• Title/Summary/Keyword: intrusion complex

Search Result 66, Processing Time 0.024 seconds

Formation Process and Its Mechanism of the Sancheong Anorthosite Complex, Korea (산청 회장암복합체의 형성과정과 그 메커니즘)

  • Kang, Ji-Hoon;Lee, Deok-Seon
    • Economic and Environmental Geology
    • /
    • v.48 no.6
    • /
    • pp.431-449
    • /
    • 2015
  • The study area is located in the western part of the Precambrian stock type of Sancheong anorthosite complex, the Jirisan province of the Yeongnam massif, in the southern part of the Korean Peninsula. We perform a detailed field geological investigation on the Sancheong anorthosite complex, and report the characteristics of lithofacies, occurrences, foliations, and research formation process and its mechanism of the Sancheong anorthosite complex. The Sancheong anorthosite complex is classified into massive and foliation types of Sancheong anorthosite (SA), Fe-Ti ore body (FTO), and mafic granulite (MG). Foliations are developed in the Sancheong anorthosite complex except the massif type of SA. The foliation type of SA, FTO, MG foliations are magmatic foliations which were formed in a not fully congealed state of SA from a result of the flow of FTO and MG melts and the kinematic interaction of SA blocks, and were continuously produced in the comagmatic differentiation. The Sancheong anorthosite complex is formed as the following sequence: the massive type of SA (a primary fractional crystallization of parental magmas under high pressure)${\rightarrow}$ the foliation type of SA [a secondary fractional crystallization of the plagioclase-rich crystal mushes (anorthositic magmas) primarily differentiated from parental magmas under low pressure]${\rightarrow}$the FTO (an injection by filter pressing of the residual mafic magmas in the last differentiation stage of anorthositic magmas into the not fully congealed SA)${\rightarrow}$the MG (a solidification of the finally residual mafic magmas). It indicates that the massive and foliation types of SA, the FTO, and the MG were not formed from the intrusion and differentiation of magmas which were different from each other in genesis and age but from the multiple fractionation and polybaric crystallization of the coeval and cogenetic magma.

Geological structure and groundwater resources of Cheju and Oahu Island (제주도와 OAHU도의 지질구조 및 수자원의 특성)

  • 최순학
    • The Journal of Engineering Geology
    • /
    • v.2 no.1
    • /
    • pp.70-91
    • /
    • 1992
  • Cheju and Oahu island are similar in geology, characterized by same types of volcanic activities during the late Tertiary to the early Quaternary. The occurrence of groundwater in both islands depend on two basic elements, permeability of volcanic rocks and precipitation. However, groundwater occurrence in Oahu is much more controlled by dike complex in the regional volcanic rocks. There are two different types of groundwater in both islands. One is perched groundwater standing at any high altitude, and the other is basal groundwater developed near the coastal area. The groundwater quality of Cheju island is good in general for drinking. But many wells near the eastern coastal area are salt intruded due to over pumping activities and the area of salt water intrusion has increased landward from the year of 1970. This feature of salt water contamination is similar at Pearl Harbour in Oahu island. In order to prevent this salt water contamination into fresh groundwater reservoir on Cheju island, it is urgently asked to make groundwater flow study along the coastal area on terms of groundwater potentials and their maximum ultimate exploration.

  • PDF

Implementation of Analyzer of the Alert Data using Data Mining (데이타마이닝 기법을 이용한 경보데이타 분석기 구현)

  • 신문선;김은희;문호성;류근호;김기영
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • As network systems are developed rapidly and network architectures are more complex than before, it needs to use PBNM(Policy-Based Network Management) in network system. Generally, architecture of the PBNM consists of two hierarchical layers: management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. And the security policy server should be able to analyze and manage the alert messages received from Policy enforcement system in the enforcement layer for the available information. In this paper, we propose an alert analyzer using data mining. First, in the framework of the policy-based network security management, we design and implement an alert analyzes that analyzes alert data stored in DBMS. The alert analyzer is a helpful system to manage the fault users or hosts. Second, we implement a data mining system for analyzing alert data. The implemented mining system can support alert analyzer and the high level analyzer efficiently for the security policy management. Finally, the proposed system is evaluated with performance parameter, and is able to find out new alert sequences and similar alert patterns.

Design of Memory-Efficient Deterministic Finite Automata by Merging States With The Same Input Character (동일한 입력 문자를 가지는 상태의 병합을 통한 메모리 효율적인 결정적 유한 오토마타 구현)

  • Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.395-404
    • /
    • 2013
  • A pattern matching algorithm plays an important role in traffic identification and classification based on predefined patterns for intrusion detection and prevention. As attacks become prevalent and complex, current patterns are written using regular expressions, called regexes, which are expressed into the deterministic finite automata(DFA) due to the guaranteed worst-case performance in pattern matching process. Currently, because of the increased complexity of regex patterns and their large number, memory-efficient DFA from states reduction have become the mainstay of pattern matching process. However, most of the previous works have focused on reducing only the number of states on a single automaton, and thus there still exists a state blowup problem under the large number of patterns. To solve the above problem, we propose a new state compression algorithm that merges states on multiple automata. We show that by merging states with the same input character on multiple automata, the proposed algorithm can lead to a significant reduction of the number of states in the original DFA by as much as 40.0% on average.

Recycling of Suspended Particulates by Atmospheric Boundary Depth and Coastal Circulation

  • Choi, Hyo
    • Proceedings of the Korean Environmental Sciences Society Conference
    • /
    • 2003.11a
    • /
    • pp.19-26
    • /
    • 2003
  • The dispersion of recycled particulates in the complex coastal terrain containing Kangnung city, Korea was investigated using a three-dimensional non-hydrostatic numerical model and lagrangian particle model (or random walk model). The results show that particulates at the surface of the city that float to the top of thermal internal boundary layer (TIBL) are then transported along the eastern slope of the mountains with the passage of sea breeze and nearly reach the top of the mountains. Those particulates then disperse eastward at this upper level over the coastal sea and finally spread out over the open sea. Total suspended particulate (TSP) concentration near the surface of Kangnung city is very low. At night, synoptic scale westerly winds intensify due to the combined effect of the synoptic scale wind and land breeze descending the eastern slope of the mountains toward the coast and further seaward. This increase in speed causes development of internal gravity waves and a hydraulic jump up to a height of about 1km above the surface over the city. Particulate matter near the top of the mountains also descends the eastern slope of the mountains during the day, reaching the central city area and merges near the surface inside the nocturnal surface inversion layer (NSIL) with a maximum ground level concentration of TSP occurring at 0300 LST. Some particulates were dispersed following the propagation area of internal gravity waves and others in the NSIL are transported eastward to the coastal sea surface, aided by the land breeze. The following morning, particulates dispersed over the coastal sea from the previous night, tend to return to the coastal city of Kangnung with the sea breeze, developing a recycling process and combine with emitted surface particulates during the morning. These processes result in much higher TSP concentration. In the late morning, those particulates float to the top of the TIBL by the intrusion of the sea breeze and the ground level TSP concentration in the city subsequently decreases.

  • PDF

SDN-Based Middlebox Management Framework in Integrated Wired and Wireless Networks (유무선 통합망에서의 SDN 기반 미들박스 관리 프레임워크)

  • Lee, Giwon;Jang, Insun;Kim, Wontae;Joo, Sukjin;Kim, Myungsoo;Pack, Sangheon;Kang, Chul-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.379-386
    • /
    • 2014
  • Recently, middleboxes play a key role in many network settings such as firewalls, VPN gateways, proxies, intrusion detection and prevention systems, and WAN optimizers. However, achieving the performance and security benefits that middleboxes offer is highly complex, and therefore it is essential to manage middleboxes efficiently and dynamically. In this respect, Software-Defined Networking (SDN) offers a promising solution for middlebox policy enforcement by using logically centralized management, decoupling the data and control planes, and providing the ability to programmatically configure forwarding rules. Also, cloud computing and distributed Network Function Virtualization (NFV) can enable to manage middleboxes more easily. We introduce SDN-based middlebox management framework in integrated wired and wireless networks and discuss the further issues.

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

THREE-DIMENSIONAL FINITE ELEMENT ANALYSIS ON RECIPROCAL ACTION BY TORQUE APPLICATION IN MAXILLARY ARCHWIRE (상악호선에 torque 부여시 나타나는 상반작용에 관한 유한요소법적 연구)

  • Hwang, Chee-Il;Suhr, Cheong-Hoon
    • The korean journal of orthodontics
    • /
    • v.24 no.2
    • /
    • pp.479-508
    • /
    • 1994
  • This study was designed to investigate the reciprocal movement which was derived form application of active torque in ideal archwire by computer-aided three-dimensional finite element analysis of maxillary teeth and surrounding periodontal ligament composed of 2617 elements and 3725 nodes. Ideal archwire model was also made using the beam elements and the contact between the wire and the bracket slot was made using the gap element. In this study non-linear elastic behaviors of contact between the wire and the bracket slot were considered on. We put the active torque between the lateral and cenral incisor and between the second premolar and the first molar with/without cinch-back. The results were expressed by quantitative and visible ways. The findings of this study were as follows: 1. Reciprocal actions to active torque were complex system consisting of a combination of counter-torque, bucco-lingual linear displacement and tipping, rotation of the teeth, occluso-gingival linear displacement. 2. When active anterior crown labial torque was applied, crown labial tippings of the lateral were the greatest, and those of the central incisor was the next, Crown lingual tippings of the canine and the first premolar, mesial rotations and extrusion of the lateral and distal rotations and intrusion of the canine occurred. When anterior torque with the cinch-back was applied, amount of crown labial tippings of the lateral and central incisor were reduced. Amount of crown lingual tipping of the canine and the first premolar were increased. Mesial tippings and mesial rotations of the second molar occurred. 3. When active posterior crown lingual torque was applied, crown lingual tippings of the first moalr were the greatest, and crown labial tippings of the second premolar and the first premolar were the next, the crown lingual tipping of the second molar were a little. Mesial rotations of the second premolar occurred but those of the first premolar didn't occurred.

  • PDF

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.

Real-Time Visualization of Web Usage Patterns and Anomalous Sessions (실시간 웹 사용 현황과 이상 행위에 대한 시각화)

  • 이병희;조상현;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.97-110
    • /
    • 2004
  • As modem web services become enormously complex, web attacks has become frequent and serious. Existing security solutions such as firewalls or signature-based intrusion detection systems are generally inadequate in securing web services, and analysis of raw web log data is simply impractical for most organizations. Visual display of "interpreted" web logs, with emphasis on anomalous web requests, is essential for an organization to efficiently track web usage patterns and detect possible web attacks. In this paper, we discuss various issues related to effective real-time visualization of web usage patterns and anomalies. We implemented a software tool named SAD (session anomaly detection) Viewer to satisfy such need and conducted an empirical study in which anomalous web traffics such as Misuse attacks, DoS attacks, Code-Red worms and Whisker scans were injected. Our study confirms that SAD Viewer is useful in assisting web security engineers to monitor web usage patterns in general and anomalous web sessions in particular.articular.