• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Network Intrusion Detection: Monitoring, Simulation And Visualization

Zhou, Mian 01 January 2005 (has links)
This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The work in intrusion detection consists of two different network anomaly-based approaches. The work in intrusion simulation introduces a model using explicit traffic gen- eration for the packet level traffic simulation. The process of anomaly detection is to first build profiles for the normal network activity and then mark any events or activities that deviate from the normal profiles as suspicious. Based on the different schemes of creating the normal activity profiles, we introduce two approaches for intrusion detection. The first one is a frequency-based approach which creates a normal frequency profile based on the periodical patterns existed in the time-series formed by the traffic. It aims at those attacks that are conducted by running pre-written scripts, which automate the process of attempting connections to various ports or sending packets with fabricated payloads, etc. The second approach builds the normal profile based on variations of connection-based behavior of each single computer. The deviations resulted from each individual computer are carried out by a weight assignment scheme and further used to build a weighted link graph representing the overall traffic abnormalities. The functionality of this system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. It provides a finer control over the internal network by focusing on connection-based behavior of each single computer. For network intrusion simulation, we explore an alternative method for network traffic simulation using explicit traffic generation. In particular, we build a model to replay the standard DARPA traffic data or the traffic data captured from a real environment. The replayed traffic data is mixed with the attacks, such as DOS and Probe attack, which can create apparent abnormal traffic flow patterns. With the explicit traffic generation, every packet that has ever been sent by the victim and attacker is formed in the simulation model and travels around strictly following the criteria of time and path that extracted from the real scenario. Thus, the model provides a promising aid in the study of intrusion detection techniques.
2

Numerical simulation and effective management of saltwater intrusion in coastal aquifers

Hussain, Mohammed Salih January 2015 (has links)
Seawater intrusion (SWI) is a widespread environmental problem, particularly in arid and semi-arid coastal areas. Unplanned prolonged over-pumping of groundwater is the most important factor in SWI that could result in severe deterioration of groundwater quality. Therefore, appropriate management strategies should be implemented in coastal aquifers to control SWI with acceptable limits of economic and environmental costs. This PhD project presents the development and application of a simulation-optimization (S/O) model to assess different management methods of controlling saltwater intrusion while satisfying water demands, and with acceptable limits of economic and environmental costs, in confined and unconfined coastal aquifers. The first S/O model (FE-GA) is developed by direct linking of an FE simulation model with a multi-objective Genetic Algorithm (GA) to optimize the efficiency of a wide range of SWI management scenarios. However, in this S/O framework, several multiple calls of the simulation model by the population-based optimization model, evaluating best individual candidate solutions resulted in a considerable computational burden. To solve this problem the numerical simulation model is replaced by an Evolutionary Polynomial Regression (EPR)-based surrogate model in the next S/O model (EPR-GA). Through these S/O approaches (FE-GA and EPR-GA) the optimal coordinates and rates of the both abstraction and recharge barriers are determined in the studied management scenarios. As a result, a new combined methodology, so far called ADRTWW, is proposed to control SWI. The ADRTWW model consists of deep Abstraction of saline water near the coast followed by Desalination of the abstracted water to a potable level for public uses and simultaneously Recharging the aquifer using a more economic source of water such as treated wastewater (TWW). In accordance to the available recharge options (injection through well or infiltration from surface pond), the general performance of ADRTWW is evaluated in different hydro-geological settings of the aquifers indicating that it offers the least cost and least salinity in comparison with other scenarios. The great capabilities of both developed S/O models in identification of the best management solutions and the optimal coordinates and rates of the abstraction well and recharge well/pond are discussed. Both FE-GA and EPR-GA can be successfully employed by a robust decision support system. In the next phase of the study, the general impacts of sea level rise (SLR), associated with its transgression nature along the coastline surface on the saltwater intrusion mechanism are investigated in different hypothetical and real case studies of coastal aquifer systems. The results show that the rate and the amount of SWI are considerably greater in aquifers with flat shoreline slopes compared with those with steep slopes. The SWI process is followed by a significant depletion in quantity of freshwater resources at the end of the century. The situation is exacerbated with combined action of SLR and groundwater withdrawals. This finding is also confirmed by 3D simulation of SWI in a regional coastal aquifer (Wadi Ham aquifer) in the UAE subjected to the coupled actions of SLR and pumping.
3

Apport de la stratigraphie séquentielle à la gestion et à la modélisation des ressources en eau des aquifères côtiers

Aunay, Bertrand 01 June 2007 (has links) (PDF)
Lieu de développement économique et démographique intense, les zones littorales font l'objet de pressions importantes sur l'environnement et, en particulier, sur les ressources en eau. Bien que la gestion des eaux souterraines côtières bénéficie de nombreux résultats issus de la recherche scientifique, une des problématiques majeures reste la connaissance de la géométrie des aquifères. Des interprétations géologiques de la genèse du bassin Plio-Quaternaire du Roussillon, issues de la stratigraphie séquentielle, sont confrontées, par l'intermédiaire d'une base données, à l'hydrogéologie de cet hydrosystème complexe localisé sur la partie littorale des Pyrénées-Orientales. L'étude statistique des points de prélèvement (distribution des crépines, productivité des forages...), l'analyse fonctionnelle (traitement du signal des chroniques piézométriques), l'hydrochimie et la géophysique électrique ont été utilisées afin d'élaborer un modèle conceptuel hydrogéologique des écoulements à l'échelle du bassin et de son prolongement vers le domaine offshore. La présence de la mer, de zones à salinité résiduelle et de cours d'eaux littoraux contribue à augmenter la salinité d'un aquifère libre supérieur (Quaternaire) sus-jacent aux différents aquifères captifs (Pliocène) exploités pour l'eau potable dans la zone littorale. La vulnérabilité face aux intrusions salines de cette ressource de bonne qualité, tant sur le point de vue quantitatif que qualitatif est appréhendée par modélisation. Dans le domaine offshore, le rôle protecteur des formations géologiques à faible et moyenne perméabilité est mis en évidence vis-à-vis de la préservation de la qualité de l'eau potable.

Page generated in 0.1674 seconds