97 resultados para MAFIC INTRUSION


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intercalated Archean komatiites and dacites sit above a thick footwall dacite unit in the host rock succession at the Black Swan Nickel Mine, north of Kalgoorlie in the Yilgarn Craton, Western Australia. Both lithofacies occur in units that vary in scale from laterally extensive at the scale of the mine lease to localized, thin, irregular bodies, from > 100 m thick to only centimetres thick. Some dacites are only slightly altered and deformed, and are interpreted to post-date major deformation and alteration (late porphyries). However, the majority of the dacites display evidence of deformation, especially at contacts, and metamorphism, varying from silicification and chlorite alteration at contacts to pervasive low grade regional metamorphic alteration represented by common assemblages of chlorite, sericite and albite. Texturally, the dacites vary from entirely massive and coherent to partially brecciated to totally brecciated. Strangely, some dacites are coherent at the margins and brecciated internally. Breccia textures vary from cryptically defined, to blocky, closely packed, in situ jig-saw fit textures with secondary minerals in fractures between clasts, to more apparent matrix rich textures with round clast forms, giving apparent conglomerate textures. Some clast zones have multi-coloured clasts, giving the impression of varied provenance. Strangely however, all these textural variants have gradational relationships with each other, and no bedding or depositional structures are present. This indicates that all textures have an in situ origin. The komatiites are generally altered and pervasively carbonate veined. Preservation of original textures is patchy and local, but includes coarse adcumulate, mesocumulate, orthocumulate, crescumulate-harrisite and occasionally spinifex textures. Where original contacts between komatiites and dacites are preserved intact (i.e. not sheared or overprinted by alteration), the komatiites have chilled margins, whereas the dacites do not. The margins of the dacites are commonly silicified, and inclusions of dacite occur in komatiite, even at the top contacts of komatiite units, but komatiite clasts do not occur in the dacites. The komatiites therefore were emplaced as sills into the dacites, and the intercalated relationships are interpreted as intrusive. The brecciation and alteration in the dacites are interpreted as being largely due to hydraulic fracturing and alteration induced by contact metamorphic effects and hydrothermal alteration deriving from the intrusion of komatiites into the felsic pile. The absence of autobreccia and hyaloclastite textures in the dacites suggest that they were emplaced as an earlier intrusive (sill?) complex at a high level in the crust.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anomaly detection compensates shortcomings of signature-based detection such as protecting against Zero-Day exploits. However, Anomaly Detection can be resource-intensive and is plagued by a high false-positive rate. In this work, we address these problems by presenting a Cooperative Intrusion Detection approach for the AIS, the Artificial Immune System, as an example for an anomaly detection approach. In particular we show, how the cooperative approach reduces the false-positive rate of the detection and how the overall detection process can be organized to account for the resource constraints of the participating devices. Evaluations are carried out with the novel network simulation environment NeSSi as well as formally with an extension to the epidemic spread model SIR

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cenozoic extension in western Mexico has been divided into two episodes separated by the change from convergence to oblique divergence at the plate boundary. The Gulf Extensional Province is thought to have started once subduction ended at ~12.5 Ma whereas early extension is classified as Basin and Range. Mid-Miocene volcanism of the Comondú group has been considered as a subduction-related arc, whereas post ~12.5 Ma volcanism would be extension-related. Our new integration of the continental onshore and offshore geology of the south-east Gulf region, backed by tens of Ar-Ar and U-Pb ages and geochemical studies, document an early-mid Miocene rifting and extension-related bimodal to andesitic magmatism prior to subduction termination. Between ~21 and 11 Ma a system of NNW-SSE high-angle extensional faults rifted the western side of the Sierra Madre Occidental (SMO) ignimbrite plateau. In Nayarit, rhyolitic domes and some basalts were emplaced along this extensional belt at 18-17 Ma. These rocks show strong antecrystic inheritance but an absence of Mesozoic and older xenocrysts, suggesting a genesis in the mid-upper crust triggered by extension-induced basaltic influx. In Sinaloa, large grabens were floored by huge dome complexes at ~21-17 Ma and filled by continental sediments with interlayered basalts dated at 15 Ma. Mid-Miocene volcanism, including the largely volcaniclastic Comondú strata in Baja California, was thus emplaced in rift basins and appears associated to decompression melting rather than subduction. Along the coast, flat-lying basaltic lava flows dated at 11-10 Ma are exposed just above the present sea level. Here crustal thickness is 25-20 Km, almost half that in the core of the SMO, implying significant lithosphere stretching before ~11 Ma. This mafic pulse, with relatively high Ti but still clear Nb-Ta negative spikes, may be related to the detachment of the lower part of the subducted slab, allowing asthenosphere to flow into parts of the mantle previously fluxed by subduction fluids. Very uniform OIB-like lavas appear in late Pliocene and Pleistocene, only 18 m.y. after the onset of rifting and ~9 m.y. after the end of subduction. Our study shows that rifting began much earlier than Late Miocene and progressively overwhelmed subduction in generating magmatism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Early–mid Cretaceous marks the confluence of three major continental-scale events in eastern Gondwana: (1) the emplacement of a Silicic Large Igneous Province (LIP) near the continental margin; (2) the volcaniclastic fill, transgression and regression of a major epicontinental seaway developed over at least a quarter of the Australian continent; and (3) epeirogenic uplift, exhumation and continental rupturing culminating in the opening of the Tasman Basin c. 84 Ma. The Whitsunday Silicic LIP event had widespread impact, producing both substantial extrusive volumes of dominantly silicic pyroclastic material and coeval first-cycle volcanogenic sediment that accumulated within many eastern Australian sedimentary basins, and principally in the Great Australian Basin system (>2 Mkm3 combined volume). The final pulse of volcanism and volcanogenic sedimentation at c. 105–95 Ma coincided with epicontinental seaway regression, which shows a lack of correspondence with the global sea-level curve, and alternatively records a wider, continental-scale effect of volcanism and rift tectonism. Widespread igneous underplating related to this LIP event is evident from high paleogeothermal gradients and regional hydrothermal fluid flow detectable in the shallow crust and over a broad region. Enhanced CO2 fluxing through sedimentary basins also records indirectly, large-scale, LIP-related mafic underplating. A discrete episode of rapid crustal cooling and exhumation began c. 100–90 Ma along the length of the eastern Australian margin, related to an enhanced phase of continental rifting that was largely amagmatic, and probably a switch from wide–more narrow rift modes. Along-margin variations in detachment fault architecture produced narrow (SE Australia) and wide continental margins with marginal, submerged continental plateaux (NE Australia). Long-lived NE-trending cross-orogen lineaments controlled the switch from narrow to wide continental margin geometries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Confusion exists as to the age of the Abor Volcanics of NE India. Some consider the unit to have been emplaced in the Early Permian, others the Early Eocene, a difference of ∼230 million years. The divergence in opinion is significant because fundamentally different models explaining the geotectonic evolution of India depend on the age designation of the unit. Paleomagnetic data reported here from several exposures in the type locality of the formation in the lower Siang Valley indicate that steep dipping primary magnetizations (mean = 72.7 ± 6.2°, equating to a paleo-latitude of 58.1°) are recorded in the formation. These are only consistent with the unit being of Permian age, possibly Artinskian based on a magnetostratigraphic argument. Plate tectonic models for this time consistently show the NE corner of the sub-continent >50°S; in the Early Eocene it was just north of the equator, which would have resulted in the unit recording shallow directions. The mean declination is counter-clockwise rotated by ∼94°, around half of which can be related to the motion of the Indian block; the remainder is likely due local Himalayan-age thrusting in the Eastern Syntaxis. Several workers have correlated the Abor Volcanics with broadly coeval mafic volcanic suites in Oman, NE Pakistan–NW India and southern Tibet–Nepal, which developed in response to the Cimmerian block peeling-off eastern Gondwana in the Early-Middle Permian, but we believe there are problems with this model. Instead, we suggest that the Abor basalts relate to India–Antarctica/India–Australia extension that was happening at about the same time. Such an explanation best accommodates the relevant stratigraphical and structural data (present-day position within the Himalayan thrust stack), as well as the plate tectonic model for Permian eastern Gondwana.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although Basin and Range–style extension affected large areas of western Mexico after the Late Eocene, most consider that extension in the Gulf of California region began as subduction waned and ended ca. 14–12.5 Ma. A general consensus also exists in considering Early and Middle Miocene volcanism of the Sierra Madre Occidental and Comondú Group as subduction related, whereas volcanism after ca. 12.5 Ma is extension related. Here we present a new regional geologic study of the eastern Gulf of California margin in the states of Nayarit and Sinaloa, Mexico, backed by 43 new Ar-Ar and U-Pb mineral ages, and geochemical data that document an earlier widespread phase of extension. This extension across the southern and central Gulf Extensional Province began between Late Oligocene and Early Miocene time, but was focused in the region of the future Gulf of California in the Middle Miocene. Late Oligocene to Early Miocene rocks across northern Nayarit and southern Sinaloa were affected by major approximately north-south– to north-northwest– striking normal faults prior to ca. 21 Ma. Between ca. 21 and 11 Ma, a system of north-northwest–south-southeast high angle extensional faults continued extending the southwestern side of the Sierra Madre Occidental. Rhyolitic domes, shallow intrusive bodies, and lesser basalts were emplaced along this extensional belt at 20–17 Ma. Rhyolitic rocks, in particular the domes and lavas, often show strong antecrystic inheritance but only a few Mesozoic or older xenocrysts, suggesting silicic magma generation in the mid-upper crust triggered by an extension induced basaltic infl ux. In northern Sinaloa, large grabens were occupied by huge volcanic dome complexes ca. 21–17 Ma and filled by continental sediments with interlayered basalts dated as 15–14 Ma, a stratigraphy and timing very similar to those found in central Sonora (northeastern Gulf of California margin). Early to Middle Miocene volcanism occurred thus in rift basins, and was likely associated with decompression melting of upper mantle (inducing crustal partial melting) rather than with fluxing by fluids from the young and slow subducting microplates. Along the eastern side of the Gulf of California coast, from Farallón de San Ignacio island offshore Los Mochis, Sinaloa, to San Blas, Nayarit, a strike distance of >700 km, flat lying basaltic lavas dated as ca. 11.5–10 Ma are exposed just above the present sea level. Here crustal thickness is almost half that in the unextended core of the adjacent Sierra Madre Occidental, implying signifi cant lithosphere stretching before ca. 11 Ma. This mafic pulse, with subdued Nb-Ta negative spikes, may be related to the detachment of the lower part of the subducted slab, allowing an upward asthenospheric flow into an upper mantle previously modified by fluid fluxes related to past subduction. Widespread eruption of very uniform oceanic island basalt–like lavas occurred by the late Pliocene and Pleistocene, only 20 m.y. after the onset of rifting and ~9 m.y. after the end of subduction, implying that preexisting subduction-modified mantle had now become isolated from melt source regions. Our study shows that rifting across the southern-central Gulf Extensional Province began much earlier than the Late Miocene and provided a fundamental control on the style and composition of volcanism from at least 30 Ma. We envision a sustained period of lithospheric stretching and magmatism during which the pace and breadth of extension changed ca. 20–18 Ma to be narrower, and again after ca. 12.5 Ma, when the kinematics of rifting became more oblique.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project was a step forward in developing intrusion detection systems in distributed environments such as web services. It investigates a new approach of detection based on so-called "taint-marking" techniques and introduces a theoretical framework along with its implementation in the Linux kernel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Little is known about the subjective experience of alcohol desire and craving in young people. Descriptions of alcohol urges continue to be extensively used in the everyday lexicon of young, non-dependent drinkers. Elaborated Intrusion (EI) Theory contends that imagery is central to craving and desires, and predicts that alcohol-related imagery will be associated with greater frequency and amount of drinking. This study involved 1,535 age stratified 18–25 year olds who completed an alcohol–related survey that included the Imagery scale of the Alcohol Craving Experience (ACE) questionnaire. Imagery items predicted 12-16% of the variance in concurrent alcohol consumption. Higher total Imagery subscale scores were linearly associated with greater drinking frequency and lower self-efficacy for moderate drinking. Interference with alcohol imagery may have promise as a preventive or early intervention target in young people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Valley Mountain 15’ quadrangle straddles the Pinto Mountain Fault, which bounds the eastern Transverse Ranges in the south against the Mojave Desert province in the north. The Pinto Mountains, part of the eastern Transverse Ranges in the south part of the quadrangle expose a series of Paleoproterozoic gneisses and granite and the Proterozoic quartzite of Pinto Mountain. Early Triassic quartz monzonite intruded the gneisses and was ductiley deformed prior to voluminous Jurassic intrusion of diorite, granodiorite, quartz monzonite, and granite plutons. The Jurassic rocks include part of the Bullion Mountains Intrusive Suite, which crops out prominently at Valley Mountain and in the Bullion Mountains, as well as in the Pinto Mountains. Jurassic plutons in the southwest part of the quadrangle are deeply denuded from midcrustal emplacement levels in contrast to supracrustal Jurassic limestone and volcanic rocks exposed in the northeast. Dikes inferred to be part of the Jurassic Independence Dike Swarm intrude the Jurassic plutons and Proterozoic rocks. Late Cretaceous intrusion of the Cadiz Valley Batholith in the northeast caused contact metamorphism of adjacent Jurassic plutonic rocks...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thick piles of late-Archean volcaniclastic sedimentary successions that overlie the voluminous greenstone units of the eastern Yilgarn Craton, Western Australia, record the important transition from the cessation in mafic-ultramafic volcanism to cratonisation between about 2690 and 2655 Ma. Unfortunately, an inability to clearly subdivide the superficially similar sedimentary successions and correlate them between the various geological terranes and domains of the eastern Yilgarn Craton has led to uncertainty about the timing and nature of the region's palaeogeographic and palaeotectonic evolution. Here, we present the results of some 2025 U–Pb laser-ablation-ICP-MS analyses and 323 Sensitive High-Resolution Ion Microprobe (SHRIMP) analyses of detrital zircons from 14 late-Archean felsic clastic successions of the eastern Yilgarn Craton, which have enabled correlation of clastic successions. The results of our data, together with those compiled from previous studies, show that the post-greenstone sedimentary successions include two major cycles that both commenced with voluminous pyroclastic volcanism and ended with widespread exhumation and erosion associated with granite emplacement. Cycle One commences with an influx of rapidly reworked feldspar-rich pyroclastic debris. These units, here-named the Early Black Flag Group, are dominated by a single population of detrital zircons with an average age of 2690–2680 Ma. Thick (up to 2 km) dolerite bodies, such as the Golden Mile Dolerite, intrude the upper parts of the Early Black Flag Group at about 2680 Ma. Incipient development of large granite domes during Cycle One created extensional basins predominantly near their southeastern and northwestern margins (e.g., St Ives, Wallaby, Kanowna Belle and Agnew), into which the Early Black Flag Group and overlying coarse mafic conglomerate facies of the Late Black Flag Group were deposited. The clast compositions and detrital-zircon ages of the late Black Flag Group detritus match closely the nearby and/or stratigraphically underlying successions, thus suggesting relatively local provenance. Cycle Two involved a similar progression to that observed in Cycle One, but the age and composition of the detritus were notably different. Deposition of rapidly reworked quartz-rich pyroclastic deposits dominated by a single detrital-zircon age population of 2670–2660 Ma heralded the beginning of Cycle Two. These coarse-grained quartz-rich units, are name here the Early Merougil Group. The mean ages of the detrital zircons from the Early Merougil Group match closely the age of the peak in high-Ca (quartz-rich) granite magmatism in the Yilgarn Craton and thus probably represent the surface expression of the same event. Successions of the Late Merougil Group are dominated by coarse felsic conglomerate with abundant volcanic quartz. Although the detrital zircons in these successions have a broad spread of age, the principal sub-populations have ages of about 2665 Ma and thus match closely those of the Early Merougil Group. These successions occur most commonly at the northwestern and southeastern margins of the granite batholiths and thus are interpreted to represent resedimented units dominted by the stratigraphically underlying packages of the Early Merougil Group. The Kurrawang Group is the youngest sedimentary units identified in this study and is dominated by polymictic conglomerate with clasts of banded iron formation (BIF), granite and quartzite near the base and quartz-rich sandstone units containing detrital zircons aged up to 3500 Ma near the top. These units record provenance from deeper and/or more-distal sources. We suggest here that the principal driver for the major episodes of volcanism, sedimentation and deformation associated with basin development was the progressive emplacement of large granite batholiths. This interpretation has important implication for palaeogeographic and palaeotectonic evolution of all late-Archean terranes around the world.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elaborated Intrusion (EI) Theory proposes that cravings occur when involuntary thoughts about food are elaborated; a key part of elaboration is affectively-charged imagery. Craving can be weakened by working memory tasks that block imagery. EI Theory predicts that cravings should also be reduced by preventing involuntary thoughts being elaborated in the first place. Research has found that imagery techniques such as body scanning and guided imagery can reduce the occurrence of food thoughts. This study tested the prediction that these techniques also reduce craving. We asked participants to abstain from food overnight, and then to carry out 10 min of body scanning, guided imagery, or a control mind wandering task. They rated their craving at 10 points during the task on a single item measure, and before and after the task using the Craving Experience Questionnaire. While craving rose during the task for the mind wandering group, neither the guided imagery nor body scanning group showed an increase. These effects were not detected by the CEQ, suggesting that they are only present during the competing task. As they require no devices or materials and are unobtrusive, brief guided imagery strategies might form useful components of weight loss programmes that attempt to address cravings.