alternating direction method were presented. Using this method, the numerical simulation of seawater intrusion in Laizhou Bay Area of Shandong Provivce was finished. The numerical results turned out to be identical with the real measurements, so the prediction of the consequences of protection projectects is reasonable.

  3. Intrusion Detection System Using Hierarchical GMM and Dimensionality Reduction

    Directory of Open Access Journals (Sweden)

    L. Maria Michael

    2012-07-01

    Full Text Available The focus of this chapter is to provide the effective intrusion detection technique to protect Web server. The IDS protects an server from malicious attacks from the Internet if someone tries to break in through the firewall and tries to have access on any system in the trusted side and alerts the system administrator in case there is a breach in security. Gaussian Mixture Models (GMMs are among the most statistically mature methods for clustering the data. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection model is to collect behavioral features of non-normal operation and establish related feature library. In the existing system of anomaly based Intrusion Detection System, the work is based on the number of attacks on the network and using decision tree analysis for rule matching and grading. We are proposing an IDS approach that will use signature based and anomaly based identification scheme. And we are also proposing the rule pruning scheme with GMM(Gaussian Mixture Model. It does facilitate efficient way of handling large amount of rules. And we are planned to compare the performance of the IDS on different models. The Dimension Reduction focuses on using information obtained KDD Cup 99 data set for the selection of attributes to identify the type of attacks. The dimensionality reduction is performed on 41 attributes to 14 and 7 attributes based on Best First Search method and then apply the two classifying Algorithms ID3 and J48 Keywords-Intrusion detection, reliable networks, malicious routers, internet dependability, tolerance.

  4. Dynamic Probing for Intrusion Detection under Resource Constraints

    Science.gov (United States)

    2013-06-01

    performance measure of regret, defined as the performance loss compared to that of a genie who knows the entire attack processes a priori and probes...performance as that of the omniscient genie . Index Terms—Intrusion detection, dynamic probing, non- stochastic multi-armed bandit, regret. I...dynamic probing strategy under the performance measure of regret, de ned as the performance loss compared to that of a genie who knows the entire attack

  5. Geologic and geophysical investigations of Climax stock intrusive, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1983-12-31

    This document contains three parts of a survey of Climax stock intrusive, Nevada by the US Geological Survey. The first contains the results of a conventional survey of the site and an investigation of rock composition. The second contains the results of a gravity survey and the third contains the results of a magnetic aerial survey. Each of the three documents contains a separate abstract.

  6. A Novel Approach For Protecting Exposed Intranet From Intrusions

    Directory of Open Access Journals (Sweden)

    K.B.Chandradeep

    2010-07-01

    Full Text Available This paper proposes a novel approach for protecting groups of computers in an intranet from maliciousattacks. The proposed scheme uses a distributed intrusion detection system as the primary source ofsecurity mechanism along with micro-firewalls at the host level to enable dynamic policy update for theintranet as and when the threat pattern changes. The authentication mechanism used for authenticatingthe hosts along with the communication mechanism used for communicating the policy update to thehosts is presented.

  7. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    OpenAIRE

    Rung-Ching Chen; Chia-Fen Hsieh; Yung-Fa Huang

    2010-01-01

    A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject ...

  8. A Subset Feature Elimination Mechanism for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Herve Nkiama

    2016-04-01

    Full Text Available several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the emergence of new technologies such as Cloud Computing or Big Data, large amount of network traffic are generated and the intrusion detection system must dynamically collected and analyzed the data produce by the incoming traffic. However in a large dataset not all features contribute to represent the traffic, therefore reducing and selecting a number of adequate features may improve the speed and accuracy of the intrusion detection system. In this study, a feature selection mechanism has been proposed which aims to eliminate non-relevant features as well as identify the features which will contribute to improve the detection rate, based on the score each features have established during the selection process. To achieve that objective, a recursive feature elimination process was employed and associated with a decision tree based classifier and later on, the suitable relevant features were identified. This approach was applied on the NSL-KDD dataset which is an improved version of the previous KDD 1999 Dataset, scikit-learn that is a machine learning library written in python was used in this paper. Using this approach, relevant features were identified inside the dataset and the accuracy rate was improved. These results lend to support the idea that features selection improve significantly the classifier performance. Understanding the factors that help identify relevant features will allow the design of a better intrusion detection system.

  9. Intrusion Detection Forecasting Using Time Series for Improving Cyber Defence

    OpenAIRE

    Abdullah, Azween Bin; Pillai, Thulasyammal Ramiah; Cai, Long Zheng

    2015-01-01

    The strength of time series modeling is generally not used in almost all current intrusion detection and prevention systems. By having time series models, system administrators will be able to better plan resource allocation and system readiness to defend against malicious activities. In this paper, we address the knowledge gap by investigating the possible inclusion of a statistical based time series modeling that can be seamlessly integrated into existing cyber defense system. Cyber-attack ...

  10. A Simulated Multiagent-Based Architecture for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Onashoga S. Adebukola

    2013-04-01

    Full Text Available In this work, a Multiagent-based architecture for Intrusion Detection System (MIDS is proposed to overcome the shortcoming of current Mobile Agent-based Intrusion Detection System. MIDS is divided into three major phases namely: Data gathering, Detection and the Response phases. The data gathering stage involves data collection based on the features in the distributed system and profiling. The data collection components are distributed on both host and network. Closed Pattern Mining (CPM algorithm is introduced for profiling users’ activities in network database. The CPM algorithm is built on the concept of Frequent Pattern-growth algorithm by mining a prefix-tree called CPM-tree, which contains only the closed itemsets and its associated support count. According to the administrator’s specified thresholds, CPM-tree maintains only closed patterns online and incrementally outputs the current closed frequent pattern of users’ activities in real time. MIDS makes use of mobile and static agents to carry out the functions of intrusion detection. Each of these agents is built with rule-based reasoning to autonomously detect intrusions. Java 1.1.8 is chosen as the implementation language and IBM’s Java based mobile agent framework, Aglet 1.0.3 as the platform for running the mobile and static agents. In order to test the robustness of the system, a real-time simulation is carried out on University of Agriculture, Abeokuta (UNAAB network dataset and the results showed an accuracy of 99.94%, False Positive Rate (FPR of 0.13% and False Negative Rate (FNR of 0.04%. This shows an improved performance of MIDS when compared with other known MA-IDSs.

  11. Decision Cost Feature Weighting and Its Application in Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    QIAN Quan; GENG Huan-tong; WANG Xu-fa

    2004-01-01

    This paper introduces the cost-sensitive feature weighting strategy and its application in intrusion detection.Cost factors and cost matrix are proposed to demonstrate the misclassification cost for IDS.How to get the whole minimal risk, is mainly discussed in this paper in detail.From experiments, it shows that although decision cost based weight learning exists somewhat attack misclassification, it can achieve relatively low misclassification costs on the basis of keeping relatively high rate of recognition precision.

  12. Petrological evidence for non-linear increase of magmatic intrusion rates before eruption at open vent mafic volcanoe

    Science.gov (United States)

    Ruth, D. C. S.; Costa Rodriguez, F.

    2015-12-01

    The most active volcanoes on earth erupt in a yearly to decadal time scales, typically erupt mafic magmas and are open-vent systems with prominent degassing plumes (e.g. Mayon, Arenal, Llaima, Etna). Here we investigate the plumbing systems, dynamics, and processes that drive eruptions at these systems. These are key questions for improving hazard evaluation, and better understanding the unrest associated with these types of volcanoes. The petrology and geochemistry from six historical eruptions (1947-2006) of Mayon volcano (Philippines) shows that all lavas are basaltic andesite with phenocrysts of plagioclase + orthopyroxene (Opx) + clinopyroxene. Opx crystals show a variety of compositions and zoning patterns (reverse, normal or complex) with Mg# (= 100 *Mg/[Mg+Fe]) varying from 67 to 81. The simplest interpretation is that the low Mg# parts of the crystals resided on an upper crustal and crystal rich reservoir that was intruded by more primitive magmas from which the high Mg# parts of the crystals grew. Modelling Mg-Fe diffusion in Opx shows that times since magma injection and eruption range from a few days up to 3.5 years in all of the investigated eruptions. The longest diffusion times are shorter than the repose times between the eruptions, which implies that crystal recycling between eruptive events is negligible. This is a surprising result that shows that for each eruption a different part of the evolved crystal-rich plumbing system is activated. This can be due to random intrusion location or an irreversibility of the plumbing system that prevents multiple eruptions from the same crystal-rich part. Moreover, we find that the number of intrusions markedly increases before each eruption in a non-linear manner. Such an increased rate of intrusions with time might reflect non-linear rheological properties of the crystal-rich system, of the enclosing rocks, or the non-linear evolution of crystal-melt reaction-dissolution fronts during magma intrusions.

  13. Security Policy Based on Firewall and Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Hemdeep Kaur Bimbraw

    2014-11-01

    Full Text Available Firewalls are usually the first component of network security. They separate networks in different security levels by utilizing network access control policies. The major function of the firewall is to protect the private network from non-legitimate traffic. The main purpose of a firewall system is to control access to or from a protected network. It implements a network access policy by forcing connections to pass through the firewall, where they can be examined and evaluated. Intrusion detection is the process of monitoring and searching networks of computers and systems for security policy violations. Intrusion Detection Systems (IDSs are software or hardware products that automate this monitoring and analysis process. An IDS inspects all inbound and outbound network activity, system logs and events, and identifies suspicious patterns or events that may indicate a network or system attack from someone attempting to break into or compromise a system. The network security in today’s world is a major concern because of increasing threats from malicious users. Therefore, designing a correct network security policy is a challenging task. To design filtering rules to formulate a sound firewall security policy and implement intrusion detection system to capture network packets and detect attacks to fulfill this gap

  14. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  15. Detection and Protection Against Intrusions on Smart Grid Systems

    Directory of Open Access Journals (Sweden)

    Ata Arvani

    2015-05-01

    Full Text Available The wide area monitoring of power systems is implemented at a central control center to coordinate the actions of local controllers. Phasor measurement units (PMUs are used for the collection of data in real time for the smart grid energy systems. Intrusion detection and cyber security of network are important requirements for maintaining the integrity of wide area monitoring systems. The intrusion detection methods analyze the measurement data to detect any possible cyber attacks on the operation of smart grid systems. In this paper, the model-based and signal-based intrusion detection methods are investigated to detect the presence of malicious data. The chi-square test and discrete wavelet transform (DWT have been used for anomaly-based detection. The false data injection attack (FDIA can be detected using measurement residual. If the measurement residual is larger than expected detection threshold, then an alarm is triggered and bad data can be identified. Avoiding such alarms in the residual test is referred to as stealth attack. There are two protection strategies for stealth attack: (1 Select a subset of meters to be protected from the attacker (2 Place secure phasor measurement units in the power grid. An IEEE 14-bus system is simulated using real time digital simulator (RTDS hardware platform for implementing attack and detection schemes.

  16. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  17. Water vapor intrusions into the High Arctic during winter

    Science.gov (United States)

    Doyle, J. G.; Lesins, G.; Thackray, C. P.; Perro, C.; Nott, G. J.; Duck, T. J.; Damoah, R.; Drummond, J. R.

    2011-06-01

    The meridional transport of water vapor into the High Arctic, accompanied by dry enthalpy and clouds, impacts the surface radiative forcing. The evolution of one such moist intrusion over 9-11 February 2010 is presented. The event is analyzed using a unique blend of measurements including a new pan-Arctic retrieval of column water vapor from the Microwave Humidity Sounders, water vapor profiles from a Raman lidar and a ground-based microwave radiometer at the Polar Environment Atmospheric Research Laboratory (PEARL), in Eureka (80°N, 86°W), on Ellesmere Island in the Canadian High Arctic. A radiation model reveals the intrusion is associated with a 17 W m-2 average increase in downwelling longwave irradiance. Optically thin clouds, as observed by the lidar, contribute a further 20 W m-2 to the downwelling longwave irradiance at their peak. Intrusion events are shown to be a regular occurrence in the Arctic winter with implications for the understanding of the mechanisms driving Arctic Amplification.

  18. Reconfigurable Hardware Architecture for Network Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    A. Kaleel Rahuman

    2012-01-01

    Full Text Available Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention. The use of reconfigurable hardware for network security applications has great strides as Field Programmable Gate Array (FPGA devices have provided larger and faster resources. This proposes architecture called “BV-TCAM” is presented, which is implemented for an FPGA-based Network Intrusion Detection Systems (NIDS. The BV-TCAM architecture combines the Ternary Content Addressable Memory (TCAM and Bit Vector (BV algorithm to effectively compress the data representation and throughput. A tree bitmap implementation of the BV algorithm is used for source and destination port lookup while a TCAM performs lookup for other header fields, which can be represented as a prefix or exact value. With the aid of small embedded TCAM, packet classification can be implemented in relatively small part of the available logic of an FPGA. The BV-TCAM architecture has been modelled by VHDL. Simulations were performed by MODELSIM. This architecture have to be synthesized and implement our design using Xilinx FPGA device."

  19. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  20. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Marlon Navia

    2015-09-01

    Full Text Available Several systems have been proposed to monitor wireless sensor networks (WSN. These systems may be active (causing a high degree of intrusion or passive (low observability inside the nodes. This paper presents the implementation of an active hybrid (hardware and software monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART, serial peripheral interface (SPI, and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference, about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  1. Saltwater Intrusion: Climate change mitigation or just water resources management?

    Science.gov (United States)

    Ferguson, G. A.; Gleeson, T.

    2011-12-01

    Climate change and population growth are expected to substantially increase the vulnerability of global water resources throughout the 21st century. Coastal groundwater systems are a nexus of the world's changing oceanic and hydrologic systems and a critical resource for the over one billion people living in coastal areas as well as for terrestrial and offshore ecosystems. Synthesis studies and detailed simulations predict that rising sea levels could negatively impact coastal aquifers by causing saltwater to intrude landward within coastal aquifers or by saltwater inundation of coastal regions. Saltwater intrusion caused by excessive extraction is already impacting entire island nations and globally in diverse regions such as Nile River delta in Egypt, Queensland, Australia and Long Island, USA. However, the vulnerability of coastal aquifers to sea level rise and excessive extraction has not been systematically compared. Here we show that coastal aquifers are much more vulnerable to groundwater extraction than predicted sea level rise in wide-ranging hydrogeologic conditions and population densities. Low lying areas with small hydraulic gradients are more sensitive to climate change but a review of existing coastal aquifer indicates that saltwater intrusion problems are more likely to arise where water demand is high. No cases studies were found linking saltwater intrusion to sea level rise during the past century. Humans are a key driver in the hydrology of coastal aquifers and that adapting to sea level rise at the expense of better water management is misguided.

  2. HYBRID FEATURE SELECTION ALGORITHM FOR INTRUSION DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    Seyed Reza Hasani

    2014-01-01

    Full Text Available Network security is a serious global concern. Usefulness Intrusion Detection Systems (IDS are increasing incredibly in Information Security research using Soft computing techniques. In the previous researches having irrelevant and redundant features are recognized causes of increasing the processing speed of evaluating the known intrusive patterns. In addition, an efficient feature selection method eliminates dimension of data and reduce redundancy and ambiguity caused by none important attributes. Therefore, feature selection methods are well-known methods to overcome this problem. There are various approaches being utilized in intrusion detections, they are able to perform their method and relatively they are achieved with some improvements. This work is based on the enhancement of the highest Detection Rate (DR algorithm which is Linear Genetic Programming (LGP reducing the False Alarm Rate (FAR incorporates with Bees Algorithm. Finally, Support Vector Machine (SVM is one of the best candidate solutions to settle IDSs problems. In this study four sample dataset containing 4000 random records are excluded randomly from this dataset for training and testing purposes. Experimental results show that the LGP_BA method improves the accuracy and efficiency compared with the previous related research and the feature subcategory offered by LGP_BA gives a superior representation of data.

  3. Effects of recharge wells and flow barriers on seawater intrusion.

    Science.gov (United States)

    Luyun, Roger; Momii, Kazuro; Nakagawa, Kei

    2011-01-01

    The installation of recharge wells and subsurface flow barriers are among several strategies proposed to control seawater intrusion on coastal groundwater systems. In this study, we performed laboratory-scale experiments and numerical simulations to determine the effects of the location and application of recharge wells, and of the location and penetration depth of flow barriers, on controlling seawater intrusion in unconfined coastal aquifers. We also compared the experimental results with existing analytical solutions. Our results showed that more effective saltwater repulsion is achieved when the recharge water is injected at the toe of the saltwater wedge. Point injection yields about the same repulsion compared with line injection from a screened well for the same recharge rate. Results for flow barriers showed that more effective saltwater repulsion is achieved with deeper barrier penetration and with barriers located closer to the coast. When the flow barrier is installed inland from the original toe position however, saltwater intrusion increases with deeper barrier penetration. Saltwater repulsion due to flow barrier installation was found to be linearly related to horizontal barrier location and a polynomial function of the barrier penetration depth.

  4. Hybrid Intrusion Detection Using Ensemble of Classification Methods

    Directory of Open Access Journals (Sweden)

    M.Govindarajan

    2014-01-01

    Full Text Available One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed for homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF and Support Vector Machine (SVM as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of real and benchmark data sets of intrusion detection. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase and combining phase. A wide range of comparative experiments are conducted for real and benchmark data sets of intrusion detection. The accuracy of base classifiers is compared with homogeneous and heterogeneous models for data mining problem. The proposed ensemble methods provide significant improvement of accuracy compared to individual classifiers and also heterogeneous models exhibit better results than homogeneous models for real and benchmark data sets of intrusion detection.

  5. Intrusion and extrusion of a liquid on nanostructured surfaces

    Science.gov (United States)

    Amabili, M.; Giacomello, A.; Meloni, S.; Casciola, C. M.

    2017-01-01

    Superhydrophobicity is connected to the presence of gas pockets within surface asperities. Upon increasing the pressure this ‘suspended’ state may collapse, causing the complete wetting of the rough surface. In order to quantitatively characterize this process on nanostructured surfaces, we perform rare-event atomistic simulations at different pressures and for several texture geometries. Such an approach allows us to identify for each pressure the stable and metastable states and the free energy barriers separating them. Results show that, by starting from the superhydrophobic state and increasing the pressure, the suspended state abruptly collapses at a critical intrusion pressure. If the pressure is subsequently decreased, the system remains trapped in the metastable state corresponding to the wet surface. The liquid can be extruded from the nanostructures only at very negative pressures, by reaching the critical extrusion pressure (spinodal for the confined liquid). The intrusion and extrusion curves form a hysteresis cycle determined by the large free energy barriers separating the suspended and wet states. These barriers, which grow very quickly for pressures departing from the intrusion/extrusion pressure, are shown to strongly depend on the texture geometry.

  6. Reduction of saltwater intrusion by modifying hydraulic conductivity

    Science.gov (United States)

    Strack, O. D. L.; Stoeckl, L.; Damm, K.; Houben, G.; Ausk, B. K.; de Lange, W. J.

    2016-09-01

    We present an approach for reducing saltwater intrusion in coastal aquifers by artificially reducing the hydraulic conductivity in the upper part of selected areas by using a precipitate. We apply a previously presented analytical approach to develop formulas useful for the design of artificial barriers. Equations for the location of the tip of the saltwater wedge are presented and verified through a sand-tank experiment. The analysis is capable of computing discharges exactly, but requires the Dupuit-Forchheimer approximation to compute points of the interface between flowing fresh and stationary saltwater. We consider a vertical coastline and boundaries in the freshwater zone of either given discharge or given head. We demonstrate in the paper that reduction of the hydraulic conductivity in the upper part of a coastal aquifer will result in a decrease of saltwater intrusion, and present analytic expressions that can be used for design purposes. The previously presented analytical approach can be applied to design systems to reduce saltwater intrusion caused by pumping inland from the zone that contains saline groundwater.

  7. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  8. Non-intrusive low-rank separated approximation of high-dimensional stochastic models

    KAUST Repository

    Doostan, Alireza

    2013-08-01

    This work proposes a sampling-based (non-intrusive) approach within the context of low-. rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs. © 2013 Elsevier B.V.

  9. Theoretical prediction of gold vein location in deposits originated by a wall magma intrusion

    Science.gov (United States)

    Martin, Pablo; Maass-Artigas, Fernando; Cortés-Vega, Luis

    2016-05-01

    The isotherm time-evolution resulting from the intrusion of a hot dike in a cold rock is analized considering the general case of nonvertical walls. This is applied to the theoretical prediction of the gold veins location due to isothermal evolution. As in previous treatments earth surface effects are considered and the gold veins are determined by the envelope of the isotherms. The locations of the gold veins in the Callao mines of Venezuela are now well predicted. The new treatment is now more elaborated and complex that in the case of vertical walls, performed in previous papers, but it is more adequated to the real cases as the one in El Callao, where the wall is not vertical.

  10. Non-Intrusive Load Monitoring Approaches for Disaggregated Energy Sensing: A Survey

    Directory of Open Access Journals (Sweden)

    Ahmed Zoha

    2012-12-01

    Full Text Available Appliance Load Monitoring (ALM is essential for energy management solutions, allowing them to obtain appliance-specific energy consumption statistics that can further be used to devise load scheduling strategies for optimal energy utilization. Fine-grained energy monitoring can be achieved by deploying smart power outlets on every device of interest; however it incurs extra hardware cost and installation complexity. Non-Intrusive Load Monitoring (NILM is an attractive method for energy disaggregation, as it can discern devices from the aggregated data acquired from a single point of measurement. This paper provides a comprehensive overview of NILM system and its associated methods and techniques used for disaggregated energy sensing. We review the state-of-the art load signatures and disaggregation algorithms used for appliance recognition and highlight challenges and future research directions.

  11. Joint Hydrogeophysical Inversion: State Estimation for Seawater Intrusion Models in 3D

    CERN Document Server

    Steklova, K

    2016-01-01

    Seawater intrusion (SWI) is a complex process, where 3D modeling is often necessary in order to monitor and manage the affected aquifers. Here, we present a synthetic study to test a joint hydrogeophysical inversion approach aimed at solving the inverse problem of estimating initial and current saltwater distribution. First, we use a 3D groundwater model for variable density flow based on discretized flow and solute mass balance equations. In addition to the groundwater model, a 3D geophysical model was developed for direct current resistivity imaging and inversion. The objective function of the coupled problem consists of data misfit and regularization terms as well as a coupling term that relates groundwater and geophysical states. We present a novel approach to solve the inverse problem using an Alternating Direction Method of Multipliers (ADMM) to minimize this coupled objective function. The sensitivities are derived analytically for the discretized system of equations, which allows us to efficiently com...

  12. Magma intrusion and accumulation in the southern Altiplano: Structural observations from the PLUTONS project

    Science.gov (United States)

    West, M. E.; Christensen, D. H.; Pritchard, M. E.; Del Potro, R.; Gottsmann, J.; Unsworth, M.; Minaya, E.; Sunagua, M.; McNutt, S. R.; Yu, Q.; Farrell, A. K.

    2012-12-01

    The PLUTONS project is attempting to capture the process of magma intrusion and pluton formation, in situ, through multi-disciplinary study of known magmatic inflation centers. With support from the NSF Continental Dynamics program, and a sister project in the UK funded by NERC, two such centers are receiving focused study. Uturuncu volcano in the Altiplano of southern Bolivia is being investigated with combined seismics, magnetotellurics, geodesy, microgravity, geomorphology, petrology, geochemistry, historical studies and modeling. 350 km to the south, comparable investigations are targeting the Lastarria-Cordon del Azufre complex. Field studies are ongoing into 2013. In this presentation we highlight results from Uturuncu that bear on the crustal magmatic process. Seismic tomography, gravity and magnetotellurics indicate a complex structure in the upper 20 km with some evidence for partial melt. Seismic receiver functions indicate a layer of very low velocities across the region at 15-25 km depth that is almost certainly melt-rich. High conductivities corroborate the interpretation of a partial melt component to this layer. In addition to the throughgoing melt layer, seismic velocities and attenuation indicate shallow features above the melt body extending upward toward the surface. It is not clear whether these features are associated with recent uplift or are remnants from a previous period of activity. Uturuncu is seismically active with hundreds of locatable earthquakes each year. Seismic lineations and swarm behavior suggest that the seismicity reflects regional stress patterns. While there is little evidence that these earthquakes are the direct result of magmatic intrusion, the resulting high heat flow may be hastening existing strains.

  13. Stratigraphic controls on saltwater intrusion in the Dominguez Gap area of coastal Los Angeles

    Science.gov (United States)

    Edwards, B.D.; Ehman, K.D.; Ponti, D.J.; Reichard, E.G.; Tinsley, J.C.; Rosenbauer, R.J.; Land, M.

    2009-01-01

    The Los Angeles Basin is a densely populated coastal area that significantly depends on groundwater. A part of this groundwater supply is at risk from saltwater intrusion-the impetus for this study. High-resolution seismic-reflection data collected from the Los Angeles-Long Beach Harbor Complex have been combined with borehole geophysical and descriptive geological data from four nearby ??400-m-deep continuously cored wells and with borehole geophysical data from adjacent water and oil wells to characterize the Pliocene to Holocene stratigraphy of the Dominguez Gap coastal aquifer system. The new data are shown as a north-south, two- dimensional, sequence-stratigraphic model that is compared to existing lithostratigraphic models of the Los Angeles Basin in an attempt to better understand pathways of saltwater intrusion into coastal aquifers. Intrusion of saltwater into the coastal aquifer system generally is attributed to over-pumping that caused the hydraulic gradient to reverse during the mid-1920s. Local water managers have used the existing lithostratigraphic model to site closely spaced injection wells of freshwater (barrier projects) attempting to hydraulically control the saltwater intrusion. Improved understanding of the stratigraphic relationships can guide modifications to barrier design that will allow more efficient operation. Allostratigraphic nomenclature is used to define a new sequence-stratigraphic model for the area because the existing lithostratigraphic correlations that have been used to define aquifer systems are shown not to be time-correlative. The youngest sequence, the Holocene Dominguez sequence, contains the Gaspur aquifer at its base. The Gaspur aquifer is intruded with saltwater and consists of essentially flat-lying gravelly sands deposited by the ancestral Los Angeles River as broad channels that occupied a paleovalley incised into the coastal plain during the last glacio-eustatic highstand. The underlying sequences are deformed into

  14. Isotope-geochemical Nd-Sr evidence of Palaeoproterozoic plume magmatism in Fennoscandia and mantle-crust interaction on stages of layered intrusions formation

    Science.gov (United States)

    Serov, Pavel; Bayanova, Tamara; Kunakkuzin, Evgeniy; Steshenko, Ekaterina

    2016-04-01

    Palaeoproterozoic Fennoscandian layered intrusions belong to the pyroxenite-gabbronorite-anorthosite formation and spread on a vast area within the Baltic Shield. Based on isotope U-Pb, Sm-Nd, Rb-Sr and Re-Os data the duration of this formation can be to 100-130 Ma (2.53-2.40 Ga) [Serov et. al., 2008; Bayanova et. al., 2009]. We have studied rocks of layered PGE-bearing Fedorovo-Pansky, Monchetundra, Burakovsky, Olanga group intrusions and Penikat intrusion. According to recent and new complex Nd-Sr-REE data magma source of the vast majority of these intrusions was a mantle reservoir with unusual characteristics: negative values of ɛNd (from 0 to -4) and ISr = 0.702-0.706, flat spectra of REE (value of (La/Yb)N ~ 1.0-5.8) with positive Eu-anomalies [Bayanova et. al., 2009; Bayanova et. al., 2014]. However, the distribution of REE for ore-bearing gabbronorite intrusions Penikat (Sm-Nd age is 2426 ± 38 Ma [Ekimova et. al., 2011]) has a negative Eu-anomalies. This may be due to the formation of plagioclase and its removal from the magma chamber. One of the aims of isotope geochemical investigations is to establish the contribution of mantle components in the formation of layered intrusions rocks and the degrees of contamination of the magma source by crustal material. To calculate the proportion of mantle component model binary mixture was used [Jahn et. al., 2000]. As the mantle components we used data for CHUR: ɛNd = 0, [Nd] = 1.324 [Palm, O'Neil, 2003] and for crustal components were used host-rocks Nd-data. The proportion of mantle component for the studied intrusions was 77-99%. Also, data were obtained for the Monchetundra dike complex and amphibolized gabbro, for which the proportion of mantle material was 20-40%. For these rocks a significant crustal contamination is most likely. This process resulted in low values of ɛNd, a direct relationship between ɛNd and Nd concentration, and significant differences between the U-Pb and Sm-Nd model ages. A

  15. Evolution of the bentonite barrier under glacial meltwater intrusion conditions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, T.; Bouby, M. [Karlsruhe Institute of Technology (KIT), Eggenstein-Leopoldshafen (Germany). Inst. for Nuclear Waste Disposal (INE); Blechschmidt, I. [NAGRA National Cooperation Disposal Radioactive Waste, Wettingen (Switzerland); and others

    2015-07-01

    Recent safety assessments for repository concepts that combine a clay engineered barrier system (EBS) with a fractured rock have shown that melt water intrusion may have a direct impact on the EBS barrier function in two aspects: - Generation of colloids may degrade the engineered barrier - Colloid transport of radionuclides may reduce the efficiency of the natural barrier The studies presented here are performed in the framework of the Federal Ministry of Economic Affairs and Energy (BMWi) KIT/GRS project KOLLORADO-e, the EU collaborative project CP BELBaR (www.skb.se/belbar) and especially within the Colloid Formation and Migration (CFM) project at the Grimsel Test Site, GTS (www.grimsel.com). Key research areas are (a) the erosion of the bentonite buffer, (b) clay colloid stability and (c) colloid-radionuclide- host rock surface interactions. Concerning bentonite buffer integrity parameters like the bentonite type, Na-/Ca-exchangeable cation ratio, compaction density, role of accessory minerals, the fracture aperture size and groundwater chemistry and flow velocity are investigated in order to identify controlling factors, understand the main mechanisms of erosion from the bentonite surface and to quantify the extent of the possible erosion under these different conditions. Clay colloid stability studies are performed under different geochemical conditions. The main objective is to answer the question if colloids formed at the near/far field interface would be stable only if favourable conditions exist and therefore their relevance for radionuclide transport will be strongly dependent on the local geochemical conditions (inorganic cations Na{sup +}, Ca{sup 2+}, Mg{sup 2+}, Al{sup 3+} and organic complexing agents). Finally, the interaction between colloids and radionuclides and the host rock is intensively investigated in order to answer the question, how colloid mobility may be affected by the composition of the host rock, surface roughness and the mechanism of

  16. Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Chaudhary

    2014-01-01

    Full Text Available Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gateway based security mechanisms cannot be applied on it. That’s why intrusion detection systems are used as keystone in these networks. Many number of intrusion detection systems have been discovered to handle the uncertain activity in mobile ad hoc networks. This paper emphasized on proposed fuzzy based intrusion detection systems in mobile ad hoc networks and presented their effectiveness to identify the intrusions. This paper also examines the drawbacks of fuzzy based intrusion detection systems and discussed the future directions in the field of intrusion detection for mobile ad hoc networks.

  17. Formation dynamics of subsurface hydrocarbon intrusions following the Deepwater Horizon blowout

    Science.gov (United States)

    Socolofsky, Scott A.; Adams, E. Eric; Sherwood, Christopher R.

    2011-01-01

    Hydrocarbons released following the Deepwater Horizon (DH) blowout were found in deep, subsurface horizontal intrusions, yet there has been little discussion about how these intrusions formed. We have combined measured (or estimated) observations from the DH release with empirical relationships developed from previous lab experiments to identify the mechanisms responsible for intrusion formation and to characterize the DH plume. Results indicate that the intrusions originate from a stratification-dominated multiphase plume characterized by multiple subsurface intrusions containing dissolved gas and oil along with small droplets of liquid oil. Unlike earlier lab measurements, where the potential density in ambient water decreased linearly with elevation, at the DH site it varied quadratically. We have modified our method for estimating intrusion elevation under these conditions and the resulting estimates agree with observations that the majority of the hydrocarbons were found between 800 and 1200 m.

  18. Provide a model to improve the performance of intrusion detection systems in the cloud

    Directory of Open Access Journals (Sweden)

    Foroogh Sedighi

    2016-12-01

    Full Text Available High availability of tools and service providers in cloud computing and the fact that cloud computing services are provided by internet and deal with public, have caused important challenges for new computing model. Cloud computing faces problems and challenges such as user privacy, data security, data ownership, availability of services, and recovery after breaking down, performance, scalability, programmability. So far, many different methods are presented for detection of intrusion in cloud computing. There are two important factors that differentarticlesand researches are presented based on them. These factors are location of establishing intrusion detection systems in cloud computing systems and also algorithms that are used in intrusion detection. Their final goal is maximum coverage of intrusions, increasing the speed and accuracy of intrusion detection, and decreasing of wrong alarms. Our goal in this article is to increase intrusion detection in cloud computing and decrease the rate of generatingfalsealarmsby presenting a combined method.

  19. A Comprehensive Study on Classification of Passive Intrusion and Extrusion Detection System

    Directory of Open Access Journals (Sweden)

    A.Kalaivani

    2013-05-01

    Full Text Available Cyber criminals compromise Integrity, Availability and Confidentiality of network resources in cyber space and cause remote class intrusions such as U2R, R2L, DoS and probe/scan system attacks .To handle these intrusions, Cyber Security uses three audit and monitoring systems namely Intrusion Prevention Systems (IPS, Intrusion Detection Systems (IDS. Intrusion Detection System (IDS monitors only inbound traffic which is insufficient to prevent botnet systems. A system to monitor outbound traffic is named as Extrusion Detection System (EDS. Therefore a hybrid system should be designed to handle both inbound and outbound traffic. Due to the increased false alarms preventive systems do not suite to an organizational network. The goal of this paper is to devise a taxonomy for cyber security and study the existing methods of Intrusion and Extrusion Detection systems based on three primary characteristics. The metrics used to evaluate IDS and EDS are also presented.

  20. A Heuristic Clustering Algorithm for Intrusion Detection Based on Information Entropy

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper studied on the clustering problem for intrusion detection with the theory of information entropy, it was put forward that the clustering problem for exact intrusion detection based on information entropy is NP-complete, therefore, the heuristic algorithm to solve the clustering problem for intrusion detection was designed, this algorithm has the characteristic of incremental development, it can deal with the database with large connection records from the internet.

  1. Multi-Objective Management of Saltwater Intrusion in Groundwater. Optimization under Uncertainty

    OpenAIRE

    2004-01-01

    Coastal aquifers are very vulnerable to seawater intrusion through, for example, the overdraft of groundwater exploitation or insufficient recharge from upstream. Problems of salt-intrusion into groundwater have become a considerable concern in many countries with coastal areas. There have been a number of studies that have tried to simulate groundwater flow system in regions under threat of saltwater intrusion into coastal aquifers. These aquifer systems are characterized by either a single ...

  2. Effects of climate variability on saltwater intrusions in coastal aquifers in Southern Denmark

    Science.gov (United States)

    Meyer, Rena; Sonnenborg, Torben; Engesgaard, Peter; Høyer, Anne-Sophie; Jørgensen, Flemming; Hisnby, Klaus; Hansen, Birgitte; Jensen, Jørn Bo; Piotrowski, Jan A.

    2016-04-01

    As in many other regions of the world fresh water supply in Denmark is based on groundwater resources. Aquifers in the low-lying areas in the south-west of Jutland are particularly vulnerable to saltwater intrusions which are likely to intensify due to relative sea level rise. To understand the dynamics and development of this complex flow system, the initial hydrodynamic conditions imposed by the last Scandinavian Ice Sheet (SIS) must be taken into account. The whole region has undergone changes in climatic and hydraulic conditions within the last 15000 years that may show influence on the present flow conditions. It is likely that the groundwater-flow dynamics, driven by the postglacial hydraulic head drop and the relative sea level rise are not yet equilibrated. Enhanced by the potential future sea level rise due to climate change, contamination of fresh-water aquifers will continue. The 2800-km2 - large coast-to-coast study area located in the southern part of Jutland was partly overridden by the Weichselian ice sheet. Geophysical and geological mapping shows salt water intrusions up to 20 km inland from the present coast. Based on a geological voxel model spanning Miocene through Quaternary deposits a large-scale 3D numerical groundwater flow and salt water transport model has been developed. It includes density-driven flow and simulates the distribution of the current saltwater intrusions and their evolution during the last 15000 years. Particle tracking and direct age simulations are performed to identify recharge areas and constrain groundwater ages. The simulated ages are compared to ages derived from isotope analysis of groundwater samples both from Miocene and Quaternary aquifers. The origin of the groundwater is determined based on isotopic and chemical composition. Additionally, heavy noble gas analysis is carried out to estimate recharge temperatures and mechanisms at locations where groundwater recharge during the last glaciation is indicated. This

  3. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  4. Models of ash-laden intrusions in a stratified atmosphere

    Science.gov (United States)

    Hogg, Andrew; Johnson, Chris; Sparks, Steve; Huppert, Herbert; Woodhouse, Mark; Phillips, Jeremy

    2013-04-01

    Recent volcanic eruptions and the associated dispersion of ash through the atmosphere have led to widespread closures of airspace, for example the 2010 eruption of Eyjafjallajokull and 2011 eruption of Puyehue-Cordón Caulle. These episodes bring into sharp focus the need to predict quantitatively the transport and deposition of fine ash and in particular, its interaction with atmospheric wind. Many models of this process are based upon capturing the physics of advection with the wind, turbulence-induced diffusion and gravitational settling. Buoyancy-induced processes, associated with the density of the ash cloud and the background stratification of the atmosphere, are neglected and it is this issue that we address in this contribution. In particular, we suggest that the buoyancy-induced motion may account for the relatively thin distal ash layers that have been observed in the atmosphere and their relatively weak cross-wind spreading. We formulate a new model for buoyancy-driven spreading in the atmosphere in which we treat the evolving ash layer as relatively shallow so that its motion is predominantly horizontal and the pressure locally hydrostatic. The motion is driven by horizontal pressure gradients along with interfacial drag between the flowing ash layer and the surrounding atmosphere. Ash-laden fluid is delivered to this intrusion from a plume source and has risen through the atmosphere to its height of neutral buoyancy. The ash particles are then transported horizontally by the intrusion and progressively settle out of it to sediment through the atmosphere and form the deposit on the ground. This model is integrated numerically and analysed asymptotically in various regimes, including scenarios in which the atmosphere is quiescent and in which there is a sustained wind. The results yield predictions for the variation of the thickness of the intrusion with distance from the source and for how the concentration of ash is reduced due to settling. They

  5. Liquidus temperatures for the layered series of the Skaergaard intrusion

    Science.gov (United States)

    Thy, P.; Tegner, C.; Lesher, C. E.

    2009-12-01

    A new petrographic study of the Skaergaard intrusion allows us to construct a profile through the 2200-meter layered series (LS) using GPS-located samples and drill cores. The petrographic and chemical results include textures, mineralogy, mineral compositions (cryptic variation), bulk gabbro compositions (major and trace elements), gabbro density, and calculated mineral mode variations. The cryptic variation shows a systematic nearly linear decline for An-content of plagioclase from An60 at the base of the exposed part of LZa to An29 at the top of UZc. The corresponding olivine compositions are Fo61 and pure fayalite, respectively. Olivine is present throughout the LS with the exception of MZ, where it only sporadically occurs. Augite varies in composition from Mg/(Mg+Fe2+) of 0.71 at the base to pure hedenbergite at the top and displays a strong decline in Al upward. Ca-poor pyroxenes are present throughout the lower part of the LS until and including the lower parts of UZa, only in part reflecting a large trapped liquid component in the lower part of LZ together with subsolidus equilibration. Ilmenite and magnetite appear as early crystallizing phases in LZc and persist until the top. Apatite first appears at the base of UZb, with the exception of a few appearances together with biotite in the LZ for which a high trapped liquid content is inferred. Quartz and orthoclase are present in small amounts in UZc. The modal contents of plagioclase, olivine, and augite display some variation throughout most of LS, with most notably a marked increase in olivine from UZb. Ilmenite and titanomagnetite decrease systematically upwards from ~20 % in LZc to Skaergaard intrusions liquid lines of descent. Here we evaluate the liquidus temperature for the Skaergaard layered series using the new plagioclase compositions. Plagioclase saturation in one-atmosphere melting experiments on evolved North Atlantic basalts is a function of An-content (mole %) and can be described by an

  6. Performance Enhancement of Intrusion Detection using Neuro - Fuzzy Intelligent System

    Directory of Open Access Journals (Sweden)

    Dr. K. S. Anil Kumar

    2014-10-01

    Full Text Available This research work aims at developing hybrid algorithms using data mining techniques for the effective enhancement of anomaly intrusion detection performance. Many proposed algorithms have not addressed their reliability with varying amount of malicious activity or their adaptability for real time use. The study incorporates a theoretical basis for improvement in performance of IDS using K-medoids Algorithm, Fuzzy Set Algorithm, Fuzzy Rule System and Neural Network techniques. Also statistical significance of estimates has been looked into for finalizing the best one using DARPA network traffic datasets.

  7. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    . This describes the mixing processes reasonably well near the mouth, in the central regimes and near the toe of the salt intrusion curve in an estuary. Darcy-Weisbach friction factor f, is calculated using equation (f = 8g/C2) and the value is 0.008, where C... on hydrodynamics, estuaries are classified as sharply stratified, partially stratified and well mixed. Sharply stratified estuaries exhibit little mixing between the salt wedge and freshwater flow and tidal action is not sufficient to mix the separate layers...

  8. Physical and numerical modeling of seawater intrusion in coastal aquifers

    Science.gov (United States)

    Crestani, Elena; Camporese, Matteo; Salandin, Paolo

    2016-04-01

    Seawater intrusion in coastal aquifers is a worldwide problem caused, among others factors, by aquifer overexploitation, rising sea levels, and climate changes. To limit the deterioration of both surface water and groundwater quality caused by saline intrusion, in recent years many research studies have been developed to identify possible countermeasures, mainly consisting of underground barriers. In this context, physical models are fundamental to study the saltwater intrusion, since they provide benchmarks for numerical model calibrations and for the evaluation of the effectiveness of general solutions to contain the salt wedge. This work presents a laboratory experiment where seawater intrusion was reproduced in a specifically designed sand-box. The physical model, built at the University of Padova, represents the terminal part of a coastal aquifer and consists of a flume 500 cm long, 30 cm wide and 60 cm high, filled for an height of 49 cm with glass beads characterized by a d50 of 0.6 mm and a uniformity coefficient d60/d10 ≈ 1.5. The resulting porous media is homogeneous, with porosity of about 0.37 and hydraulic conductivity of about 1.3×10-3 m/s. Upstream from the sand-box, a tank filled by freshwater provides the recharge to the aquifer. The downstream tank simulates the sea and red food dye is added to the saltwater to easily visualize the salt wedge. The volume of the downstream tank is about five times the upstream one, and, due to the small filtration discharge, salt concentration variations (i.e., water density variations) due to the incoming freshwater flow are negligible. The hydraulic gradient during the tests is constant, due to the fixed water level in the two tanks. Water levels and discharged flow rate are continuously monitored. The experiment presented here had a duration of 36 h. For the first 24 h, the saltwater wedge was let to evolve until quasi stationary condition was obtained. In the last 12 h, water withdrawal was carried out at a

  9. Mixing between a stratospheric intrusion and a biomass burning plume

    Directory of Open Access Journals (Sweden)

    J. Brioude

    2007-08-01

    Full Text Available Ozone, carbon monoxide, aerosol extinction coefficient, acetonitrile, nitric acid and relative humidity measured from the NOAA P3 aircraft during the TexAQS/GoMACCS 2006 experiment, indicate mixing between a biomass burning plume and a stratospheric intrusion in the free troposphere above eastern Texas. Lagrangian-based transport analysis and satellite imagery are used to investigate the transport mechanisms that bring together the tropopause fold and the biomass burning plume originating in southern California, which may affect the chemical budget of tropospheric trace gases.

  10. Mixing between a stratospheric intrusion and a biomass burning plume

    Directory of Open Access Journals (Sweden)

    J. Brioude

    2007-06-01

    Full Text Available Ozone, carbon monoxide, aerosol extinction coefficient, acetonitrile, nitric acid and relative humidity measured from the NOAA P3 aircraft during the TexAQS/GoMACCS 2006 experiment, indicate mixing between a biomass burning plume and a stratospheric intrusion in the free troposphere above eastern Texas. Lagrangian-based transport analysis and satellite imagery are used to investigate the transport mechanisms that bring together the tropopause fold and the biomass burning plume originating in southern California, which may affect the chemical budget of tropospheric trace gases.

  11. MULTI SCALE TIME SERIES PREDICTION FOR INTRUSION DETECTION

    OpenAIRE

    G. Palanivel; K. Duraiswamy

    2014-01-01

    We propose an anomaly-based network intrusion detection system, which analyzes traffic features to detect anomalies. The proposed system can be used both in online as well as off-line mode for detecting deviations from the expected behavior. Although our approach uses network packet or flow data, it is general enough to be adaptable for use with any other network variable, which may be used as a signal for anomaly detection. It differs from most existing approaches in its use of wavelet trans...

  12. INTRUSION DETECTION BASED ON THE SECOND-ORDER STOCHASTIC MODEL

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper presents a new method based on a second-order stochastic model for computer intrusion detection. The results show that the performance of the second-order stochastic model is better than that of a first-order stochastic model. In this study, different window sizes are also used to test the performance of the model. The detection results show that the second-order stochastic model is not so sensitive to the window size, comparing with the first-order stochastic model and other previous researches. The detection result of window sizes 6 and 10 is the same.

  13. An immunity-based technique to detect network intrusions

    Institute of Scientific and Technical Information of China (English)

    PAN Feng; DING Yun-fei; WANG Wei-nong

    2005-01-01

    This paper briefly reviews other people's works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest's negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.

  14. Performance of Neural Networks Methods In Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Dao, V N; Vemuri, R

    2001-07-09

    By accurately profiling the users via their unique attributes, it is possible to view the intrusion detection problem as a classification of authorized users and intruders. This paper demonstrates that artificial neural network (ANN) techniques can be used to solve this classification problem. Furthermore, the paper compares the performance of three neural networks methods in classifying authorized users and intruders using synthetically generated data. The three methods are the gradient descent back propagation (BP) with momentum, the conjugate gradient BP, and the quasi-Newton BP.

  15. 协同防御网络入侵%Joint Prevention of Network Intrusion

    Institute of Scientific and Technical Information of China (English)

    王淑仙; 汪静; 王能

    2006-01-01

    This paper dealt with the intrusion prevention technique from the perspective of joint prevention. It put forward a novel idea about IPS(Intrusion Prevention System) and designed a framework of cooperation between IDS(Intrusion Detection System) and routers using the Intrusion Prevention Protocol (IPP).%从协同防御的角度论述了入侵防御技术,提出了入侵防御系统的构筑设想,设计了将入侵检测系统(IDS)与路由器通过利用入侵防御协议(IPP)相互协同的框架模型.

  16. Intrusion-based reasoning and depression: cross-sectional and prospective relationships.

    Science.gov (United States)

    Berle, David; Moulds, Michelle L

    2014-01-01

    Intrusion-based reasoning refers to the tendency to form interpretations about oneself or a situation based on the occurrence of a negative intrusive autobiographical memory. Intrusion-based reasoning characterises post-traumatic stress disorder, but has not yet been investigated in depression. We report two studies that aimed to investigate this. In Study 1 both high (n = 42) and low (n = 28) dysphoric participants demonstrated intrusion-based reasoning. High-dysphoric individuals engaged in self-referent intrusion-based reasoning to a greater extent than did low-dysphoric participants. In Study 2 there were no significant differences in intrusion-based reasoning between currently depressed (n = 27) and non-depressed (n = 51) participants, and intrusion-based reasoning did not predict depressive symptoms at 6-month follow-up. Interestingly, previously (n = 26) but not currently (n = 27) depressed participants engaged in intrusion-based reasoning to a greater extent than never-depressed participants (n = 25), indicating the possibility that intrusion-based reasoning may serve as a "scar" from previous episodes. The implications of these findings are discussed.

  17. HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Mohammad Saiful Islam Mamun

    2010-07-01

    Full Text Available In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs.However, security is one of the significant challenges for sensor network because of their deploymentin open and unprotected environment. As cryptographic mechanism is not enough to protect sensornetwork from external attacks, intrusion detection system needs to be introduced. Though intrusionprevention mechanism is one of the major and efficient methods against attacks, but there might besome attacks for which prevention method is not known. Besides preventing the system from someknown attacks, intrusion detection system gather necessary information related to attack technique andhelp in the development of intrusion prevention system. In addition to reviewing the present attacksavailable in wireless sensor network this paper examines the current efforts to intrusion detectionsystem against wireless sensor network. In this paper we propose a hierarchical architectural designbased intrusion detection system that fits the current demands and restrictions of wireless ad hocsensor network. In this proposed intrusion detection system architecture we followed clusteringmechanism to build a four level hierarchical network which enhances network scalability to largegeographical area and use both anomaly and misuse detection techniques for intrusion detection. Weintroduce policy based detection mechanism as well as intrusion response together with GSM cellconcept for intrusion detection architecture.

  18. MA- IDS: A Distributed Intrusion Detection System Based on Data Mining

    Institute of Scientific and Technical Information of China (English)

    SUN Jian-hua; JIN Hai; CHEN Hao; HAN Zong-fen

    2005-01-01

    Aiming at the shortcomings in intrusion detection systems (IDSs) used in commercial and research fields,we propose the MA-IDS system, a distributed intrusion detection system based on data mining. In this model, misuse intrusion detection system (MIDS) and anomaly intrusion detection system (AIDS) are combined. Data mining is applied to raise detection performance, and distributed mechanism is employed to increase the scalability and efficiency. Host- and network-based mining algorithms employ an improved Bayesian decision theorem that suits for real security environment to minimize the risks incurred by false decisions. We describe the overall architecture of the MA-IDS system, and discuss specific design and implementation issue.

  19. Carbonatite and alkaline intrusion-related rare earth element deposits–A deposit model

    Science.gov (United States)

    Verplanck, Philip L.; Van Gosen, Bradley S.

    2011-01-01

    The rare earth elements are not as rare in nature as their name implies, but economic deposits with these elements are not common and few deposits have been large producers. In the past 25 years, demand for rare earth elements has increased dramatically because of their wide and diverse use in high-technology applications. Yet, presently the global production and supply of rare earth elements come from only a few sources. China produces more than 95 percent of the world's supply of rare earth elements. Because of China's decision to restrict exports of these elements, the price of rare earth elements has increased and industrial countries are concerned about supply shortages. As a result, understanding the distribution and origin of rare earth elements deposits, and identifying and quantifying our nation's rare earth elements resources have become priorities. Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. The general mineral deposit model summarized here is part of an effort by the U.S. Geological Survey's Mineral Resources Program to update existing models and develop new descriptive mineral deposit models to supplement previously published models for use in mineral-resource and mineral-environmental assessments. Carbonatite and alkaline intrusion-related REE deposits are discussed together because of their spatial association, common enrichment in incompatible elements, and similarities in genesis. A wide variety of commodities have been exploited from carbonatites and alkaline igneous rocks, such as rare earth elements, niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other enrichments include manganese, strontium, tantalum, thorium, vanadium, and uranium.

  20. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    OpenAIRE

    Telma Martins de Araújo; Mauro Henrique Andrade Nascimento; Fernanda Catharino Menezes Franco; Marcos Alan Vieira Bittencourt

    2008-01-01

    INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os or...

  1. A Retroactive-Burst Framework for Automated Intrusion Response System

    Directory of Open Access Journals (Sweden)

    Alireza Shameli-Sendi

    2013-01-01

    Full Text Available The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.

  2. Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE

    Directory of Open Access Journals (Sweden)

    Basappa B. Kodada

    2012-01-01

    Full Text Available Grid Computing is a kind of important information technology which enables resource sharing globally to solve the large scale problem. It is based on networks and able to enable large scale aggregation and sharing of computational, data, sensors and other resources across institutional boundaries. Integrated Globus Tool Kit with Web services is to present OGSA (Open Grid Services Architecture as the standardservice grid architecture. In OGSA, everything is abstracted as a service, including computers, applications, data as well as instruments. The services and resources in Grid are heterogeneous and dynamic, and they also belong to different domains. Grid Services are still new to business system & asmore systems are being attached to it, any threat to it could bring collapse and huge harm. May be intruder come with a new form of attack. Grid Computing is a Global Infrastructure on the internet has led to asecurity attacks on the Computing Infrastructure. The wide varieties of IDS (Intrusion Detection System are available which are designed to handle the specific types of attacks. The technique of [27] will protect future attacks in Service Grid Computing Environment at the Grid Infrastructure but there is no technique can protect these types of attacks inside the grid at the node level. So this paper proposes the Architecture of IDS-IGCE (Intrusion Detection System – Inside Grid Computing Environment which can provide the protection against the complete threats inside the Grid Environment.

  3. Evaluating And Comparison Of Intrusion In Mobile AD HOC Networks

    Directory of Open Access Journals (Sweden)

    Zougagh Hicham

    2012-04-01

    Full Text Available In recent years, the use of mobile ad hoc network (MANETs has been widespread in many applications.Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, absence of infrastructure, limited power and limited bandwidth. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. They are unlikely to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a need of second mechanism to “detect and response” these newer attacks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. In this article we classify the architecture for IDS that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANETs presented and compared. We then provide some directions for future researches.

  4. Less is More: Data Processing with SVM for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    XIAO Hai-jun; HONG Fan; WANG Ling

    2009-01-01

    To improve the detection rate and lower down the false positive rate in intrusion detection system,dimensionality reduction is widely used in the intrusion detection system.For this purpose,a data processing (DP) with support vector machine (SVM) was built.Different from traditionally identifying the redundant data before purging the audit data by expert knowledge or utilizing different kinds of subsets of the available 41-connection attributes to build a classifier,the proposed strategy first removes the attributes whose correlation with another attribute exceeds a threshold,and then classifies two sequence samples as one class while removing either of the two samples whose similarity exceeds a threshold.The results of performance experiments showed that the strategy of DP and SVM is superior to the other existing data reduction strategies (e.g.,audit reduction,rule extraction,and feature selection),and that the detection model based on DP and SVM outperforms those based on data mining,soft computing,and hierarchical principal component analysis neural networks.

  5. Nuclear-power-plant perimeter-intrusion alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  6. ESTIMATION OF INTRUSION DETECTION PROBABILITY BY PASSIVE INFRARED DETECTORS

    Directory of Open Access Journals (Sweden)

    V. V. Volkhonskiy

    2015-07-01

    Full Text Available Subject of Research. The paper deals with estimation of detection probability of intruder by passive infrared detector in different conditions of velocity and direction for automated analyses of physical protection systems effectiveness. Method. Analytic formulas for detection distance distribution laws obtained by means of experimental histogram approximation are used. Main Results. Applicability of different distribution laws has been studied, such as Rayleigh, Gauss, Gamma, Maxwell and Weibull distribution. Based on walk tests results, approximation of experimental histograms of detection distance probability distribution laws by passive infrared detectors was done. Conformity of the histograms to the mentioned analytical laws according to fitting criterion 2 has been checked for different conditions of velocity and direction of intruder movement. Mean and variance of approximate distribution laws were equal to the same parameters of experimental histograms for corresponding intruder movement parameters. Approximation accuracy evaluation for above mentioned laws was done with significance level of 0.05. According to fitting criterion 2, the Rayleigh and Gamma laws are corresponded mostly close to the histograms for different velocity and direction of intruder movement. Dependences of approximation accuracy for different conditions of intrusion have been got. They are usable for choosing an approximation law in the certain condition. Practical Relevance. Analytic formulas for detection probability are usable for modeling of intrusion process and objective effectiveness estimation of physical protection systems by both developers and users.

  7. Nuclear data needs for non-intrusive inspection.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D. L.; Michlich, B. J.

    2000-11-29

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested.

  8. Detection of deep stratospheric intrusions by cosmogenic 35S

    Science.gov (United States)

    Lin, Mang; Su, Lin; Shaheen, Robina; Fung, Jimmy C. H.; Thiemens, Mark H.

    2016-10-01

    The extent to which stratospheric intrusions on synoptic scales influence the tropospheric ozone (O3) levels remains poorly understood, because quantitative detection of stratospheric air has been challenging. Cosmogenic 35S mainly produced in the stratosphere has the potential to identify stratospheric air masses at ground level, but this approach has not yet been unambiguously shown. Here, we report unusually high 35S concentrations (7,390 atoms m-3; ˜16 times greater than annual average) in fine sulfate aerosols (aerodynamic diameter less than 0.95 µm) collected at a coastal site in southern California on May 3, 2014, when ground-level O3 mixing ratios at air quality monitoring stations across southern California (43 of 85) exceeded the recently revised US National Ambient Air Quality Standard (daily maximum 8-h average: 70 parts per billion by volume). The stratospheric origin of the significantly enhanced 35S level is supported by in situ measurements of air pollutants and meteorological variables, satellite observations, meteorological analysis, and box model calculations. The deep stratospheric intrusion event was driven by the coupling between midlatitude cyclones and Santa Ana winds, and it was responsible for the regional O3 pollution episode. These results provide direct field-based evidence that 35S is an additional sensitive and unambiguous tracer in detecting stratospheric air in the boundary layer and offer the potential for resolving the stratospheric influences on the tropospheric O3 level.

  9. A new data normalization method for unsupervised anomaly intrusion detection

    Institute of Scientific and Technical Information of China (English)

    Long-zheng CAI; Jian CHEN; Yun KE; Tao CHEN; Zhi-gang LI

    2010-01-01

    Unsupervised anomaly detection can detect attacks without the need for clean or labeled training data.This paper studies the application of clustering to unsupervised anomaly detection(ACUAD).Data records are mapped to a feature space.Anomalies are detected by determining which points lie in the sparse regions of the feature space.A critical element for this method to be effective is the definition of the distance function between data records.We propose a unified normalization distance framework for records with numeric and nominal features mixed data.A heuristic method that computes the distance for nominal features is proposed,taking advantage of an important characteristic of nominal features-their probability distribution.Then,robust methods are proposed for mapping numeric features and computing their distance,these being able to tolerate the impact of the value difference in scale and diversification among features,and outliers introduced by intrusions.Empirical experiments with the KDD 1999 dataset showed that ACUAD can detect intrusions with relatively low false alarm rates compared with other approaches.

  10. Oxygen intrusion into anoxic fjords leads to increased methylmercury availability

    Science.gov (United States)

    Veiteberg Braaten, Hans Fredrik; Pakhomova, Svetlana; Yakushev, Evgeniy

    2013-04-01

    Mercury (Hg) appears in the oxic surface waters of the oceans at low levels (sub ng/L). Because inorganic Hg can be methylated into the toxic and bioaccumulative specie methylmercury (MeHg) levels can be high at the top of the marine food chain. Even though marine sea food is considered the main risk driver for MeHg exposure to people most research up to date has focused on Hg methylation processes in freshwater systems. This study identifies the mechanisms driving formation of MeHg during oxygen depletion in fjords, and shows how MeHg is made available in the surface water during oxygen intrusion. Studies of the biogeochemical structure in the water column of the Norwegian fjord Hunnbunn were performed in 2009, 2011 and 2012. In autumn of 2011 mixing flushing events were observed and lead to both positive and negative effects on the ecosystem state in the fjord. The oxygenated water intrusions lead to a decrease of the deep layer concentrations of hydrogen sulfide (H2S), ammonia and phosphate. On the other hand the intrusion also raised the H2S boundary from 8 m to a shallower depth of just 4 m. Following the intrusion was also observed an increase at shallower depths of nutrients combined with a decrease of pH. Before flushing events were observed concentrations of total Hg (TotHg) increased from 1.3 - 1.7 ng/L in the surface layer of the fjord to concentrations ranging from 5.2 ng/L to 6.4 ng/L in the anoxic zone. MeHg increased regularly from 0.04 ng/L in the surface water to a maximum concentration of 5.2 ng/L in the deeper layers. This corresponds to an amount of TotHg present as MeHg ranging from 2.1 % to 99 %. The higher concentrations of MeHg in the deeper layer corresponds to an area where no oxygen is present and concentrations of H2S exceeds 500 µM, suggesting a production of MeHg in the anoxic area as a result of sulphate reducing bacteria activity. After flushing the concentrations of TotHg showed a similar pattern ranging from 0.6 ng/L in the

  11. Filtering Intrusion Forensic Data Based on Attack Signatures%基于攻击特征的自动证据筛选技术

    Institute of Scientific and Technical Information of China (English)

    伏晓; 谢立

    2011-01-01

    Computer forensics is a new field on computer evidences process.This field is very important and practical, so it has drawn more and more attention in recent years.Intrusion forensics is a specific area of computer forensics, and has been applied to computer intrusion activities.It is a hot area because a large proportion of the computer crimes are intrusion activities.When investigating intrusion activities, one key step is obtaining intrusion evidences.In order to get this kind of evidences automatically, an attack-signature-based method for filtering intrusion forensic data is proposed.It mainly includes the following steps: Firstly, the detail behaviors of the attack being investigated are reconstructed based on its attack signatures; Then the attack features which are required by the filter are extracted from these details; Finally, according to the similarity between attack features and candidate data, all evidences related to the attack being investigated can be gotobtained.The experiment results on DARPA 2000 have proved that our method has high accuracy and its completeness is almost 100%.Compared with current methods, our method shows more advantages.For example it needs little manual work and can process more complex intrusion scenarios.Moreover,it has higher performance and can find more types of evidences.%为了自动获得入侵证据,提出一种基于攻击特征的自动证据筛选方法.其原理是首先根据被调查攻击的特征重构出攻击行为细节,并从中抽取筛选证据需要的"特征信息".然后,再根据候选数据与这些特征信息的匹配程度筛选出该攻击相关的证据.基于DARPA 2000的实验表明这种方法具有很高的准确率,其完备性更是接近100%.而与现有方法的比较则显示出这种方法能克服现有方法人工干预较多、效率低下、仅能筛选特定证据类型、不适合处理复杂攻击等诸多缺陷.

  12. Enigmatic Late-Stage Textures In Mafic Cumulates: Skaergaard Intrusion, East Greenland.

    Science.gov (United States)

    Stripp, G.; Holness, M.; Veksler, I.

    2006-12-01

    The complexities of slow solidification in deep-seated silicate liquid bodies are poorly understood. Late-stage melt migration, due to compaction of the crystal mush, drives re-crystallisation and metasomatism which can have significant effects on chamber-wide chemical evolution. In this contribution we present novel textural observations from mafic cumulates of the Skaergaard Layered Intrusion which may shed light on liquid movement during the last stages of solidification of the crystal mush. Previously undescribed mafic symplectites are widespread in the Skaergaard Layered Series, and comprise vermicular intergrowths of plagioclase and olivine, which may be replaced by clinopyroxene in the outer parts of the symplectite. The symplectites grow outwards from Fe-Ti oxide grains, consuming adjacent cumulus plagioclase. In the Middle Zone of the Layered Series (where symplectites are best developed) symplectite plagioclase adjacent to the Fe-Ti oxide grains contains 1.2 wt% FeOtot which decreases to 0.6 wt% FeOtot at the symplectite margin, compared to a ~ 0.35 wt% average for adjacent cumulus plagioclase. Symplectite plagioclase is up to 40 mol% more An-rich than the adjacent cumulus grains. Olivine compositions range from Fo45 to Fo32 along the growth direction of the symplectite, compared to ~ Fo44 for cumulus olivine at this level in the intrusion. Biotite commonly replaces olivine. Texturally- and compositionally-related patches of intergrown clinopyroxene and An-rich plagioclase occur locally on plagioclase triple junctions and plagioclase grain boundaries. Symplectites are present, but rare, in the lower parts of the Skaergaard Layered Series; increase significantly in volumetric importance in Lower Zone b; are very common in Middle Zone and disappear in UZ. The symplectites resemble those formed by hydrous partial melting of oceanic gabbros (Koepke et al., 2005) but important differences include the presence of clinopyroxene and Fe-rich plagioclase, and the

  13. Mapping the 3-D extent of the Northern Lobe of the Bushveld layered mafic intrusion from geophysical data

    Science.gov (United States)

    Finn, Carol A.; Bedrosian, Paul A.; Cole, Janine; Khoza, Tshepo David; Webb, Susan J.

    2015-01-01

    Geophysical models image the 3D geometry of the mafic portion of the Bushveld Complex north of the Thabazimbi-Murchison Lineament (TML), critical for understanding the origin of the world's largest layered mafic intrusion and platinum group element deposits. The combination of the gravity and magnetic data with recent seismic, MT, borehole and rock property measurements powerfully constrains the models. The intrusion north of the TML is generally shallowly buried (generally modeled area of ∼160 km × ∼125 km. The modeled thicknesses are not well constrained but vary from ∼12,000 m, averaging ∼4000 m. A feeder, suggested by a large modeled thickness (>10,000 m) and funnel shape, for Lower Zone magmas could have originated near the intersection of NS and NE trending TML faults under Mokopane. The TML has been thought to be the feeder zone for the entire Bushveld Complex but the identification of local feeders and/or dikes in the TML in the models is complicated by uncertainties on the syn- and post-Bushveld deformation history. However, modeled moderately thick high density material near the intersection of faults within the central and western TML may represent feeders for parts of the Bushveld Complex if deformation was minimal. The correspondence of flat, high resistivity and density regions reflect the sill-like geometry of the Bushveld Complex without evidence for feeders north of Mokopane. Magnetotelluric models indicate that the Transvaal sedimentary basin underlies much of the Bushveld Complex north of the TML, further than previously thought and important because the degree of reaction and assimilation of the Transvaal rocks with the mafic magmas resulted in a variety of mineralization zones.

  14. Privilege Flow Oriented Intrusion Detection Based on Hidden Semi- Markov Model

    Institute of Scientific and Technical Information of China (English)

    ZHONG An-ming; JIA Chun-fu

    2005-01-01

    A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the data set of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost.

  15. RePIDS: a multi tier real-time payload-based intrusion detection system

    NARCIS (Netherlands)

    Jamdagni, Aruna; Tan, Zhiyuan; Nanda, Priyadarsi; He, Xiangjian; Liu, Ren Ping

    2013-01-01

    Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data for real-time anomaly detection. In this paper, we propose a 3-Tier Iterative

  16. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    Science.gov (United States)

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  17. Individual differences in experiencing intrusive memories : The role of the ability to resist proactive interference

    NARCIS (Netherlands)

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J.

    2009-01-01

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N = 91) completed a self-report measure of intrusive memories, and carried

  18. Mining Association Rules to Evade Network Intrusion in Network Audit Data

    Directory of Open Access Journals (Sweden)

    Kamini Nalavade

    2014-06-01

    Full Text Available With the growth of hacking and exploiting tools and invention of new ways of intrusion, intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. The false positive rates make it extremely hard to analyse and react to attacks. Intrusion detection systems using data mining approaches make it possible to search patterns and rules in large amount of audit data. In this paper, we represent a model to integrate association rules to intrusion detection to design and implement a network intrusion detection system. Our technique is used to generate attack rules that will detect the attacks in network audit data using anomaly detection. This shows that the modified association rules algorithm is capable of detecting network intrusions. The KDD dataset which is freely available online is used for our experimentation and results are compared. Our intrusion detection system using association rule mining is able to generate attack rules that will detect the attacks in network audit data using anomaly detection, while maintaining a low false positive rate.

  19. A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis

    Science.gov (United States)

    2014-04-01

    Intrusion Detection Systems: A Taxonomy and Survey; Technical Report No 99- 15, Department of Computer Engineering: Chalmers University of Technology...Göteborg, Sweden, 1999 11. Axelsson, S. Research in Intrusion-Detection Systems: A Survey and Taxonomy, Department of Computer Engineering: Chalmers ...51. 14. Department of Computer Science and Engineering; Chalmers -University of Gothenburg, SE- 412 96 Goteborg, Sweden, December 1998. http

  20. An evaluation of fiber optic intrusion detection systems in interior applications

    Energy Technology Data Exchange (ETDEWEB)

    Vigil, J.T.

    1994-03-01

    This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

  1. A Survey of Intrusion Detection%入侵检测研究综述

    Institute of Scientific and Technical Information of China (English)

    刘勇; 茅兵; 谢俊元

    2001-01-01

    Intrusion Detection(ID)is one of the important technologies of computer system security and has been widely studied recently because the traditional security technologies such as AC,Audit and Encryption cant' meet with the security demands of contemporary computer system. In this paper the studies on Intrusion Detection are introduced broadly including the definitions,classifications and important techniques.

  2. Multi-Objective Management of Saltwater Intrusion in Groundwater. Optimization under Uncertainty

    NARCIS (Netherlands)

    Tran, T.M.

    2004-01-01

    Coastal aquifers are very vulnerable to seawater intrusion through, for example, the overdraft of groundwater exploitation or insufficient recharge from upstream. Problems of salt-intrusion into groundwater have become a considerable concern in many countries with coastal areas. There have been a nu

  3. Numerical simulation and analysis of saltwater intrusion lengths in the Pearl River Delta, China

    NARCIS (Netherlands)

    Zhang, W.; Feng, H.; Zheng, J.; Hoitink, A.J.F.; Vegt, van der M.; Zhu, Y.; Cai, H.

    2013-01-01

    In recent years, large-scale saltwater intrusion has been threatening the freshwater supply in the metropolitan cities surrounding the Pearl River delta (PRD). Therefore, a better understanding of the saltwater intrusion process in this region is necessary for local water resource management. In thi

  4. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  5. Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System

    Directory of Open Access Journals (Sweden)

    Renuka Prasad.B

    2011-03-01

    Full Text Available The continuously emerging, operationally and managerially independent, geographically distributedcomputer networks deployable in an evolutionarily manner have created greater challenges in securingthem. Several research works and experiments have convinced the security expert that Network IntrusionDetection Systems (NIDS or Network Intrusion Prevention Systems (NIPS alone are not capable ofsecuring the Computer Networks from internal and external threats completely. In this paper we presentthe design of Intrusion Collaborative System which is a combination of NIDS,NIPS, Honeypots, softwaretools like nmap, iptables etc. Our Design is tested against existing attacks based on Snort Rules andseveral customized DDOS , remote and guest attacks. Dynamic rules are generated during every unusualbehavior that helps Intrusion Collaborative System to continuously learn about new attacks. Also aformal approach to deploy Live Intrusion Collaboration Systems based on System of Systems Concept isProposed.

  6. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  7. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  8. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  9. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  10. A Hybrid Approach Towards Intrusion Detection Based on Artificial Immune System and Soft Computing

    CERN Document Server

    Sanyal, Sugata

    2012-01-01

    A number of works in the field of intrusion detection have been based on Artificial Immune System and Soft Computing. Artificial Immune System based approaches attempt to leverage the adaptability, error tolerance, self- monitoring and distributed nature of Human Immune Systems. Whereas Soft Computing based approaches are instrumental in developing fuzzy rule based systems for detecting intrusions. They are computationally intensive and apply machine learning (both supervised and unsupervised) techniques to detect intrusions in a given system. A combination of these two approaches could provide significant advantages for intrusion detection. In this paper we attempt to leverage the adaptability of Artificial Immune System and the computation intensive nature of Soft Computing to develop a system that can effectively detect intrusions in a given network.

  11. SALVAGE D2.2 Description of the developed algorithms for intrusion detection in smart grid components

    DEFF Research Database (Denmark)

    Kosek, Anna Magdalena; Korman, Matus; Heussen, Kai;

    2016-01-01

    This report presents developed model-based anomaly detection techniques used for intrusion detection in smart grid.......This report presents developed model-based anomaly detection techniques used for intrusion detection in smart grid....

  12. A non-intrusive reduced-order model for compressible fluid and fractured solid coupling and its application to blasting

    Science.gov (United States)

    Xiao, D.; Yang, P.; Fang, F.; Xiang, J.; Pain, C. C.; Navon, I. M.; Chen, M.

    2017-02-01

    This work presents the first application of a non-intrusive reduced order method to model solid interacting with compressible fluid flows to simulate crack initiation and propagation. In the high fidelity model, the coupling process is achieved by introducing a source term into the momentum equation, which represents the effects of forces of the solid on the fluid. A combined single and smeared crack model with the Mohr-Coulomb failure criterion is used to simulate crack initiation and propagation. The non-intrusive reduced order method is then applied to compressible fluid and fractured solid coupled modelling where the computational cost involved in the full high fidelity simulation is high. The non-intrusive reduced order model (NIROM) developed here is constructed through proper orthogonal decomposition (POD) and a radial basis function (RBF) multi-dimensional interpolation method. The performance of the NIROM for solid interacting with compressible fluid flows, in the presence of fracture models, is illustrated by two complex test cases: an immersed wall in a fluid and a blasting test case. The numerical simulation results show that the NIROM is capable of capturing the details of compressible fluids and fractured solids while the CPU time is reduced by several orders of magnitude. In addition, the issue of whether or not to subtract the mean from the snapshots before applying POD is discussed in this paper. It is shown that solutions of the NIROM, without mean subtracted before constructing the POD basis, captured more details than the NIROM with mean subtracted from snapshots.

  13. Intrusion Detection System with Hierarchical Different Parallel Classification

    Directory of Open Access Journals (Sweden)

    Behrouz Safaiezadeh

    2015-12-01

    Full Text Available Todays, lives integrated to networks and internet. The needed information is transmitted through networks. So, someone may attempt to abuse the information and attack and make changes by weakness of networks. Intrusion Detection System is a system capable to detect some attacks. The system detects attacks through classifier construction and considering IP in network. The recent researches showed that a fundamental classification cannot be effective lonely and due to its errors, but mixing some classifications provide better efficiency. So, the current study attempt to design three classes of support vector machine, the neural network of multilayer perceptron and parallel fuzzy system in which there are trained dataset and capability to detect two classes. Finally, decisions made by an intermediate network due to type of attack. In the present research, suggested system tested through dataset of KDD99 and results indicated appropriate efficiency 99.71% in average.

  14. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  15. A Multi-Dimensional approach towards Intrusion Detection System

    CERN Document Server

    Thakur, Manoj Rameshchandra

    2012-01-01

    In this paper, we suggest a multi-dimensional approach towards intrusion detection. Network and system usage parameters like source and destination IP addresses; source and destination ports; incoming and outgoing network traffic data rate and number of CPU cycles per request are divided into multiple dimensions. Rather than analyzing raw bytes of data corresponding to the values of the network parameters, a mature function is inferred during the training phase for each dimension. This mature function takes a dimension value as an input and returns a value that represents the level of abnormality in the system usage with respect to that dimension. This mature function is referred to as Individual Anomaly Indicator. Individual Anomaly Indicators recorded for each of the dimensions are then used to generate a Global Anomaly Indicator, a function with n variables (n is the number of dimensions) that provides the Global Anomaly Factor, an indicator of anomaly in the system usage based on all the dimensions consid...

  16. A Scalable Intrusion Detection System for IPv6

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; LI Zhanchun

    2006-01-01

    The next generation protocol IPv6 brings the new challenges to the information security. This paper presents the design and implementation of a network-based intrusion detection system that support both IPv6 protocol and IPv4 protocol. This system's architecture is focused on performance, simplicity, and scalability. There are four primary subsystems that make it up: the packet capture, the packet decoder, the detection engine, and the logging and alerting subsystem. This paper further describes a new approach to packet capture whose goal is to improve the performance of the capture process at high speeds. The evaluation shows that the system has a good performance to detect IPv6 attacks and IPv4 attacks, and achieves 61% correct detection rate with 20% false detection rate at the speed of 100 Mb·s-1.

  17. Medical image of the week: alpha intrusion into REM sleep

    Directory of Open Access Journals (Sweden)

    Shetty S

    2015-12-01

    Full Text Available A 45-year-old woman with a past medical history of hypertension and chronic headaches was referred to the sleep laboratory for high clinical suspicion for sleep apnea based on a history of snoring, witnessed apnea and excessive daytime sleepiness. An overnight sleep study was performed. Images during N3 Sleep and REM sleep are shown (Figures 1 and 2. Alpha intrusion in delta sleep is seen in patients with fibromyalgia, depression, chronic fatigue syndrome, anxiety disorder, and primary sleep disorders like psychophysiological insomnia, obstructive sleep apnea, circadian disorders and narcolepsy (1. Bursts of alpha waves during REM sleep may be more common during phasic REM than tonic REM. The REM alpha bursts (alpha activity lasting at least 3 seconds without an increase in EMG amplitude may represent microarousals (2. Hypersynchronous theta activity should be differentiated from the spike and waveform activity seen in seizures.

  18. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  19. Cloud Computing for Network Security Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Jin Yang

    2013-01-01

    Full Text Available In recent years, as a new distributed computing model, cloud computing has developed rapidly and become the focus of academia and industry. But now the security issue of cloud computing is a main critical problem of most enterprise customers faced. In the current network environment, that relying on a single terminal to check the Trojan virus is considered increasingly unreliable. This paper analyzes the characteristics of current cloud computing, and then proposes a comprehensive real-time network risk evaluation model for cloud computing based on the correspondence between the artificial immune system antibody and pathogen invasion intensity. The paper also combines assets evaluation system and network integration evaluation system, considering from the application layer, the host layer, network layer may be factors that affect the network risks. The experimental results show that this model improves the ability of intrusion detection and can support for the security of current cloud computing.

  20. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  1. The effect of beach slope on tidal influenced saltwater intrusion

    Science.gov (United States)

    Zhao, Z.; Shen, C.; Jin, G.; Xin, P.; Hua, G.; Tao, X.; Zhao, J.

    2015-12-01

    Beach slope changes the tidal induced saltwater-freshwater circulations in coastal aquifers. However, the effect of beach slope on tidal influenced saltwater-freshwater mixing process is far from understood. Based on sand flume experiments and numerical simulations, we investigated the intrusion process of saltwater into freshwater under tidal forcing and variable beach slopes. The sand flume experiment results show that milder slope induces larger upper saline plume (USP) and seaward salt wedge interface (SWI) under tidal forcing. While, the steady state SWI keeps stagnant with different beach slopes. Consistent with the previous research, our numerical simulations also show a lager flux exchange across the milder beach induced by the tidal fluctuations. The groundwater table fluctuates more intensify with deeper beach slope. The next step of our study will pay attention to the effect of beach slope on the instability of USP which induces the salt-fingering flow.

  2. A Survey of Artificial Immune System Based Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Hua Yang

    2014-01-01

    Full Text Available In the area of computer security, Intrusion Detection (ID is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS. The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs. This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  3. Memory Efficient String Matching Algorithm for Network Intrusion Management System

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    As the core algorithm and the most time consuming part of almost every modern network intrusion management system (NIMS), string matching is essential for the inspection of network flows at the line speed. This paper presents a memory and time efficient string matching algorithm specifically designed for NIMS on commodity processors. Modifications of the Aho-Corasick (AC) algorithm based on the distribution characteristics of NIMS patterns drastically reduce the memory usage without sacrificing speed in software implementations. In tests on the Snort pattern set and traces that represent typical NIMS workloads, the Snort performance was enhanced 1.48%-20% compared to other well-known alternatives with an automaton size reduction of 4.86-6.11 compared to the standard AC implementation. The results show that special characteristics of the NIMS can be used into a very effective method to optimize the algorithm design.

  4. An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

    CERN Document Server

    Tedesco, Gianni

    2009-01-01

    Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

  5. An Intrusion Detection System for Kaminsky DNS Cache poisoning

    Directory of Open Access Journals (Sweden)

    Dhrubajyoti Pathak, Kaushik Baruah

    2013-09-01

    Full Text Available Domain Name System (DNS is the largest and most actively distributed, hierarchical and scalable database system which plays an incredibly inevitable role behind the functioning of the Internet as we know it today. A DNS translates human readable and meaningful domain names such as www.iitg.ernet.in into an Internet Protocol (IP address such as 202.141.80.6. It is used for locating a resource on the World Wide Web. Without a DNS, the Internet services as we know it, would come to a halt. In our thesis, we proposed an Intrusion Detection System(IDS for Kaminsky cache poisoning attacks. Our system relies on the existing properties of the DNS protocol.

  6. A Distibuted Intrusion Detection Frame%一种分布式入侵检测系统构架

    Institute of Scientific and Technical Information of China (English)

    韩宏; 卢显良

    2001-01-01

    As the process of proliferation of the Internet progresses and network security, the intrusion detection becomes a technical attraction. Now, the research of intrusion detection technology is an emerging and thriving academic field. Because of security and the confidential, papers on the topic are rare. Generally ,those papers only involve with conceptions and common knowledge. The papers on distributed intrusion detection frame ,intrusion detection immune system and resisting subversion are more rare. The paper is on these problems and solves some difficulties.

  7. Three-dimensional hydrostratigraphical modelling to support evaluation of recharge and saltwater intrusion in a coastal groundwater system in Vietnam

    OpenAIRE

    2014-01-01

    Saltwater intrusion is generally related to seawater-level rise or induced intrusion due to excessive groundwater extraction in coastal aquifers. However, the hydrogeological heterogeneity of the subsurface plays an important role in (non-)intrusion as well. Local hydrogeological conditions for recharge and saltwater intrusion are studied in a coastal groundwater system in Vietnam where geological formations exhibit highly heterogeneous lithologies. A three-dimensional (3D) hydrostratigraphic...

  8. On a new benchmark for the simulation of saltwater intrusion

    Science.gov (United States)

    Stoeckl, Leonard; Graf, Thomas

    2015-04-01

    To date, many different benchmark problems for density-driven flow are available. Benchmarks are necessary to validate numerical models. The benchmark by Henry (1964) measures a saltwater wedge, intruding into a freshwater aquifer in a rectangular model. The Henry (1964) problem of saltwater intrusion is one of the most applied benchmarks in hydrogeology. Modelling saltwater intrusion will be of major importance in the future because investigating the impact of groundwater overexploitation, climate change or sea level rise are of key concern. The worthiness of the Henry (1964) problem was questioned by Simpson and Clement (2003), who compared density-coupled and density-uncoupled simulations. Density-uncoupling was achieved by neglecting density effects in the governing equations, and by considering density effects only in the flow boundary conditions. As both of their simulations showed similar results, Simpson and Clement (2003) concluded that flow patterns of the Henry (1964) problem are largely dictated by the applied flow boundary conditions and density-dependent effects are not adequately represented in the Henry (1964) problem. In the present study, we compare numerical simulations of the physical benchmark of a freshwater lens by Stoeckl and Houben (2012) to the Henry (1964) problem. In this new benchmark, the development of a freshwater lens under an island is simulated by applying freshwater recharge to the model top. Results indicate that density-uncoupling significantly alters the flow patterns of fresh- and saltwater. This leads to the conclusion that next to the boundary conditions applied, density-dependent effects are important to correctly simulate the flow dynamics of a freshwater lens.

  9. Modeling saltwater intrusion in highly heterogeneous coastal aquifers

    Science.gov (United States)

    Safi, Amir; El-Fadel, Mutasem; Doummar, Joanna; Abou Najm, Majdi; Alameddine, Ibrahim

    2016-04-01

    In this study, a 3D variable-density flow and solute transport model SEAWAT was used to examine the impact of macroscopic variation in a soil matrix on widening or narrowing the thickness of the saltwater-freshwater mixing zone. Located along the Eastern Mediterranean (Beirut), the pilot aquifer consists of karstified limestone of Cretaceous age overlain by Upper Tertiary and Quaternary unconsolidated deposits. The model used the advanced pilot-points parameterization coupled with PEST to characterize spatial heterogeneity. Historically simulated water levels were relied upon to reduce potential numerical instabilities induced by insensitive parameters in transient calibration. The latter demonstrated a high degree of heterogeneity in the middle parts of the aquifer and along western coastlines with specification of a high hydraulic conductivity and low storativity in fault networks. The response of the aquifer to seasonal stresses such as climate cycles, pumping rates and recharge rates was manifested as high fluctuations in potentiometric surface due to potential fast flow pathways along faults. The final distribution of saltwater intrusion supports two mechanisms 1) lateral encroachment of recent seawater into the western zone of the aquifer which is of most concern due to high horizontal hydraulic conductivity in the wave direction and 2) upconing in the northwest and southwest of the aquifer due to large vertical hydraulic conductivities that tend to exacerbate the vertical movement of salinity. Acknowledgments This study is part of a program on climate change and seawater intrusion along the Eastern Mediterranean funded by the International Development Research Center (IDRC) of Canada at the American University of Beirut (AUB). Special thanks are extended to Dr. Charlotte Macalister at IDRC for her support and feedback in implementing this program.

  10. Intrusion Detection in Computer Networks using a Fuzzy-Heuristic Data Mining Technique

    Directory of Open Access Journals (Sweden)

    Hamid Saadi

    2015-12-01

    Full Text Available In this article the use of Simulated Annealing (SA algorithm for creating a consistent intrusion detection system is presented. The ability of fuzzy systems to solve different types of problems has been demonstrated in several previous studies. Simulated Annealing based Fuzzy Intrusion Detection System (SAF-IDS crosses the estimated cognitive method of fuzzy systems with the learning capability of SA. The objective of this paper is to prove the ability of SAF-IDS to deal with intrusion detection classification problem as a new real-world application area which is not previously undertook with SA-based fuzzy system. Here, the use of SA is an effort to efficiently explore and exploit the large examines space usually related with the intrusion detection problem, and finds the optimum set of fuzzy if-then rules. The proposed SAF-IDS would be capable of extracting precise fuzzy classification rules from network traffic data and relates them to detect normal and invasive actions in computer networks. Tests were performed with KDD-Cup99 intrusion detection benchmark which is widely used to calculate intrusion detection algorithms. Results indicate that SAF-IDS provides more accurate intrusion detection system than several well-known and new classification algorithms.

  11. Design and implementation of self-protection agent for network-based intrusion detection system

    Institute of Scientific and Technical Information of China (English)

    朱树人; 李伟琴

    2003-01-01

    Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively.

  12. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  13. An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. M. Reshmi

    2006-01-01

    Full Text Available Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.

  14. Toddler inhibited temperament, maternal cortisol reactivity and embarrassment, and intrusive parenting.

    Science.gov (United States)

    Kiel, Elizabeth J; Buss, Kristin A

    2013-06-01

    The relevance of parenting behavior to toddlers' development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers' inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multimethod approach would acknowledge that several levels of processes determine mothers' experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers' inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-old toddlers and their mothers. Toddlers' inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior.

  15. Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Di Wu; Zhisheng Liu; Yongxin Feng; Guangxing Wang

    2004-01-01

    There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad-Hoc networks has been shown. A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network.

  16. Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent

    Directory of Open Access Journals (Sweden)

    Chintan Bhatt

    2011-10-01

    Full Text Available This paper is a survey of the work, done for making an IDS fault tolerant.Architecture of IDS that usesmobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filterAgent, co-relater agent, Interpreter agent and rule database. When server (IDS Monitor goes down,other hosts based on priority takes Ownership. This architecture uses decentralized collection andanalysis for identifying Intrusion. Rule sets are fed based on user-behaviour or applicationbehaviour.This paper suggests that intrusion detection system (IDS must be fault tolerant; otherwise, theintruder may first subvert the IDS then attack the target system at will.

  17. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wenchao Li

    2014-01-01

    abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV. Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

  18. Examination of the U.S. EPA's vapor intrusion database based on models.

    Science.gov (United States)

    Yao, Yijun; Shen, Rui; Pennell, Kelly G; Suuberg, Eric M

    2013-02-05

    In the United States Environmental Protection Agency (U.S. EPA)'s vapor intrusion (VI) database, there appears to be a trend showing an inverse relationship between the indoor air concentration attenuation factor and the subsurface source vapor concentration. This is inconsistent with the physical understanding in current vapor intrusion models. This article explores possible reasons for this apparent discrepancy. Soil vapor transport processes occur independently of the actual building entry process and are consistent with the trends in the database results. A recent EPA technical report provided a list of factors affecting vapor intrusion, and the influence of some of these are explored in the context of the database results.

  19. Dolat Abadi’s Kaldar and reason of intrusion in narrative

    Directory of Open Access Journals (Sweden)

    شیری شیری

    2009-12-01

    Full Text Available Dolat Abadi’s Kalidar had been narrated from the intrusive third person point of view. In this way of narration, although the narrator has not physical presence but revealshls his feeling every where in the text. Some of critics, like Hooshang Golshiri, believe that this kind of narration and story telling come from far pasts. The fact is that, The narrator intrusions in Kalidar’s stories has many reasons. Some of them are: getting experiences from the past, making harmony between form and content, establishing harmony and relationship . Key word: Dolat Abadi, Golshiri, Klidar, thirdperson point of view, intrusive harration

  20. Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS

    Directory of Open Access Journals (Sweden)

    Maithili Arjunwadkar

    2012-11-01

    Full Text Available While there are various advantages of biometric authentication process, it is vulnerable to attacks, which can decline its security. To enhance the security of biometric process, Intrusion detection techniques are significantly useful. In this paper, we have designed intelligent agent as knowledge based Biometric Device Intrusion Detection tool which is an innovative design. This intelligent agent can be located on the Biometric device. It performs intrusion detection using Operating Systems audit trail and device manager information. The system consists of a user interface module, an inference engine, a knowledgebase of illegal transactions and certified biometric devices. Inference engine is implemented using JESS which is a Java Expert System Shell.

  1. The Hidden Zone of the Skaergaard Intrusion Revealed

    Science.gov (United States)

    Tegner, Christian; Salmonsen, Lars Peter

    2013-04-01

    The Hidden Zone of Skaergaard was hypothesized by LR Wager and co-workers as representing a large, unexposed, basal cumulate series rich in calcic plagioclase and with subordinate olivine and pyroxene. Although the size, shape and composition of this subzone have been debated, all subsequent works include it in their models. In 1966 a team from Oxford and Cambridge drilled a core penetrating most of Lower Zone a of the exposed Layered Series and c. 150 metres into the Hidden Zone. This core was drilled close to the western margin of the intrusion but did not reach the base although S. Maaløe argued it stopped near to the basement contact. Recent work on this core is underway by M. Holness and co-workers. Here we report on "new" outcrops at Dobbeltgletscheren in the central, basal zone of the northern part of the intrusion; these outcrops appear to be exposed only recently due to melting of the glaciers. A c. 200 m thick section is exposed. Upwards the section grades into typical Lower Zone rocks. Downwards the section is covered by ice and moraine, and the contact to the underlying basement is not exposed. The lowermost outcrops are composed of fine-grained, olivine-rich micro-troctolite layered on a scale of centimetres to decimetres. The melanocratic layers have a distinct sugary texture due to abundant (up to 60% by volume), equant olivine grains typically 0.5-1 mm across. The plagioclase is of similar size and with habits ranging from subhedral laths to anhedral grains interstitial to olivine, and oikocrysts of Ca-rich and Ca-poor pyroxene enclose equant olivine and subhedral plagioclase laths as chadacrysts. The lighter coloured mesocratic layers show the same mineralogy with less olivine (up to 40%) and more and slightly larger plagioclase relative to the melanocratic layers. Upsection the layering largely fades away and the grain size increases gradually reaching textures similar to typical Lower Zone a. Olivine (Fo72-64, 0.22-0.17 wt% NiO) and plagioclase

  2. Decoding low dihedral angles in gabbroic layered intrusions

    Science.gov (United States)

    Holness, M. B.; Humphreys, M.; Veksler, I. V.

    2010-12-01

    Texturally equilibrated rocks are granular with a unimodal grain size, smoothly curved grain boundaries, and angles at three-grain junctions of 110-140°. Gabbros are not texturally equilibrated: primocrysts commonly have planar faces whereas later-formed phases fill in the interstitial spaces. Augite-plagioclase-plagioclase dihedral angles (Θcpp) rarely attain the equilibrium value in gabbros and the population of disequilibrium angles preserves otherwise inaccessible information about rock history. The Θcpp population varies significantly between different basaltic bodies. In a rapidly cooled dolerite Θcpp has a low median (60-70°) and a high standard deviation (20-25°). The plagioclase-augite grain boundaries are generally planar. In more slowly cooled gabbros in layered intrusions, the angle populations have a higher median (80-110°) with a low standard deviation (10-15°). The plagioclase-augite grain boundaries are generally planar far from the triple junction, but curve within 10 microns of the junction. This curvature is commonly asymmetric. The angle population in solidified gabbros infiltrated by low-temperature melts is similar to that in dolerites, although the low angles are associated with cuspate interstitial grains. The dihedral angle is a function of both the original solidification process and subsequent high-temperature (melt-absent) grain boundary migration. Infilling of a melt pocket by overgrowth of the bounding solid phases necessitates supersaturation, and this is easier to attain for planar faces, resulting in inhibition of augite growth into pores bounded by planar plagioclase grains and an asymmetry of the initial augite-plag-plag junction. If the solidified gabbro is kept sufficiently hot these initial junction geometries can change during textural equilibration. In the Skaergaard, Rum and Bushveld intrusions, the median Θcpp varies with liquidus assemblage, increasing step-wise on the addition of a new liquidus phase. Locally

  3. Petrology of the Upper Border Series of the Skaergaard Intrusion

    Science.gov (United States)

    Salmonsen, L.; Tegner, C.; Jakobsen, J. K.

    2009-12-01

    The Upper Border Series crystallized downwards from the roof of the Skaergaard magma chamber. It met with the Layered Series that crystallized upwards from the floor in the Sandwich Horizon that contains the last and most evolved rocks of the intrusion. Previous investigations of the Upper Border Series (Naslund, 1984) have shown that the compositional trends of plagioclase, olivine and pyroxene largely mirror those of the Layered Series. At the same time it was argued that the crystallization sequence in Upper Border Series differed from the Layered Series in that apatite precipitated before magnetite that, in turn, appeared before Ca-rich pyroxene. From the existing data the magma from which the Upper Border Series crystallized was inferred to be enriched in SiO2, K2O, P2O5 and H2O relative to the magma in the lower parts of the intrusion. This has lead to the conception that the Upper Border Series crystallized from a chemically different magma. Here we present new petrography, mineralogy and bulk compositions for samples collected in three profiles through the Upper Border Series (Kilen, Hammerpas and Brødretoppen transects). Although euhedral apatite is present throughout most of the Upper Border Series, we interpret a marked increase in modal apatite late in the crystallization sequence as marking its first appearance on the liquidus at the crystallization front. The plagioclase An% at this level in the Upper Border Series is ˜40 and is identical with plagioclase An% at the level of apatite-in in the Layered Series. Similarly, we find that the plagioclase An% at the onset of FeTi-oxide and sulphide precipitation in the Upper Border Series (52 and 47, respectively) and Layered Series are alike. Finally, we interpret abundant augite in Upper Border Series rocks before magnetite-in as a cumulus phase. We therefore conclude that the crystallization sequences of the two series are identical. The new bulk rock data reveal that the Upper Border Series and the

  4. Composite synvolcanic intrusions associated with Precambrian VMS-related hydrothermal systems

    Science.gov (United States)

    Galley, Alan G.

    2003-06-01

    Large subvolcanic intrusions are recognized within most Precambrian VMS camps. Of these, 80% are quartz diorite-tonalite-trondhjemite composite intrusions. The VMS camps spatially associated with composite intrusions account for >90% of the aggregate sulfide tonnage of all the Precambrian, intrusion-related VMS camps. These low-alumina, low-K, and high-Na composite intrusions contain early phases of quartz diorite and tonalite, followed by more voluminous trondhjemite. They have a high proportion of high silica (>74% SiO2) trondhjemite which is compositionally similar to the VMS-hosting rhyolites within the volcanic host-rock successions. The quartz-diorite and possibly tonalite phases follow tholeiitic fractionation trends whereas the trondhjemites fall within the composition field for primitive crustal melts. These transitional M-I-type primitive intrusive suites are associated with extensional regimes within oceanic-arc environments. Subvolcanic composite intrusions related to the Archean Sturgeon Lake and Noranda, and Paleoproterozoic Snow Lake VMS camps range in volume from 300 to 1,000 km3. Three have a sill morphology with strike lengths between 15 and 22 km and an average thickness between 1,500 and 2,000 m. The fourth has a gross stock-like shape. The VMS deposits are principally restricted to the volcanic strata above the strike length of the intrusions, as are areally extensive, thin exhalite units. The composite intrusions contain numerous internal phases which are commonly clustered within certain parts of the composite intrusion. These clusters underlie eruptive centers surrounded by areas of hydrothermal alteration and which contain most of the VMS deposits. Early quartz-diorite and tonalite phases appear to have intruded in rapid succession. Evidence includes gradational contacts, magma mixing and disequilibrium textures. They appear to have been emplaced as sill-dike swarms. These early phases are present as pendants and xenoliths within later

  5. Contextualising Water Use in Residential Settings: A Survey of Non-Intrusive Techniques and Approaches.

    Science.gov (United States)

    Carboni, Davide; Gluhak, Alex; McCann, Julie A; Beach, Thomas H

    2016-05-20

    Water monitoring in households is important to ensure the sustainability of fresh water reserves on our planet. It provides stakeholders with the statistics required to formulate optimal strategies in residential water management. However, this should not be prohibitive and appliance-level water monitoring cannot practically be achieved by deploying sensors on every faucet or water-consuming device of interest due to the higher hardware costs and complexity, not to mention the risk of accidental leakages that can derive from the extra plumbing needed. Machine learning and data mining techniques are promising techniques to analyse monitored data to obtain non-intrusive water usage disaggregation. This is because they can discern water usage from the aggregated data acquired from a single point of observation. This paper provides an overview of water usage disaggregation systems and related techniques adopted for water event classification. The state-of-the art of algorithms and testbeds used for fixture recognition are reviewed and a discussion on the prominent challenges and future research are also included.

  6. Contextualising Water Use in Residential Settings: A Survey of Non-Intrusive Techniques and Approaches

    Directory of Open Access Journals (Sweden)

    Davide Carboni

    2016-05-01

    Full Text Available Water monitoring in households is important to ensure the sustainability of fresh water reserves on our planet. It provides stakeholders with the statistics required to formulate optimal strategies in residential water management. However, this should not be prohibitive and appliance-level water monitoring cannot practically be achieved by deploying sensors on every faucet or water-consuming device of interest due to the higher hardware costs and complexity, not to mention the risk of accidental leakages that can derive from the extra plumbing needed. Machine learning and data mining techniques are promising techniques to analyse monitored data to obtain non-intrusive water usage disaggregation. This is because they can discern water usage from the aggregated data acquired from a single point of observation. This paper provides an overview of water usage disaggregation systems and related techniques adopted for water event classification. The state-of-the art of algorithms and testbeds used for fixture recognition are reviewed and a discussion on the prominent challenges and future research are also included.

  7. Documentation of the seawater intrusion (SWI2) package for MODFLOW

    Science.gov (United States)

    Bakker, Mark; Schaars, Frans; Hughes, Joseph D.; Langevin, Christian D.; Dausman, Alyssa M.

    2013-01-01

    The SWI2 Package is the latest release of the Seawater Intrusion (SWI) Package for MODFLOW. The SWI2 Package allows three-dimensional vertically integrated variable-density groundwater flow and seawater intrusion in coastal multiaquifer systems to be simulated using MODFLOW-2005. Vertically integrated variable-density groundwater flow is based on the Dupuit approximation in which an aquifer is vertically discretized into zones of differing densities, separated from each other by defined surfaces representing interfaces or density isosurfaces. The numerical approach used in the SWI2 Package does not account for diffusion and dispersion and should not be used where these processes are important. The resulting differential equations are equivalent in form to the groundwater flow equation for uniform-density flow. The approach implemented in the SWI2 Package allows density effects to be incorporated into MODFLOW-2005 through the addition of pseudo-source terms to the groundwater flow equation without the need to solve a separate advective-dispersive transport equation. Vertical and horizontal movement of defined density surfaces is calculated separately using a combination of fluxes calculated through solution of the groundwater flow equation and a simple tip and toe tracking algorithm. Use of the SWI2 Package in MODFLOW-2005 only requires the addition of a single additional input file and modification of boundary heads to freshwater heads referenced to the top of the aquifer. Fluid density within model layers can be represented using zones of constant density (stratified flow) or continuously varying density (piecewise linear in the vertical direction) in the SWI2 Package. The main advantage of using the SWI2 Package instead of variable-density groundwater flow and dispersive solute transport codes, such as SEAWAT and SUTRA, is that fewer model cells are required for simulations using the SWI2 Package because every aquifer can be represented by a single layer of cells

  8. Structural control on basaltic dike and sill emplacement, Paiute Ridge mafic intrusion complex, southern Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Carter Krogh, K.E.; Valentine, G.A.

    1996-08-01

    Late Miocene basaltic sills and dikes in the Paiute Ridge area of southern nevada show evidence that their emplacement was structurally controlled. Basaltic dikes in this area formed by dilating pre-existing vertical to steeply E-dipping normal faults. Magma propagation along these faults must have required less energy than the creation of a self-propagated fracture at dike tips and the magma pressure must have been greater than the compressive stress perpendicular to the fault surface. N- to NE-trending en echelon dikes formed locally and are not obviously attached to the three main dikes in the area. The en echelon segments are probably pieces of deeper dikes, which are segmented perhaps as a result of a documented rotation of the regional stresses. Alternatively, changes in orientation of principal stresses in the vicinity of each en echelon dike could have resulted from local loads associated with paleotopographic highs or nearby structures. Sills locally branched off some dikes within 300 m of the paleosurface. These subhorizontal bodies occur consistently in the hanging wall block of the dike-injected faults, and intrude Tertiary tuffs near the Paleozoic-Tertiary contact. The authors suggest that the change in stresses near the earth`s surface, the material strength of the tuff and paleozoic rocks, and the Paleozoic bedding dip direction probably controlled the location of sill formation and direction of sill propagation. The two largest sills deflected the overlying tuffs to form lopoliths, indicating that the magma pressure exceeded vertical stresses at that location and that the shallow level and large size of the sills allowed interaction with the free (earth`s) surface. 32 refs., 4 figs., 1 tab.

  9. Aerosol direct radiative forcing during Sahara dust intrusions in the Central Mediterranean

    Directory of Open Access Journals (Sweden)

    M. R. Perrone

    2010-08-01

    Full Text Available The clear-sky, instantaneous Direct Radiative Effect (DRE by all and anthropogenic particles is calculated during Sahara dust intrusions in the Mediterranean basin, to evaluate the role of anthropogenic particle's radiative effects and to obtain a better estimate of the DRE by desert dust. The clear-sky aerosol DRE is calculated by a two stream radiative transfer model in the solar (0.3–4 μm and infrared (4–200 μm spectral range, at the top of the atmosphere (ToA and at the Earth's surface (sfc. Aerosol optical properties by AERONET sun-sky photometer measurements and aerosol vertical profiles by EARLINET lidar measurements, both performed at Lecce (40.33° N, 18.10° E during Sahara dust intrusions occurred from 2003 to 2006 year, are used to perform radiative transfer simulations. Instantaneous values at 0.44 μm of the real (n and imaginary (k refractive index and of the of aerosol optical depth (AOD vary within the 1.33–1.55, 0.0037–0.014, and 0.2–0.7 range, respectively during the analyzed dust outbreaks. Fine mode particles contribute from 34% to 85% to the AOD by all particles. The complex atmospheric chemistry of the Mediterranean basin that is also influenced by regional and long-range transported emissions from continental Europe and the dependence of dust optical properties on soil properties of source regions and transport pathways, are responsible for the high variability of n, k, and AOD values and of the fine mode particle contribution. Instantaneous all-wave (solar+infrared DREs that are negative as a consequence of the cooling effect by aerosol particles, span the – (32–10 Wm−2 and the – (44–20 Wm−2 range at the ToA and surface, respectively. The instantaneous all-wave DRE by anthropogenic particles that is negative, varies within – (13–7 Wm−2 and – (18–11 Wm−2 at the ToA and surface, respectively. It represents from 41

  10. Early Silicate Liquid Immiscibility in the Skaergaard Intrusion: Evidence from high Temperature Centrifugation Experiments

    Science.gov (United States)

    Veksler, I.; Dorfman, A. M.; Borisov, A. A.; Wirth, R.; Dingwell, D. B.

    2007-12-01

    Immiscible droplet textures are common in groundmass glasses and plagioclase-hosted melt inclusions of tholeiitic basalts (Philpotts, 1982). Our experiments on synthetic analogues of natural immiscible basaltic-rhyolitic glasses showed that conventional quenching experiments in 1-atm gas mixing furnaces were in most cases unable to reproduce unmixing yielding instead either turbid, opalescent glasses, or crystallization of tridymite and pyroxenes. In contrast, experiments involving in situ high-temperature centrifugation at 1000g on some of the liquids did yield macroscopic unmixing and phase separation. It appears that experimental reproduction of immiscibility in complex ferrobabsaltic aluminosilicate melts is hampered by nucleation barrier, metastable crystallization, and sluggish phase separation kinetics. Three-four hours of centrifugation were insufficient to complete phase segregation, and resulted in sub-micron immiscible emulsions in quenched glasses. For a model liquid composition of the Middle Zone of the Skaergaard intrusion obtained from experiments by Toplis and Carroll (1995) centrifugation at super-liquidus temperatures of 1110-1120 degrees C, produced a thin, silicic layer (64.5 wt.% SiO2 and 7.4 wt.% FeO) at the top of the main Fe-rich glass (46 wt.% SiO2 and 21 wt.% FeO). Transmission electron microscopy of the quenched products revealed silica-rich immiscible globules of about 20--30 nm in diameter suspended in the Fe-rich glass. The globules are however not a quench feature because they moved during centrifugation over a few millimeters of the sample length and eventually accumulated in the thin (0.2 mm) silicic liquid layer at the top. The divergent compositions of the top and at the bottom were shown in a series of static runs to crystallize very similar crystal assemblages of plagioclase, pyroxene, olivine, and Fe-Ti oxides. In light of our centrifuge experiments, immiscibility in the Skaergaard intrusion may have started already at the

  11. Existence, morphology and persistence of intrusions as a probe for lithosphere rheology

    Science.gov (United States)

    Massmeyer, Anna; Davaille, Anne; Di Giuseppe, Erika

    2013-04-01

    The development of intrusions in the lithosphere depends strongly on its rheology. Less viscous mushroom-shaped plumes or more viscous finger-shaped diapirs, depending on the viscosity ratio between the rising and the matrix materials, are known to migrate through ductile, quasi-newtonian lithosphere; while dikes fracture and propagate through a solid matrix. However, the lithosphere presents solid as well as viscous properties. To determine what happens in this complex case, we performed a combined study of laboratory experiments and numerical simulations on the development of thermal plumes in aqueous solutions of Carbopol, a polymer gel suspension forming a continuous network of micrometric sponges. This fluid is shear thinning and presents a yield-stress, whereby flow occurs only if the local stress exceeds a critical value ?0. Below this value, the fluid acts as an elastic solid. The rheological properties of the solutions can be systematically varied by varying the Carbopol concentration. Our experimental setup consists of a localized heat-source of constant power, placed in the center of a squared plexiglas tank. Two conditions must be fulfilled for an instability to develop and rise: 1) the Yield number 0 comparing the buoyancy-induced stress to the yield stress, should be greater than a critical value c ~ 6; and 2) the Bingham number Bi, comparing the yield stress to the viscous stresses, needs to be locally smaller than 1. Then, a plug flow develops inside the plume thermal anomaly, producing a rising finger-shape with strong shear zones confined along its edges. Moreover, the instability halts its ascent as soon as 0 1. Those finger-shaped diapirs show strong similarities with an off-axis diapir in Oman emplaced in a ridge context. This geological object, a few kilometers in diameter, presents strong shear localization along its edges. Our fluid dynamical analysis places constraints on the parameter range within which such an object may be emplaced. It

  12. Aerosol direct radiative forcing during Sahara dust intrusions in the central Mediterranean

    Directory of Open Access Journals (Sweden)

    M. R. Perrone

    2009-10-01

    Full Text Available The clear-sky, instantaneous Direct Radiative Effect (DRE by all and anthropogenic particles is calculated during Sahara dust intrusions in the Mediterranean basin, to evaluate the role of anthropogenic particle's radiative effects and to get a better estimate of the DRE by desert dust. The clear-sky aerosol DRE is calculated by a two stream radiative transfer model in the solar (0.3–4 μm and infrared (4–200 μm spectral range, at the top of the atmosphere (ToA and at the Earth's surface (sfc. Aerosol optical properties by AERONET sun-sky photometer measurements and aerosol vertical profiles by EARLINET lidar measurements, both performed at Lecce (40.33° N, 18.10° E during Sahara dust intrusions occurred from 2003 to 2006 year, are used to initialize radiative transfer simulations. Instantaneous values at 0.44 μm of the real (n and imaginary (k refractive index and of the of aerosol optical depth (AOD vary within the 1.33–1.55, 0.0037–0.014, and 0.2–0.7 range, respectively during the analyzed dust outbreaks. Fine mode particles contribute from 34% to 85% to the AOD by all particles. The complex atmospheric chemistry of the Mediterranean basin that is also influenced by regional and long-range transported emissions from continental Europe and the dependence of dust optical properties on soil properties of source regions and transport pathways are responsible for the high variability of n, k, and AOD values and of the fine mode particle contribution. Instantaneous net (solar+infrared DREs that are negative as a consequence of the cooling effect by aerosol particles, span the – (32–10 W m−2 and the – (44–20 W m−2 range at the ToA and surface, respectively. The instantaneous net DRE by anthropogenic particles that is negative, varies within −(13–8 W m−2 and −(17–11 W m−2 at the ToA and surface, respectively. It represents from 41 up to 89

  13. Structural, Petrographic and Geochemical Characteristics of Mafic Dikes Intrusive in Metasedimentary Rocks of the Crixás Greenstone Belt, Goiás

    Directory of Open Access Journals (Sweden)

    Hardy Jost

    2010-10-01

    Full Text Available Mafic dikes and stocks are a common feature in the Archean terrain of Goiás, Central Brazil, where they occur asswarms of 2.3 - 2.5 Ga within the granite-gneiss complexes (2.8 e 2.7 Ga, as well as intrusions related to the komatiite andbasalt flows of the greenstone belts lower stratigraphic units, but were unknown within the upper metasedimentary units.Detailed study of core sections from several drill-sites in the area of the Crixás greenstone belt gold deposits showed thatdike intrusion occurred after the main Paleoproterozoic deformation and metamorphism of the metasedimentary units,and literature data indicate that the magmatic zircons from the dikes yielded an age of 2,170 ± 17 Ma. Petrographic andgeochemical data show that they have the composition of epicratonic high-Ti diabases, which are similar to the largecontinental flood basalts of the Paraná Basin. The age of the intrusions may be correlated with the short time-interval of theRhyacian (2.20 to 2.17 Ga, during which successive localized episodes of mantle plume volcanism occurred on the Earth.

  14. Intrusion Detection Technology Based on Artificial Immunology Mechanism%基于人工免疫机制的入侵检测技术

    Institute of Scientific and Technical Information of China (English)

    朱郁森; 赵明

    2004-01-01

    现有网络入侵检测系统的大都不能识别未知模式的入侵,智能水平低.生物免疫系统提供了一种的健壮的、自组织、分布式的防护体系,对设计新的网络入侵检测系统具有很好的借鉴意义.详细介绍了对当前入侵检测中所应用的免疫机制.%Current network intrusion detection systems have a fatal deficiency of being unable to detect new intrusive behaviors of unknown signatures and low intelligence level. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, the current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. Here we collate the used algorithms, the development of the systems and the outcome of their implementation.

  15. Enrichment of fluoride in groundwater under the impact of saline water intrusion at the salt lake area of Yuncheng basin, northern China

    Science.gov (United States)

    Gao, Xubo; Wang, Yanxin; Li, Yilian; Guo, Qinghai

    2007-12-01

    Long-term intake of high-fluoride groundwater causes endemic fluorosis. This study, for the first time, discovered that the salt lake water intrusion into neighboring shallow aquifers might result in elevation of fluoride content of the groundwater. Two cross-sections along the groundwater flow paths were selected to study the geochemical processes controlling fluoride concentration in Yuncheng basin, northern China. There are two major reasons for the observed elevation of fluoride content: one is the direct contribution of the saline water; the other is the undersaturation of the groundwater with respect to fluorite due to salt water intrusion, which appears to be more important reason. The processes of the fluorine activity reduction and the change of Na/Ca ratio in groundwater induced by the intrusion of saline water favor further dissolution of fluorine-bearing mineral, and it was modeled using PHREEQC. With the increase in Na concentration (by adding NaCl or Na2SO4 as Na source, calcium content kept invariable), the increase of NaF concentration was rapid at first and then became slower; and the concentrations of HF, HF{2/-}, CaF+, and MgF+ were continuously decreasing. The geochemical conditions in the study area are advantageous to the complexation of F- with Na+ and the decline of saturation index of CaF2, regardless of the water type (Cl-Na or SO4-Na type water).

  16. Magmatic ore deposits in layered intrusions - Descriptive model for reef-type PGE and contact-type Cu-Ni-PGE deposits

    Science.gov (United States)

    Zientek, Michael L.

    2012-01-01

    of meters thick. The modes and textures of the igneous rocks hosting the mineralization vary irregularly on the scale of centimeters to meters; autoliths and xenoliths are common. Mineralization occurs in the igneous intrusion and in the surrounding country rocks. Mineralization can be preferentially localized along contact with country rocks that are enriched in sulfur-, iron-, or CO2-bearing lithologies. Reef-type and contact-type deposits, in particular those in the Bushveld Complex, South Africa, are the world's primary source of platinum and rhodium (tables 2 and 3; fig. 2). Reef-type PGE deposits are mined only in the Bushveld Complex (Merensky Reef and UG2), the Stillwater Complex (J-M Reef), and the Great Dyke (Main Sulphide Layer). PGE-enriched contact-type deposits are only mined in the Bushveld Complex. The other deposits in tables 2 and 3 are undeveloped; some are still under exploration.

  17. Rule Generalisation in Intrusion Detection Systems using Snort

    CERN Document Server

    Aickelin, Uwe; Hesketh-Roberts, Thomas

    2008-01-01

    Intrusion Detection Systems (ids)provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An ids responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of ids use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source ids that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard d...

  18. A two-dimensional analytical model of petroleum vapor intrusion

    Science.gov (United States)

    Yao, Yijun; Verginelli, Iason; Suuberg, Eric M.

    2016-02-01

    In this study we present an analytical solution of a two-dimensional petroleum vapor intrusion model, which incorporates a steady-state diffusion-dominated vapor transport in a homogeneous soil and piecewise first-order aerobic biodegradation limited by oxygen availability. This new model can help practitioners to easily generate two-dimensional soil gas concentration profiles for both hydrocarbons and oxygen and estimate hydrocarbon indoor air concentrations as a function of site-specific conditions such as source strength and depth, reaction rate constant, soil characteristics and building features. The soil gas concentration profiles generated by this new model are shown in good agreement with three-dimensional numerical simulations and two-dimensional measured soil gas data from a field study. This implies that for cases involving diffusion dominated soil gas transport, steady state conditions and homogenous source and soil, this analytical model can be used as a fast and easy-to-use risk screening tool by replicating the results of 3-D numerical simulations but with much less computational effort.

  19. Sensitivity analysis on parameters and processes affecting vapor intrusion risk.

    Science.gov (United States)

    Picone, Sara; Valstar, Johan; van Gaans, Pauline; Grotenhuis, Tim; Rijnaarts, Huub

    2012-05-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion.

  20. Flexible Training's Intrusion on Work/Life Balance

    Directory of Open Access Journals (Sweden)

    Zane BERGE

    2005-04-01

    Full Text Available Flexible Training's Intrusion on Work/Life Balance Seema TAKIYAJennifer ARCHBOLDZane BERGEBaltimore, USA Learning interventions should be aligned with the human learning system. To be effective, they have to support human learning, not work against it. Thalheimer, 2004 ABSTRACT With more companies allowing “flextime”, more access to elearning, and telecomuting, the line between workplace flexibility and work-life balance begins to blur. Companies “sell” to employees the flexibility of being able to complete training programs from the comfort of the participant's home, allowing them to learn at their own speed. In many ways, this solution is of great value to many employees. What also must be considered with the flexibility such training offers, is the unintentional consequences. This article explores questions such as does this flexibility create a 24-hour work day where the employee is continually accessible to work? Does it result in less family, personal and leisure time to the detriment of the worker?

  1. INTRUSION DETECTION SYSTEM IN SECURE SHELL TRAFFIC IN CLOUD ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Mehdi Barati

    2014-01-01

    Full Text Available Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade detection. Many traditional attack detection techniques have been proposed to provide security in the networks but none of them can be implemented properly in encrypted networks. This study investigates a popular attack in Secure Shell (SSH, known as brute force attack and provides an efficient method to detect this attack. Brute force attack is launched by implementing a client-server SSH model in a private Cloud environment and the traffics regarding attack and normal are captured on the server. Then, representative features of traffic are extracted and used by the Multi-Layer Perceptron model of Artificial Neural Network to classify the attack and normal traffic. Results gained by this method show that the proposed model is successfully capable to detect this attack with high accuracy and low false alarm.

  2. Probabilistic assessment of seawater intrusion under multiple sources of uncertainty

    Science.gov (United States)

    Riva, M.; Guadagnini, A.; Dell'Oca, A.

    2015-01-01

    Coastal aquifers are affected by seawater intrusion (SWI) on a worldwide scale. The Henry's problem has been often used as a benchmark to analyze this phenomenon. Here, we investigate the way an incomplete knowledge of the system properties impacts the assessment of global quantities (GQs) describing key characteristics of the saltwater wedge in the dispersive Henry's problem. We recast the problem in dimensionless form and consider four dimensionless quantities characterizing the SWI process, i.e., the gravity number, the permeability anisotropy ratio, and the transverse and longitudinal Péclet numbers. These quantities are affected by uncertainty due to the lack of exhaustive characterization of the subsurface. We rely on the Sobol indices to quantify the relative contribution of each of these uncertain terms to the total variance of each of the global descriptors considered. Such indices are evaluated upon representing the target GQs through a generalized Polynomial Chaos Expansion (gPCE) approximation. The latter also serves as a surrogate model of the global system behavior. It allows (a) computing and analyzing the joint and marginal probability density function (pdf) of each GQ in a Monte Carlo framework at an affordable computational cost, and (b) exploring the way the uncertainty associated with the prediction of these global descriptors can be reduced by conditioning of the joint pdf on available information. Corresponding analytical expressions of the marginal pdfs of the variables of interest are derived and analyzed.

  3. Intrusion Detection System using Self Organizing Map: A Survey

    Directory of Open Access Journals (Sweden)

    Kruti Choksi

    2014-12-01

    Full Text Available Due to usage of computer every field, Network Security is the major concerned in today’s scenario. Every year the number of users and speed of network is increasing, along with it online fraud or security threats are also increasing. Every day a new attack is generated to harm the system or network. It is necessary to protect the system or networks from various threats by using Intrusion Detection System which can detect “known” as well as “unknown” attack and generate alerts if any unusual behavior in the traffic. There are various approaches for IDS, but in this paper, survey is focused on IDS using Self Organizing Map. SOM is unsupervised, fast conversion and automatic clustering algorithm which is able to handle novelty detection. The main objective of the survey is to find and address the current challenges of SOM. Our survey shows that the existing IDS based on SOM have poor detection rate for U2R and R2L attacks. To improve it, proper normalization technique should be used. During the survey we also found that HSOM and GHSOM are advance model of SOM which have their own unique feature for better performance of IDS. GHSOM is efficient due to its low computation time. This survey is beneficial to design and develop efficient SOM based IDS having less computation time and better detection rate.

  4. Non-intrusive human fatigue monitoring in command centers

    Science.gov (United States)

    Alsamman, A.; Ratecki, T.

    2011-04-01

    An inexpensive, non-intrusive, vision-based, active fatigue monitoring system is presented. The system employs a single consumer webcam that is modified to operate in the near-IR range. An active IR LED system is developed to facilitate the quick localization of the eye pupils. Imaging software tracks the eye features by analyzing intensity areas and their changes in the vicinity of localization. To quantify the level of fatigue the algorithm measures the opening of the eyelid, PERCLOS. The software developed runs on the workstation and is designed to draw limited computational power, so as to not interfere with the user task. To overcome low-frame rate and improve real-time monitoring, a two-phase detection and tacking algorithm is implemented. The results presented show that the system successfully monitors the level of fatigue at a low rate of 8 fps. The system is well suited to monitor users in command centers, flight control centers, airport traffic dispatchers, military operation and command centers, etc., but the work can be extended to wearable devices and other environments.

  5. Non-intrusive method of measuring PCV blowby constituents

    Energy Technology Data Exchange (ETDEWEB)

    Crane, M.E.; Ariga, S.; Boulard, R.; Lindamood, B.

    1994-10-01

    A technique is presented that has been successfully demonstrated to non-intrusively and quickly sample gases typically found in PCV systems. Color Detection Tubes (CDTs) were used with a simple sampling arrangement to monitor CO{sub 2}, NO{sub x}, O{sub 2}, and H{sub 2}O(g) at the closure line, crankcase, and PCV line. Measurements were accurate and could be made instantaneously. Short Path Thermal Desorbtion Tubes (SPTDTs) were used at the same engine locations for the characterization of fuel- and oil-derived hydrocarbon (HC) fractions and required only 50 cc samples. High engine loads caused pushover of blowby vapors as indicated by increased concentrations of CO{sub 2}, NO{sub x}, H{sub 2}O(g), and fuel HCs in the engines` fresh air inlets during WOT operation. Peak concentrations of blowby vapors were measured in the crankcase under no load and part throttle conditions. Oxygen concentrations always opposed the trends of CO{sub 2}, NO{sub x}, and H{sub 2}O(g). SPTDT data revealed that the PCV system consumes approximately 100-200 times more fuel vapors than oil vapors, on a mass basis; however, PCV-derived oil consumption represented almost 12 percent of total engine oil consumption under no load conditions. 8 refs., 17 figs.

  6. Cooling of an igneous dike 20 yr after intrusion

    Science.gov (United States)

    Connor, C. B.; Lichtner, P. C.; Conway, F. M.; Hill, B. E.; Ovsyannikov, A. A.; Federchenko, I.; Doubik, Yu.; Shapar, V. N.; Taran, Yu. A.

    1997-08-01

    The 1975 Tolbachik, Kamchatka, Russia, eruption resulted in the formation of three basaltic cinder cones. During this eruption, shallow dike injection into a nearby cinder cone, Cone 1004, caused deformation and slumping of the cone. In 1995, temperatures at 2 m depth, electromagnetic anomalies, and geologic units were mapped on the slump block. These data reveal details about the cooling rates of a shallow dike in the slump block, including (1) measured temperatures as much as 475 °C, (2) temperatures greater than 200 °C along a 160-m-long and 30-m-wide zone that trends oblique to bedding, (3) a low resistivity zone at 80 m depth that may delimit a larger intrusion beneath the shallow dike, (4) a dry zone extending 15 20 m from the axis of the thermal anomaly, and (5) a condensation zone beyond this dry-out zone, characterized by steaming ground and high convective heat flux. Analytic models indicate that the surprisingly high temperatures persist because of the low thermal diffusivity of the scoria into which the dike is injected, a direct result of the scoria's high porosity. Two-phase nonisothermal flow models suggest that the observed patterns of dry-out and condensation are expected for small volume fractions of water in the scoria (≤10%). Thus, field observations from Tolbachik provide a graphic example of the roles of rock thermophysical properties and water in the unsaturated zone on rates of dike cooling.

  7. Active Learning Framework for Non-Intrusive Load Monitoring: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Xin

    2016-05-16

    Non-Intrusive Load Monitoring (NILM) is a set of techniques that estimate the electricity usage of individual appliances from power measurements taken at a limited number of locations in a building. One of the key challenges in NILM is having too much data without class labels yet being unable to label the data manually for cost or time constraints. This paper presents an active learning framework that helps existing NILM techniques to overcome this challenge. Active learning is an advanced machine learning method that interactively queries a user for the class label information. Unlike most existing NILM systems that heuristically request user inputs, the proposed method only needs minimally sufficient information from a user to build a compact and yet highly representative load signature library. Initial results indicate the proposed method can reduce the user inputs by up to 90% while still achieving similar disaggregation performance compared to a heuristic method. Thus, the proposed method can substantially reduce the burden on the user, improve the performance of a NILM system with limited user inputs, and overcome the key market barriers to the wide adoption of NILM technologies.

  8. Distributed Intrusion Detection System for Ad hoc Mobile Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Nawaz Khan

    2012-01-01

    Full Text Available In mobile ad hoc network resource restrictions on bandwidth, processing capabilities, battery life and memory of mobile devices lead tradeoff between security and resources consumption. Due to some unique properties of MANETs, proactive security mechanism like authentication, confidentiality, access control and non-repudiation are hard to put into practice. While some additional security requirements are also needed, like cooperation fairness, location confidentiality, data freshness and absence of traffic diversion. Traditional security mechanism i.e. authentication and encryption, provide a security beach to MANETs. But some reactive security mechanism is required who analyze the routing packets and also check the overall network behavior of MANETs. Here we propose a local-distributed intrusion detection system for ad hoc mobile networks. In the proposed distributed-ID, each mobile node works as a smart agent. Data collect by node locally and it analyze that data for malicious activity. If any abnormal activity discover, it informs the surrounding nodes as well as the base station. It works like a Client-Server model, each node works in collaboration with server, updating its database each time by server using Markov process. The proposed local distributed- IDS shows a balance between false positive and false negative rate. Re-active security mechanism is very useful in finding abnormal activities although proactive security mechanism present there. Distributed local-IDS useful for deep level inspection and is suited with the varying nature of the MANETs.

  9. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    KAUST Repository

    Picone, Sara

    2012-03-30

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion. © 2012 SETAC.

  10. Geochemical and isotopic signatures for the identification of seawater intrusion in an alluvial aquifer

    Indian Academy of Sciences (India)

    Indu S Nair; S P Rajaveni; M Schneider; L Elango

    2015-08-01

    Seawater intrusion is one of the alarming processes that reduces the water quality and imperils the supply of freshwater in coastal aquifers. The region, north of the Chennai city, India is one such site affected by seawater intrusion. The objective of this study is to identify the extent of seawater intruded area by major geochemical and isotopic signatures. A total of 102 groundwater samples were collected and analysed for major and minor ions. Groundwater samples with electrical conductivity (EC) greater than 5000 S/cm and a river mouth sample were analyzed for Oxygen-18 (18O) and Deuterium (2H) isotopes to study their importance in monitoring seawater intrusion. The molar ratio of geochemical indicators and isotopic signatures suggests an intrusion up to a distance of 13 km from the sea as on March 2012 and up to 14.7 km during May 2012.

  11. Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets

    Directory of Open Access Journals (Sweden)

    Chandrashekhar Azad

    2013-07-01

    Full Text Available In the era of information and communication technology, Security is an important issue. A lot of effort and finance are being invested in this sector. Intrusion detection is one of the most prominent fields in this area. Data mining in network intrusion detection can automate the network intrusion detection field with a greater efficiency. This paper presents a literature survey on intrusion detection system. The research papers taken in this literature survey are published from 2000 to 2012. We can see that almost 67 % of the research papers are focused on anomaly detection, 23 % on both anomaly and misuse detection and 10 % on misuse detection. In this literature survey statistics shows that 42 % KDD cup dataset, 20 % DARPA dataset and 38 % other datasets are used by the different researchers for testing the effectiveness of their proposed method for misuse detection, anomaly detection or both.

  12. Design of Intrusion Detection Model Based on FP-Growth and Dynamic Rule Generation with Clustering

    Directory of Open Access Journals (Sweden)

    Manish Somani

    2013-06-01

    Full Text Available Intrusion Detection is the process used to identify intrusions. If we think of the current scenario then several new intrusion that cannot be prevented by the previous algorithm, IDS is introduced to detect possible violations of a security policy by monitoring system activities and response in all times for betterment. If we detect the attack type in a particular communication environment, a response can be initiated to prevent or minimize the damage to the system. So it is a crucial concern. In our framework we present an efficient framework for intrusion detection which is based on Association Rule Mining (ARM and K-Means Clustering. K- Means clustering is use for separation of similar elements and after that association rule mining is used for better detection. Detection Rate (DR, False Positive Rate (FPR and False Negative Rate (FNR are used to measure performance and analysis experimental results.

  13. Development and application of a three-dimensional finite element vapor intrusion model.

    Science.gov (United States)

    Pennell, Kelly G; Bozkurt, Ozgur; Suuberg, Eric M

    2009-04-01

    Details of a three-dimensional finite element model of soil vapor intrusion, including the overall modeling process and the stepwise approach, are provided. The model is a quantitative modeling tool that can help guide vapor intrusion characterization efforts. It solves the soil gas continuity equation coupled with the chemical transport equation, allowing for both advective and diffusive transport. Three-dimensional pressure, velocity, and chemical concentration fields are produced from the model. Results from simulations involving common site features, such as impervious surfaces, porous foundation sub-base material, and adjacent structures are summarized herein. The results suggest that site-specific features are important to consider when characterizing vapor intrusion risks. More importantly, the results suggest that soil gas or subslab gas samples taken without proper regard for particular site features may not be suitable for evaluating vapor intrusion risks; rather, careful attention needs to be given to the many factors that affect chemical transport into and around buildings.

  14. Effects of suppressing negative memories on intrusions and autobiographical memory specificity

    NARCIS (Netherlands)

    Geraerts, Elke; Hauer, Beatrijs J. A.; Wessel, Ineke

    2010-01-01

    This study examines whether avoidance of negative memories results in intrusions as well as reduced memory specificity. Healthy participants suppressed memories of either a negative or a neutral autobiographical event. Individuals who suppressed negative memories tended to demonstrate smaller increa

  15. Analysis of Host-Based and Network-Based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Amrit Pal Singh

    2014-07-01

    Full Text Available Intrusion-detection systems (IDS aim at de-tecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion Detection is of two types Network-IDS and Host Based- IDS. This paper covers the scope of both the types and their result analysis along with their comparison as stated. OSSEC (HIDS is a free, open source host-base intrusion detection system. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting and active response. While Snort (NIDS is a lightweight intrusion detection system that can log packets coming across your network and can alert the user regarding any attack. Both are efficient in their own distinct fields.

  16. Mechanism of Gas Intrusion into Molten Metal during Horizontal Centrifugal Casting

    Institute of Scientific and Technical Information of China (English)

    NI Feng; ZHANG Xhan-ling; YANG Di-xin; BI Xiao-qin; ZHANG Yong-zhen

    2004-01-01

    A mechanism of gas intrusion into molten metal during horizontal centrifugal casting was introduced .Based upon this concept, a special pouring method was suggested ,which can effectively prevent the pinhole defects in horizontal centrifugal castings.

  17. Osmotic pressure effects upon intrusion of liquid electrolytes inside hydrophobic MOF's

    CERN Document Server

    Michelin-Jamois, M; Charlaix, E; Vigier, G

    2014-01-01

    High pressure water intrusion in hydrophobic nanoporous media have been studied in relation with energy storage. It has already been showed that addition of electrolytes in water increases intrusion pressure of liquid leading to an enhancement of storing capacities. We demonstrate here that for a number of salt, a very simple van't Hoff law can explain intrusion and extrusion excess pressures compared with the pure water case. Our results suggest that only pure water can penetrate the pores, the ions being quartered in the bulk liquid around nanoporous medium. This selectivity explains very high pressures for very concentrated ions reported by Tzanis et al (2014). Finally, a partial intrusion of NaI and LiI is observed. This effect could be explained on the basis of particular behaviour or iodide ions over hydrophobic surfaces.

  18. Early Permian intrusions in the Paleozoic sediments of the Eastern North Sea area

    DEFF Research Database (Denmark)

    Clausen, O.R.; Andresen, Katrine Juul; Rasmussen, Jens Andreas

    of hydrocarbons within the Paleozoic sediments, the Northern Permian Basin has gained much less interest outside the hydrocarbon producing Mesozoic graben systems. This is mainly due to an apparent lack of potential source rocks. A major E-W striking northward dipping fault system characterizes the study area......This study presents the geometry of Paleozoic intrusions in the Skagerrak area located at the northern flank of the Ringkøbing-Fyn High and suggests factors controlling the formation of the intrusions. The intrusions have here been mapped in detail using 3D seismic data. The study area is located...... is a potential source rock, has local depositional maxima associated to the basement faults. Salt structures which have been periodically active during the post Paleozoic dominate the northern part of the study area. The Paleozoic intrusions observed in the hanging-wall segment of the E-W striking fault system...

  19. Multi-Use Non-Intrusive Flow Characterization System (FCS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The product of the Phase II effort will be a Multi-Use Non-Intrusive Flow Characterization System (FCS) for densified, normal boiling point, and two-phase cryogenic...

  20. Multi-Use Non-Intrusive Flow Characterization System (FCS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation is a Multi-Use Non-Intrusive Flow Characterization System (FCS) for densified, normal boiling point, and two-phase cryogenic flows, capable of...

  1. Application of a Collaborative Filtering Recommendation Algorithm Based on Cloud Model in Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Deguang Wang

    2011-02-01

    Full Text Available Intrusion detection is a computer network system that collects information on several key points. and it gets these information from the security audit, monitoring, attack recognition and response aspects, check if there are some the behavior and signs against the network security policy. The classification of data acquisition is a key part of intrusion detection. In this article, we use the data cloud model to classify the invasion, effectively maintaining a continuous data on the qualitative ambiguity of the concept and evaluation phase of the invasion against the use of the coordination level filtering recommendation algorithm greatly improves the intrusion detection system in the face of massive data processing efficiency suspicious intrusion.

  2. A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach

    Directory of Open Access Journals (Sweden)

    Aditya Shrivastava

    2013-09-01

    Full Text Available The growth of internet technology spread a large amount of data communication. The communication of data compromised network threats and security issues. The network threats and security issues raised a problem of data integrity and loss of data. For the purpose of data integrity and loss of data before 20 year Anderson developed a model of intrusion detection system. Initially intrusion detection system work on process of satirical frequency of audit system logs. Latter on this system improved by various researchers and apply some other approach such as data mining technique, neural network and expert system. Now in current research trend of intrusion detection system used soft computing approach such as fuzzy logic, genetic algorithm and machine learning. In this paper discuss some method of data mining and soft computing for the purpose of intrusion detection. Here used KDDCUP99 dataset used for performance evaluation for this technique.

  3. A geologic and mineral exploration spatial database for the Stillwater Complex, Montana

    Science.gov (United States)

    Zientek, Michael L.; Parks, Heather L.

    2014-01-01

    The Stillwater Complex is a Neoarchean, ultramafic to mafic layered intrusion exposed in the Beartooth Mountains in south-central Montana. This igneous intrusion contains magmatic mineralization that is variably enriched in strategic and critical commodities such as chromium, nickel, and the platinum-group elements. One deposit, the J-M Reef, is the sole source of primary production and reserves for platinum-group elements in the United States.

  4. Petrogenesis of Carbonatites in the Alnö Complex, Central Sweden

    OpenAIRE

    Roopnarain, Sherissa

    2013-01-01

    The Alnö Complex is a Late Precambrian alkaline and carbonatite intrusion (c. 30km2) into Early Proterozoic country rock that extends from the north east, to the north western shoulder of Alnö Island. Carbonatites are rare among volcanic provinces, with Oldoinyo Lengai of northern Tanzania being the only active carbonatite volcano in the world today. The high carbonate mineral volumes and rare earth element (REE) concentrations of carbonatites, in combination with the intrusive-extrusive natu...

  5. A new interpretation of the structure of the Sept Iles Intrusive suite, Canada

    Science.gov (United States)

    Higgins, Michael D.

    2005-08-01

    The layered mafic intrusion at Sept Iles, Canada, is one of the largest intrusions in the world. A new interpretation of its structure is proposed, based on a review of its geology and a comparison with the Skaergaard intrusion, Greenland. Several different magmatic components are recognized; hence the name Sept Iles Intrusive suite (SIIS) is proposed. Emplacement of the suite may have been preceded by eruption of flood basalts. The first magmas of the suite rose in the crust to accumulate beneath the density filter afforded by the basalts. The largest component is the Sept Iles Mafic intrusion (SIMI). The Lower series of the SIMI is dominated by leucotroctolites and leucogabbros. Above it lie the Layered series, which is largely comprised of gabbro and troctolite. Both these units are unchanged from earlier interpretations. The anorthosites (s.l.), gabbros and monzogabbros, formerly called the Transitional series, are now considered to be the Upper Border series, developed by floatation of plagioclase. Common autoliths in the Layered series are parts of the hydrothermally altered Upper Border series from towards the interior of the intrusion, which have foundered and settled through the magma. The contamination of the magma that accompanied this event oxidised iron in the magma and led to the precipitation of magnetite around the periphery of the intrusion. The subsequent depletion of Fe 3+ and/or increase in SiO 2, CaO and P 2O 5 may have induced apatite saturation and accumulation to form two layers rich in apatite, near the base and at top of the Layered series. Granitic magma was developed by fractional crystallisation and was emplaced along the roof of the chamber, where it acquired large quantities of xenoliths. These were probably derived from the flood basalts, their evolved members and fragments of mafic dykes chilled by the granitic magma. Accumulations of monzonite pillows in this unit testify to another magmatic event and a floor to the granitic magma

  6. 关于入侵检测系统和入侵防御系统的探讨%Discussion of Intrusion Detection and Intrusion Prevention System

    Institute of Scientific and Technical Information of China (English)

    丁志芳; 徐孟春; 汪淼; 殷石昌

    2006-01-01

    本文简要介绍了入侵检测系统(Intrusion Detection System,IDS)的优势和不足,分析入侵防御系统(Intrusion Prevention System,IPS)的原理和特点.IPS与IDS各有其优点和不足,应该充分发挥各自的优势,使双方达到互补,相辅相成,共同建立现实的网络与信息安全体系.

  7. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA)

    OpenAIRE

    Ioan Bâca

    2016-01-01

    Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian), the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene), and the stage of subaerial modeling of magmatic bodies (Pliocene-current).In those circumstances, the geodiversity of int...

  8. Management of intrusive luxation in the primary dentition by surgical repositioning: an alternative approach.

    Science.gov (United States)

    Shanmugam, H V; Arangannal, P; Vishnurekha, C; Nichani, M H; Vijayaprabha, K

    2011-06-01

    Intrusive luxation is the most common trauma during early infancy which results in the displacement of the tooth into its alveolus. Depending on the severity of the intrusion, the American Academy of Pediatric Dentistry recommends either extraction or spontaneous re-eruption for the primary tooth. This case report provides a brief insight into surgical repositioning as an alternative treatment option for the management of intruded primary tooth in a 4-year-old girl.

  9. Study on the Status Quo and Prevention-control Measures of Seawater Intrusion in Qingdao City

    Institute of Scientific and Technical Information of China (English)

    SUN; Jian-ming; LI; Jia-jia; GAO; Zong-jun

    2012-01-01

    Firstly, the general situation, influencing factors and damage of seawater intrusion in Qingdao City, Shandong Province were analyzed, and then some appropriate remedial measures were put forward, such as improving groundwater monitoring system in costal areas, exploiting groundwater reasonably, building underground cut-off walls and strengthening river management, which would provide a new approach for the prevention and control of seawater intrusion in Qingdao City.

  10. Proceedings of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment

    OpenAIRE

    Flegel, Ulrich; Meier, Michael

    2004-01-01

    This volume contains the proceedings of the GI special interest group SIDAR workshop DIMVA 2004 which took place in Dortmund, Germany July 6-7 2004. DIMVA 2004 was the workshop in the German-speaking area that was dedicated to the topics Intrusion Detection, Malicious Agents (Malware), and Vulnerability Assessment. The workshop program comprised new theoretical and practical approaches and results from research as well as experience reports on the principal topic Intrusion Detection and on th...

  11. Quantitation by Portable Gas Chromatography: Mass Spectrometry of VOCs Associated with Vapor Intrusion.

    Science.gov (United States)

    Fair, Justin D; Bailey, William F; Felty, Robert A; Gifford, Amy E; Shultes, Benjamin; Volles, Leslie H

    2010-01-01

    Development of a robust reliable technique that permits for the rapid quantitation of volatile organic chemicals is an important first step to remediation associated with vapor intrusion. This paper describes the development of an analytical method that allows for the rapid and precise identification and quantitation of halogenated and nonhalogenated contaminants commonly found within the ppbv level at sites where vapor intrusion is a concern.

  12. Quantitation by Portable Gas Chromatography: Mass Spectrometry of VOCs Associated with Vapor Intrusion

    Directory of Open Access Journals (Sweden)

    Justin D. Fair

    2010-01-01

    Full Text Available Development of a robust reliable technique that permits for the rapid quantitation of volatile organic chemicals is an important first step to remediation associated with vapor intrusion. This paper describes the development of an analytical method that allows for the rapid and precise identification and quantitation of halogenated and nonhalogenated contaminants commonly found within the ppbv level at sites where vapor intrusion is a concern.

  13. Vapor intrusion in urban settings: effect of foundation features and source location

    OpenAIRE

    Yao, Yijun; Pennell, Kelly G.; Suuberg, Eric

    2011-01-01

    In many urban settings, groundwater contains volatile organic compounds, such as tricholoroethene, tetrachloroethene, benzene, etc., at concentrations that are at or slightly below non-potable groundwater standards. Some non-potable groundwater standards do not protect against human health risks that might result from vapor intrusion. Vapor intrusion is a process by which vapor phase contaminants present in the subsurface migrate through the soil and ultimately enter a building through founda...

  14. HYBRID OF FUZZY CLUSTERING NEURAL NETWORK OVER NSL DATASET FOR INTRUSION DETECTION SYSTEM

    OpenAIRE

    2013-01-01

    Intrusion Detection System (IDS) is one of the component that take part in the system defence, to identify abnormal activities happening in the computer system. Nowadays, IDS facing composite demands to defeat modern attack activities from damaging the computer systems. Anomaly-Based IDS examines ongoing traffic, activity, transactions and behavior in order to identify intrusions by detecting anomalies. These technique identifies activities which degenerates from the normal behaviours. In rec...

  15. Unusual ectopic eruption of a permanent central incisor following an intrusion injury to the primary tooth.

    Science.gov (United States)

    Canoglu, Ebru; Akcan, Cenk Ahmet; Baharoglu, Erdinç; Gungor, H Cem; Cehreli, Zafer C

    2008-10-01

    Intrusive luxation of primary teeth carries a high risk of damage to underlying permanent tooth germs. Ectopic eruption of permanent incisors is an unusual outcome of traumatic injury to their predecessors. In this case report, we describe the multidisciplinary management of the consequences of a primary tooth intrusion that led to severe ectopic eruption of the permanent left central incisor in a horizontal position at the level of the labial sulcus.

  16. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    Energy Technology Data Exchange (ETDEWEB)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

  17. Energy Efficient Cluster-Based Intrusion Detection System for Wireless Sensor Networks

    OpenAIRE

    Manal Abdullah; Ebtesam Alsanee; Nada Alseheymi

    2014-01-01

    Wireless sensor networks (WSNs) are network type where sensors are used to collect physical measurements. It has many application areas such as healthcare, weather monitoring and even military applications. Security in this kind of networks is a big concern especially in the applications that required confidentiality and privacy. Therefore, providing a WSN with an intrusion detection system is essential to protect its security from different types of intrusions, cyber-attacks and random fault...

  18. Stateful Intrusion Detection for IEC 60870-5-104 SCADA Security

    OpenAIRE

    Yang, Y.; McLaughlin, K; Sezer, S; Y. B. Yuan; Huang, W.

    2014-01-01

    Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) us...

  19. Geochronology of Ailaoshan-Jinshajiang alkali- rich intrusive rocks and their Sr and Nd isotopic characteristics

    Institute of Scientific and Technical Information of China (English)

    张玉泉; 谢应雯

    1997-01-01

    Twenty-nine isotopic ages, ranging from 41 to 27 Ma, are presented for the alkali-rich intrusive rocks and their coexisting alkaline volcanic rocks, lamprophyres and acidic porphyries, indicating that they are Tertiary in age. The alkali-rich intrusive rocks have 143Nd/144Nd ratios from 0. 512 415 to 0. 512 544, and 87Sr/86Sr ratios from 0.705 4 to 0.706 8, suggesting that their material originates from an enriched mantle source.

  20. Effect of NaCl on Pseudomonas biofilm viscosity by continuous, non-intrusive microfluidic-based approach

    CERN Document Server

    Paquet-Mercier, Francois; Bellavance, Julien; Taghavi, Seyed Mohammad; Greener, Jesse

    2016-01-01

    A method combining video imaging in parallel microchannels with a semi-empirical mathematical model provides non-intrusive, high-throughput measurements of time-varying biofilm viscosity. The approach is demonstrated for early growth Pseudomonas sp. biofilms exposed to constant flow streams of nutrient solutions with different ionic strengths. The ability to measure viscosities at early growth stages, without inducing a shear-thickening response, enabled measurements that are among the lowest reported to date. In addition, good time resolution enabled the detection of a rapid thickening phase, which occurred at different times after the exponential growth phase finished, depending on the ionic strength. The technique opens the way for a combinatorial approach to beter understand the complex dynamical response of biofilm mechanical properties under well-controlled physical, chemical and biological growth conditions and time-limited perturbations.