1000 resultados para Fujian Sheng


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numerous Permian limestone blocks exposed along the Yarlung-Zangbo Suture Zone have been named Tibetan facies exotic limestone blocks or Chitichun-type Permian deposits.The Gyanyima limestone block,one of those limestone blocks,is located in Burang County,southwestern Tibet.Fusulines are abundant in the Gyanyima limestone block especially for Middle Permian Xilanta Formation.The fusuline fauna comprises 10 genera,respectively Neoschwagerina, Yangchienia, Armenina, Verbeekina, Paraverbeekina, Kahlerina, Lantschichites, Codonofusiella,Chusenella, Nankinella.This fauna indicates a Midian age(Late Guadalupian or Lengwuan age of South China) in terms of the coexistence of Kahlerina, Lantschichites, Codonofusiella and Neoschwagerina.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Eastern Taerma bridge-Zhakang was found in recent years to be the second spot of Ordovician outcrop based on reliable fossils. The nautiloids described here include one new genus, two new species and one indeterminate species,which represent only a small fraction of the nautiloids collected from this area. They are new materials of Ordovician nautiloids that have been determined up to now, which enrich Ordovician nautiloid faunal assemblages as well as provide new data to both classification and correlation of the Ordovician for this area and geographical distribution of nautiloid fauna.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present some practical experiences on implementing an alert fusion mechanism from our project. After investigation on most of the existing alert fusion systems, we found the current body of work alternatively weighed down in the mire of insecure design or rarely deployed because of their complexity. As confirmed by our experimental analysis, unsuitable mechanisms could easily be submerged by an abundance of useless alerts. Even with the use of methods that achieve a high fusion rate and low false positives, attack is also possible. To find the solution, we carried out analysis on a series of alerts generated by well-known datasets as well as realistic alerts from the Australian Honey-Pot. One important finding is that one alert has more than an 85% chance of being fused in the following five alerts. Of particular importance is our design of a novel lightweight Cache-based Alert Fusion Scheme, called CAFS. CAFS has the capacity to not only reduce the quantity of useless alerts generated by intrusion detection system, but also enhance the accuracy of alerts, therefore greatly reducing the cost of fusion processing. We also present reasonable and practical specifications for the target-oriented fusion policy that provides a quality guarantee on alert fusion, and as a result seamlessly satisfies the process of successive correlation. Our experiments compared CAFS with traditional centralized fusion. The results showed that the CAFS easily attained the desired level of simple, counter-escapable alert fusion design. Furthermore, as a lightweight scheme, CAFS can easily be deployed and excel in a large amount of alert fusions, which go towards improving the usability of system resources. To the best of our knowledge, our work is a practical exploration in addressing problems from the academic point of view. Copyright © 2011 John Wiley & Sons, Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms' spreading. This paper presents a microcosmic analysis of worm propagation procedures. Our proposed model is different from traditional methods and examines deep inside the propagation procedure among nodes in the network by concentrating on the propagation probability and time delay described by a complex matrix. Moreover, since the analysis gives a microcosmic insight into a worm's propagation, the proposed model can avoid errors that are usually concealed in the traditional macroscopic analytical models. The objectives of this paper are to address three practical aspects of preventing worm propagation: (i) where do we patch? (ii) how many nodes do we need to patch? (iii) when do we patch? We implement a series of experiments to evaluate the effects of each major component in our microcosmic model. Based on the results drawn from the experiments, for high-risk vulnerabilities, it is critical that networks reduce the number of vulnerable nodes to below 80%. We believe our microcosmic model can benefit the security industry by allowing them to save significant money in the deployment of their security patching schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are the two common means for propagating worms: scanning vulnerable computers in the network and sending out malicious email attachments. Modeling the propagation of worms can help us understand how worms spread and devise effective defence strategies. Most traditional models simulate the overall scale of infected network in each time tick, making them invalid for examining deep inside the propagation procedure among individual nodes. For this reason, this paper proposes a novel probability matrix to model the propagation mechanism of the two main classes of worms (scanning and email worms) by concentrating on the propagation probability. The objective of this paper is to access the spreading and work out an effective scheme against the worms. In order to evaluate the effects of each major component in our probability model, we implement a series of experiments for both worms. From the results, the network administrators can make decision on how to reduce the number of vulnerable nodes to a certain threshold for scanning worms, and how to immunize the highly-connected node for preventing worm's propagation for email worms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Active Peer-to-Peer worms are great threat to the network security since they can propagate in automated ways and flood the Internet within a very short duration. Modeling a propagation process can help us to devise effective strategies against a worm's spread. This paper presents a study on modeling a worm's propagation probability in a P2P overlay network and proposes an optimized patch strategy for defenders. Firstly, we present a probability matrix model to construct the propagation of P2P worms. Our model involves three indispensible aspects for propagation: infected state, vulnerability distribution and patch strategy. Based on a fully connected graph, our comprehensive model is highly suited for real world cases like Code Red II. Finally, by inspecting the propagation procedure, we propose four basic tactics for defense of P2P botnets. The rationale is exposed by our simulated experiments and the results show these tactics are of effective and have considerable worth in being applied in real-world networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A common view for the preferable positions of thwarting worm propagation is at the highly connected nodes. However, in certain conditions, such as when some popular users (highly connected nodes in the network) have more vigilance on the malicious codes, this may not always be the truth. In this letter, we propose a measure of betweenness and closeness to locate the most suitable positions for slowing down the worm propagation. This work provides practical values to the defense of topological worms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Structural behaviour of cyclo-octane under high pressure is studied by using a synchrotron x-ray source in a diamond anvil cell (DAC) up to 40.2 GPa at room temperature. The cyclo-octane firstly solidifies to the triclinic phase at 0.87GPa. With the increasing pressure, the phase of cyclo-octane changes to the tetragonal phase at about 6.0 GPa and then transforms to amorphous phase above 18.2 GPa, which is kept till to 40.2 GPa. All the phase transitions of cyclo-octane are irreversible.