998 resultados para intrusion dectection system


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This work presents an analysis of a lowermost stratospheric air intrusion event over the coast of Brazil, which may have been responsible for a secondary surface cyclogenesis over the southwestern Atlantic Ocean. The surface cyclone initiated at 0600 UTC 17 April 1999 in a cold air mass in the rear of a cold front after a primary cyclone developed over the same region. The analysis of the secondary cyclone revealed the presence of lowermost stratospheric air intrusion characterized by anomalous potential vorticity (PV), dry air, and high concentration of ozone in atmospheric column. The system developed on the eastern side of an upper level core of PV anomaly, which induced a cyclonic wind circulation at lower levels and favored the onset of the secondary cyclone. In midlevels (500 hPa), the cutoff low development contributed to reduce the propagation speed of the wave pattern. This feature seemed to (1) allow the low-level cold/dry air to heat/moisten associated with sensible and latent fluxes transferred from the ocean to the atmosphere, which intensified a baroclinic zone parallel to the coast, and (2) contribute to the long duration of the system. The present analysis indicates that this secondary cyclone development could be the result of the coupling between the PV anomaly in the upper levels and low-level air-sea interaction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Patino Formation sandstones, which crop out in Aregua neighborhood in Eastern Paraguay and show columnar joints near the contact zone with a nephelinite dyke, have as their main characteristics the high proportion of syntaxial quartz overgrowth and a porosity originated from different processes, initially by dissolution and later by partial filling and fracturing. Features like the presence of floating grains in the syntaxial cement, the transitional interpenetrative contact between the silica-rich cement and grains as well as the intense fracture porosity are strong indications that the cement has been formed by dissolution and reprecipitation of quartz from the framework under the effect of thermal expansion followed by rapid contraction. The increase of the silica-rich cement towards the dyke in association with the orthogonal disposition of the columns relative to dyke walls are indicative that the igneous body may represent the main heat source for the interstitial aqueous solutions previously existing in the sediments. At macroscopic scale, the increasing of internal tensions in the sandstones is responsible for the nucleation of polygons, leading to the individualization of prisms, which are interconnected by a system of joints, formed firstly on isotherm surfaces of low temperature and later on successive adjacent planes towards the dyke heat source.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to tackle the issue of spam botnet detection. We add a new line of defense to the defense-in-depth model called the third line. This line is represented by a security framework, named the Spam Trapping System (STS) and adopts the prevent-then-detect approach to fight against spam botnets. The framework exploits the application sandboxing principle to prevent the spam from going out of the host and detect the corresponding malware bot. We show that the proposed framework can ensure better security against malware bots. In addition, an analytical study demonstrates that the framework offers optimal performance in terms of detection time and computational cost in comparison to intrusion detection systems based on static and dynamic analysis. © 2014 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Malware has become a major threat in the last years due to the ease of spread through the Internet. Malware detection has become difficult with the use of compression, polymorphic methods and techniques to detect and disable security software. Those and other obfuscation techniques pose a problem for detection and classification schemes that analyze malware behavior. In this paper we propose a distributed architecture to improve malware collection using different honeypot technologies to increase the variety of malware collected. We also present a daemon tool developed to grab malware distributed through spam and a pre-classification technique that uses antivirus technology to separate malware in generic classes. © 2009 SPIE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hydrothermal fluids are a fundamental resource for understanding and monitoring volcanic and non-volcanic systems. This thesis is focused on the study of hydrothermal system through numerical modeling with the geothermal simulator TOUGH2. Several simulations are presented, and geophysical and geochemical observables, arising from fluids circulation, are analyzed in detail throughout the thesis. In a volcanic setting, fluids feeding fumaroles and hot spring may play a key role in the hazard evaluation. The evolution of the fluids circulation is caused by a strong interaction between magmatic and hydrothermal systems. A simultaneous analysis of different geophysical and geochemical observables is a sound approach for interpreting monitored data and to infer a consistent conceptual model. Analyzed observables are ground displacement, gravity changes, electrical conductivity, amount, composition and temperature of the emitted gases at surface, and extent of degassing area. Results highlight the different temporal response of the considered observables, as well as the different radial pattern of variation. However, magnitude, temporal response and radial pattern of these signals depend not only on the evolution of fluid circulation, but a main role is played by the considered rock properties. Numerical simulations highlight differences that arise from the assumption of different permeabilities, for both homogeneous and heterogeneous systems. Rock properties affect hydrothermal fluid circulation, controlling both the range of variation and the temporal evolution of the observable signals. Low temperature fumaroles and low discharge rate may be affected by atmospheric conditions. Detailed parametric simulations were performed, aimed to understand the effects of system properties, such as permeability and gas reservoir overpressure, on diffuse degassing when air temperature and barometric pressure changes are applied to the ground surface. Hydrothermal circulation, however, is not only a characteristic of volcanic system. Hot fluids may be involved in several mankind problems, such as studies on geothermal engineering, nuclear waste propagation in porous medium, and Geological Carbon Sequestration (GCS). The current concept for large-scale GCS is the direct injection of supercritical carbon dioxide into deep geological formations which typically contain brine. Upward displacement of such brine from deep reservoirs driven by pressure increases resulting from carbon dioxide injection may occur through abandoned wells, permeable faults or permeable channels. Brine intrusion into aquifers may degrade groundwater resources. Numerical results show that pressure rise drives dense water up to the conduits, and does not necessarily result in continuous flow. Rather, overpressure leads to new hydrostatic equilibrium if fluids are initially density stratified. If warm and salty fluid does not cool passing through the conduit, an oscillatory solution is then possible. Parameter studies delineate steady-state (static) and oscillatory solutions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Because of the potentially irreversible impact of groundwater quality deterioration in the Ferrara coastal aquifer, answers concerning the assessment of the extent of the salinization problem, the understanding of the mechanisms governing salinization processes, and the sustainability of the current water resources management are urgent. In this light, the present thesis aims to achieve the following objectives: Characterization of the lowland coastal aquifer of Ferrara: hydrology, hydrochemistry and evolution of the system The importance of data acquisition techniques in saltwater intrusion monitoring Predicting salinization trends in the lowland coastal aquifer Ammonium occurrence in a salinized lowland coastal aquifer Trace elements mobility in a saline coastal aquifer

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The main objective of this paper is to discuss various aspects of implementing a specific intrusion-detection scheme on a micro-computer system using fixed-point arithmetic. The proposed scheme is suitable for detecting intruder stimuli which are in the form of transient signals. It consists of two stages: an adaptive digital predictor and an adaptive threshold detection algorithm. Experimental results involving data acquired via field experiments are also included.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Sea-water intrusion is actively contaminating fresh groundwater reserves in the coastal aquifers of the Pioneer Valley,north-eastern Australia. A three-dimensional sea-water intrusion model has been developed using the MODHMS code to explore regional-scale processes and to aid assessment of management strategies for the system. A sea-water intrusion potential map, produced through analyses of the hydrochemistry, hydrology and hydrogeology, offsets model limitations by providing an alternative appraisal of susceptibility. Sea-water intrusion in the Pioneer Valley is not in equilibrium, and a potential exists for further landward shifts in the extent of saline groundwater. The model required consideration of tidal over-height (the additional hydraulic head at the coast produced by the action of tides), with over-height values in the range 0.5-0.9 m giving improved water-table predictions. The effect of the initial water-table condition dominated the sensitivity of the model to changes in the coastal hydraulic boundary condition. Several salination processes are probably occurring in the Pioneer Valley, rather than just simple landward sea-water advancement from modern sources of marine salts. The method of vertical discretisation (i.e. model-layer subdivision) was shown to introduce some errors in the prediction of watertable behaviour.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a method for detecting and analyzing the so-called replay attacks in intrusion detection systems, when an intruder contributes a small amount of hostile actions to a recorded session of a legitimate user or process, and replays this session back to the system. The proposed approach can be applied if an automata-based model is used to describe behavior of active entities in a computer system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system. This paper examines the anomaly-based intrusion detection based on sequences of system calls. The point is to construct a model that describes normal or acceptable system activity using the classification trees approach. The created database is utilized as a basis for distinguishing the intrusive activity from the legal one using string metric algorithms. The major results of the implemented simulation experiments are presented and discussed as well.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study concerns the Dublin Gulch intrusion-related gold system, Yukon Territory, Canada. Located 85 km, north northwest of the town of Mayo, YT, the property hosts a 3.3 M oz Au deposit associated with a mid-Cretaceous pluton. A detailed, 8 stage, hydrothermal paragenesis has been constructed for the deposit. At least two discrete fluids are responsible for sulfide mineralization at Dublin Gulch. The latter of the two hydrothermal fluids is responsible for the majority of Au endowment on the property. Geochemical signatures of mineralization support this finding, displaying distinct populations of arsenopyrite compositions and sulfur isotopes for each fluid. Lead isotopes from sulfosalts associated with the second fluid suggest hydrothermal scavenging from country rocks. Geochronology and petrogenetic studies show that a short lived intrusive event c. 93-94 Ma took place at Dublin Gulch and that the main Au mineralising fluid may be linked to a yet unseen intrusion at depth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Today the Ria de Aveiro of northern Portugal has a hydromorphological regime in which river influence is limited to periods of flood. For most of the annual cycle, tidal currents and wind waves are the major forcing agents in this complex coastal lagoon–estuarine system. The system has evolved over two centuries from one that was naturally fluvially dominant to one that is today tidally dominant. Human influence was a trigger for these changes, starting in 1808 when its natural evolution was halted by the construction of a new inlet/outlet channel through the mobile sand spit that isolates it from the Atlantic Ocean. In consequence, tidal ranges in the lagoon increased rapidly from ~0.1 m to >1 m and continued to increase, as a result of continued engineering works and dredging, today reaching ~3 m on spring tides. Hydromorphological adjustments that have taken place include the deepening of channels, an increase in the area of inter-tidal flats, regression of salt marsh, increased tidal propagation and increased saline intrusion. Loss of once abundant submerged aquatic vegetation (SAV), due to increased tidal flows, exacerbated by increased recreational activities, has been accompanied by a change from fine cohesive sediments to coarser, mobile sediments with reduced biological activity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms