Search results for: metamorphic malware
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 94

Search results for: metamorphic malware

64 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 213
63 Participation of Titanium Influencing the Petrological Assemblage of Mafic Dyke: Salem, South India

Authors: Ayoti Banerjee, Meenakshi Banerjee

Abstract:

The study of metamorphic reaction textures is important in contributing to our understanding of the evolution of metamorphic terranes. Where preserved, they provide information on changes in the P-T conditions during the metamorphic history of the rock, and thus allow us to speculate on the P-T-t evolution of the terrane. Mafic dykes have attracted the attention of petrologists because they act as window to mantle. This rock represents a mafic dyke of doleritic composition. It is fine to medium grained in which clinopyroxene are enclosed by the lath shaped plagioclase grains to form spectacular ophitic texture. At places, sub ophitic texture was also observed. Grains of pyroxene and plagioclase show very less deformation typically plagioclase showing deformed lamella along with plagioclase-clinopyroxene-phyric granoblastic fabric within a groundmass of feldspar microphenocrysts and Fe–Ti oxides. Both normal and reverse zoning were noted in the plagioclase laths. The clinopyroxene grains contain exsolved phases such as orthopyroxene, plagioclase, magnetite, ilmenite along the cleavage traces and the orthopyroxene lamella form granules in the periphery of the clinopyroxene grains. Garnet corona also develops preferentially around plagioclase at the contact of clinopyroxene, ilmenite or magnetite. Tiny quartz and K-fs grains showed symplectic intergrowth with garnet at a few places. The product quartz formed along with garnet rims the coronal garnet and the reacting clinopyroxene. Thin amphibole corona formed along the periphery of deformed plagioclase and clinopyroxene occur as patches over the magmatic minerals. The amphibole coronas cannot be assigned to a late magmatic stage and are interpreted as reactive being restricted to the contact between clinopyroxene and plagioclase, thus postdating the crystallization of both. The amphibole and garnet do not share grain boundary in the entire rock and is thus pointing towards simultaneous crystallization. Olivine is absent. Spectacular myrmekitic growth of orthoclase and quartz rimming the plagioclase is consistent with the potash metasomatic effects that is also found in other rocks of this region. These textural features are consistent with a phase of fluid induced metamorphism (retrogression). But the appearance of coronal garnet and amphibole exclusive of each other reflects the participation if Ti as the prime reason. Presence of Ti as a reactant phase is a must for amphibole forming reactions whereas it is not so in case of garnet forming reactions although the reactants are the same plagioclase and clinopyroxene in both cases. These findings are well validated by petrographical and textural analysis. In order to obtain balanced chemical reactions that explain formation of amphibole and garnet in the mafic dyke rocks a matrix operation technique called Singular Value Decomposition (SVD) was adopted utilizing the measured chemical compositions of the minerals. The computer program C-Space was used for this purpose and the required compositional matrix. Data fed to C-Space was after doing cation-calculation of the oxide percentages obtained from EPMA analysis. The Garnet-Clinopyroxene geothermometer yielded a temperature of 650 degrees Celsius. The Garnet-Clinopyroxene-Plagioclase geobarometer and Al-in amphibole yielded roughly 7.5 kbar pressure.

Keywords: corona, dolerite, geothermometer, metasomatism, metamorphic reaction texture, retrogression

Procedia PDF Downloads 248
62 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 95
61 Tectonostratigraphic, Paleogeography and Amalgamation of Sumatra Terranes, Indonesia

Authors: Syahrir Andi Mangga, Ipranta

Abstract:

The geological, paleomagnetic, geochemical and geophysical Investigation in The Sumatra Region has yielded some new data, has stimulated a reassessment of stratigraphy, structure, tectonic evolution and which can show a Sumatra geodynamic model. Sumatra island has in the margin of southwest part of the Eurasia plate in the Sundaland cratonic block and occurred as the amalgamation of allochtonous microplates, continental fragments, Island arc and accrctionary by foreland complex which assembled prior to Tertiary. The allochtonous rocks (terranes), can be divided into 4 (four) Terranes with Paleozoic to Mesosoic in age, had different origin, lithology and are separated by a Suture as main fault with trending NW-SE. The terranes are: the Tigapuluh-Bohorok (East Sumatra block / Sibumasu block), Permo-Carboniferous in age and is characterized by the rock types formed in glacio-marine and was intruded by Late Triassic to Early Jurrasic granitics, occupied in the Eastern part of Sumatra, the paleomagnetic data shown 41° South. Tanjung Karang - Gunung Kasih Terrane, is composed of higher metamorphic rocks and supposed to be pre-Carboniferous in age, covered by Mesozoic sedimentary rocks and were intruded by granitic-dioritic rocks, occupied in the Southern part of Sumatra, the paleomagnetic data shown 19° North. The Kuantan-Duabelas Mountain (West Sumatra block) is occupied by metamorphic, sedimentary and volcanic rocks of Paleozoic - Mesozoic (Carboniferous - Triassic) in age, contains a Cathaysion fauna and flora and are intruded by the Mesozoic granitoid rocks. The terrane occurred in the western part of Sumatra. Meanwhile, the Gumai-Garba (Waloya Terrane) which is occupied by the tectonite/melange, metasediment, carbonate and volcanic rocks of Mesozoic (Jurassic - Cretaceous) in age, are intruted by the Late Cretaceous granitoid rocks, the paleomagnetic data shown 30° - 31° South.

Keywords: tectonostratigraphy, amalgamation, allochtonous, terranes, sumatra

Procedia PDF Downloads 321
60 Petrology, Geochemistry and Formation Conditions of Metaophiolites of the Loki Crystalline Massif (the Caucasus)

Authors: Irakli Gamkrelidze, David Shengelia, Tamara Tsutsunava, Giorgi Chichinadze, Giorgi Beridze, Ketevan Tedliashvili, Tamara Tsamalashvili

Abstract:

The Loki crystalline massif crops out in the Caucasian region and the geological retrospective represent the northern marginal part of the Baiburt-Sevanian terrain (island arc), bordering with the Paleotethys oceanic basin in the north. The pre-Alpine basement of the massif is built up of Lower-Middle Paleozoic metamorphic complex (metasedimentary and metabasite rocks), Upper Devonian quartz-diorites and Late Variscan granites. Earlier metamorphic complex was considered as an indivisible set including suites with different degree of metamorphism. Systematic geologic, petrologic and geochemical investigations of the massif’s rocks suggest the different conception on composition, structure and formation conditions of the massif. In particular, there are two main rock types in the Loki massif: the oldest autochthonous series of gneissic quartz-diorites and cutting them granites. The massif is flanked on its western side by a volcano-sedimentary sequence, metamorphosed to low-T facies. Petrologic, metamorphic and structural differences in this sequence prove the existence of a number of discrete units (overthrust sheets). One of them, the metabasic sheet represents the fragment of ophiolite complex. It comprises transition types of the second and third layers of the Paleooceanic crust: the upper noncumulated part of the third layer gabbro component and the following lowest part of the parallel diabase dykes of the second layer. The ophiolites are represented by metagabbros, metagabbro-diabases, metadiabases and amphibolite schists. According to the content of petrogenic components and additive elements in metabasites is stated that the protolith of metabasites belongs to petrochemical type of tholeiitic series of basalts. The parental magma of metaophiolites is of E-MORB composition, and by petrochemical parameters, it is very close to the composition of intraplate basalts. The dykes of hypabissal leucocratic siliceous and medium magmatic rocks associated with the metaophiolite sheet form the separate complex. They are granitoids with the extremely low content of CaO and quartz-diorite porphyries. According to various petrochemical parameters, these rocks have mixed characteristics. Their formation took place in spreading conditions or in the areas of manifestation of plumes most likely of island arc type. The metamorphism degree of the metaophiolites corresponds to a very low stage of green schist facies. The rocks of the metaophiolite complex are obducted from the Paleotethys Ocean. Geological and paleomagnetic data show that the primary location of the ocean is supposed to be to the north of the Loki crystalline massif.

Keywords: the Caucasus, crystalline massif, ophiolites, tectonic sheet

Procedia PDF Downloads 256
59 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 78
58 Oxygen and Sulfur Isotope Composition of Gold Bearing Granite Gneiss and Quartz Veins of Megele Area, Western Ethiopia: Implication for Fluid Source

Authors: Temesgen Oljira, Olugbenga Akindeji Okunlola, Akinade Shadrach Olatunji, Dereje Ayalew, Bekele A. Bedada, Tasin Godlove Bafon

Abstract:

The Megele area gold-bearing Neoproterozoic rocks in the Western Ethiopian Shield has been under exploration for the last few decades. The geochemical and ore petrological characterization of the gold-bearing granite gneiss and associated quartz vein is crucial in understanding the gold's genesis. The present study concerns the ore petrological, geochemical, and stable O2 and S characterization of the gold-bearing granite gneiss and associated quartz vein. This area is known for its long history of placer gold mining. The presence of quartz veins of different generations and orientations, visible sulfide mineralization, and oxidation suggests that the Megele area is geologically fertile for mineralization. The Au and base metals analysis also indicate that Megele area rocks are characterized by Cu (2-22 ppm av. 7.83 ppm), Zn (2-53 ppm av. 29.33 ppm), Co (1-27 ppm av. 13.33 ppm), Ni (2-16 ppm av. 10 ppm), Pb (5-10 ppm av. 8.33 ppm), Au (1-5 ppb av. 2.11 ppb), Ag (0.5 ppm), As (5-12 ppm av. 7.83 ppm), Cd (0.5ppm), Li (0.5 ppm), Mo (1-4 ppm av. 1.6 ppm), Sc (5-13 ppm av. 9.3 ppm), and Tl (10 ppm). The oxygen isotope (δ18O) values of gold-bearing granite gneiss and associated quartz veins range from +8.6 to +11.5 ‰, suggesting the mixing of metamorphic water with magmatic water within the ore-forming fluid. The Sulfur isotope (δ34S) values of gold-bearing granite gneiss range from -1.92 to -0.45 ‰ (mean value of -1.13 ‰) indicating the narrow range of value. This suggests that the sulfides have been precipitated from the fluid system originating from a single source of the magmatic component under sulfur isotopic fractionation equilibrium condition. The tectonic setting of the host rocks, the occurrence of ore bodies, mineral assemblages of the host rocks and proposed ore-forming fluids of the Megele area gold prospects have similarities with features of orogenic gold deposit. The δ18O and δ34S isotopic values also suggested a metamorphic origin with the magmatic components. Thus, the Megele gold prospect could be related to an orogenic gold deposit related to metamorphism and associated intrusions.

Keywords: fluid source, gold mineralization, oxygen isotope, stable isotope, sulfur isotope

Procedia PDF Downloads 53
57 Automata-Based String Analysis for Detecting Malware in Android Programs

Authors: Assad Maalouf, Lunjin Lu, James Lynott

Abstract:

We design and implement a precise model of string operations using finite state machine transformers and state transformers to approximate the values string variables can take throughout the execution of the program.We use our model to analyze Android program string variables. Our experimental results show that our string analysis is very efficient at detecting the contextual effect of string operations on the string variables. Our model proved to be very useful when it came to verifying statements about the string variables of the program.

Keywords: abstract interpretation, android, static analysis, string analysis

Procedia PDF Downloads 157
56 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 449
55 An Enhanced Digital Forensic Model for Internet of Things Forensic

Authors: Tina Wu, Andrew Martin

Abstract:

The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.

Keywords: acquisition, Internet of Things, model, zoning

Procedia PDF Downloads 240
54 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 339
53 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 49
52 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 102
51 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 56
50 Cybersecurity Protection Structures: The Case of Lesotho

Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule

Abstract:

The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.

Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team

Procedia PDF Downloads 129
49 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails

Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith

Abstract:

Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.

Keywords: cybersecurity, human-centric, phishing, psychology

Procedia PDF Downloads 55
48 The Evaluation of Shear Modulus (Go) Consistency State of Consolidation Cohesive Soils and Seismic Reflection Survey Using Degree of Soil Consolidation

Authors: Abdul Halim Abdul, Wan Ismail Wan Yusoff

Abstract:

The geological formation at Limau Manis Besar area, are consist of low grade metamorphic rock and undulating mountaineers, rugged terrain and the quite steeply 45 degree slope gradient. The objectives of this paper are present the methods and devices used in measurement of P-wave velocity to estimate the initial Shear Modulus (Go) in steady state and critical state soil consolidation. The relationship between SPT-N values and the Shear Modulus (Go) at very small strain is widely considered to be evaluated. Based on the seismic reflection survey, the constant (K) poroelastic theory, mean effectives stress and primer wave velocity (Vs) increase as the soil depth increase. The steady state and critical state, Degree of Soil Consolidation(U) concept is used to interpret the behavior of Shear Modulus (Go). The relationship between Consolidation Test and Seismic Reflection Survey is also discussed.

Keywords: geological setting, shear modulus, poroelastic theory, steady state and none steady state degree of soil consolidation, consolidation test

Procedia PDF Downloads 450
47 An Analysis of the Results of Trial Blasting of Site Development Project in the Volcanic Island

Authors: Dong Wook Lee, Seung Hyun Kim

Abstract:

Trial blasting is conducted to identify the characteristics of the blasting of the applicable ground before production blasting and to investigate various problems posed by blasting. The methods and pattern of production blasting are determined based on an analysis of the results of trial blasting. The bedrock in Jeju Island, South Korea is formed through the volcanic activities unlike the inland areas, composed of porous basalt. Trial blasting showed that the blast vibration frequency of sedimentary and metamorphic rocks in the inland areas is in a high frequency band of about 80 Hz while the blast vibration frequency of Jeju Island is in a low frequency band of 10~25 Hz. The frequency band is analyzed to be low due to the large cycle of blasting pattern as blast vibration passes through the layered structured ground layer where the rock formation and clickers irregularly repeat. In addition, the blast vibration equation derived from trial blasting was R: 0.885, S.E: 0.216 when applying the square root scaled distance (SRSD) relatively suitable for long distance, estimated at the confidence level of 95%.

Keywords: attenuation index, basaltic ground, blast vibration constant, blast vibration equation, clinker layer

Procedia PDF Downloads 261
46 Digital Geological Map of the Loki Crystalline Massif (The Caucasus) and Its Multi-Informative Explanatory Note

Authors: Irakli Gamkrelidze, David Shengelia, Giorgi Chichinadze, Tamara Tsutsunava, Giorgi Beridze, Tamara Tsamalashvili, Ketevan Tedliashvili, Irakli Javakhishvili

Abstract:

The Caucasus is situated between the Eurasian and Africa-Arabian plates and represents a component of the Mediterranean (Alpine-Himalayan) collision belt. The Loki crystalline massif crops out within one of the terranes of the Caucasus – Baiburt-Sevanian terrane. By the end of 2018, a digital geological map (1:50 000) of the Loki massif was compiled. The presented map is of great importance for the region since there is no large-scale geological map which reflects the present standards of the geological study of the massif up to the last time. The existing State Geological Map of the Loki massif is very outdated. A new map drown by using GIS (Geographic Information System) technology is loaded with multi-informative details that include: specified contours of geological units and separate tectonic scales, key mineral assemblages and facies of metamorphism, temperature conditions of metamorphism, ages of metamorphism events and the massif rocks, genetic-geodynamic types of magmatic rocks. Explanatory note, attached to the map includes the large specter of scientific information. It contains characterization of the geological setting, composition and petrogenetic and geodynamic models of the massif formation. To create a geological map of the Loki crystalline massif, appropriate methodologies were applied: a sampling of rocks, GIS technology-based mapping of geological units, microscopic description of the material, composition analysis of rocks, microprobe analysis of minerals and a new interpretation of obtained data. To prepare a digital version of the map the appropriated activities were held including the creation of a common database. Finally, the design was created that includes the elaboration of legend and the final visualization of the map. The results of the study presented in the explanatory note are given below. The autochthonous gneissose quartz diorites of normal alkalinity and sub-alkaline gabbro-diorites included in them belong to different phases of magmatism. They represent “igneous” granites corresponding to mixed mantle-crustal type granites. Four tectonic plates of the allochthonous metamorphic complex–Lower Gorastskali, Sapharlo–Lok-Jandari, Moshevani, and Lower Gorastskali differ from each other by structure and degree of metamorphism. The initial rocks of these plates are formed in different geodynamic conditions and during the Early Bretonian orogeny while overthrusting due to tectonic compression they form a thick tectonic sheet. The Lower Gorastskali overthrust sheet is a fragment of ophiolitic association corresponding to the Paleotethys oceanic crust. The protolith of the ophiolitic complex basites corresponds to the tholeiitic series of basalts. The Sapharlo–Lok-Jandari overthrust sheet is metapelites, metamorphosed in conditions of greenschist facies of regional metamorphism. The regional metamorphism of Moshevani overthrust sheet crystalline schists quartzites corresponds to a range from greenschist to hornfels facies. The “mélange” is built of rock fragments and blocks of above-mentioned overthrust sheets. Sub-alkaline and normal alkaline post-metamorphic granites of the Loki crystalline massif belong to “igneous” and rarely to “sialic” and “anorogenic” types of granites.

Keywords: digital geological map, 1:50 000 scale, crystalline massif, the caucasus

Procedia PDF Downloads 149
45 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 256
44 The Chromitites of the Collo Ultramafic Rocks (NE Algeria): Two Generations Evidenced From Petrological, Mineralogical and Isotopic Studies

Authors: Rabah Laouar, Yahia Boudra, Adel Satouh, Adrian Boyce

Abstract:

The ultramafic rocks of the Collo region crop out as « stratified » masses that cross-cut older metamorphic formation of the basement. These rocks are mainly peridotites and serpentinites. The peridotites are composed of olivine, orthopyroxene, clinopyroxene and spinel (chromite). The chemical composition of these lherzolites show a magnesian character with high MgO contents (34.4 to 37.5%), high Cr (0.14 to 0.27%), Ni (0.14 to 0.26%) and Co (34 to 133 ppm) and low CaO and Al₂O₃ (0.02 to 2.2 and 0.5 to 2.8 % respectively). They represent a residue (restite) of a mantle magmas partial melting. The chromite which represents about 2 to 3% of the rock is a ubiquitous mineral and shows two different generations: primary idiomorphic millimetric crystals and secondary very fine, xenomorphic and interstitial aggregates. The primary chromites are alumino-ferro-magnesian crystals. They show high Al₂O₃ (25.77% to 27.36%) and MgO (10.70% to 13.36%). Cr# (100*Cr/ (Al+Cr)) varies between 45 and 48, and Mg# (100*Mg/Mg+Fe₂+) varies between 49 and 59. On the other hand, the secondary interstitial grains are iron-rich chromites; they show low Al₂O₃ (4.67% to 9.54%) and MgO (4.60% to 4.65%). Cr# is relatively high (77 to 88) whereas Mg# show relatively low values, varying between 22 and 25. Oxygen isotopic composition of both types of chromites is consistent with their derivation from a mantle source (ð¹⁸O vary between +3.9 and +5.2‰), though a contribution of ¹⁶O-rich component to the secondary chromites is not ruled out.

Keywords: peridotites, serpentinites, chromite, partial melting, collo, Algeria

Procedia PDF Downloads 65
43 Heavy Minerals Distribution in the Recent Stream Sediments of Diyala River Basin, Northeastern Iraq

Authors: Abbas R. Ali, Daroon Hasan Khorsheed

Abstract:

Twenty one samples of stream sediments were collected from the Diyala River Basin (DRB), which represent one of three major tributaries of the Tigris River at northeastern Iraq. This study is concerned with the heavy minerals (HM) analysis in the + 63μ m fraction of the Diyala River sediments, distribution pattern in the various river basin sectors, as well as comparing the present results with previous works.The metastable heavy minerals (epidote, staurolite, garnet) represent more than (30%) Whereas the ultrastable heavy minerals (pyroxene and amphibole) make only about (19 %). Opaques are present in high proportions reaching about (29%) as an average. The ultrastable (zircon, tourmaline, rutile) heavy minerals are the miner constituents (7%) in the sediments.According to the laboratory analytical data of heavy mineral distributions the studied sediments are derived from mafic and ultramafic rocks are found in northeastern Iraq that represent Walash – Nawpordan Series and Mawat complexes in Zagros zones. The presence of zircon and tourmaline in trace amounts may give an indication for the weak role of acidic rocks in the source area whereas the epidote group minerals give an indication for the role of metamorphic rocks.

Keywords: heavy minerals, mineral distribution, recent stream sediment, Diyala river, northeastern Iraq

Procedia PDF Downloads 492
42 Regional Metamorphism of the Loki Crystalline Massif Allochthonous Complex of the Caucasus

Authors: David Shengelia, Giorgi Chichinadze, Tamara Tsutsunava, Giorgi Beridze, Irakli Javakhishvili

Abstract:

The Loki pre-Alpine crystalline massif crops out within the Caucasus region. The massif basement is represented by the Upper Devonian gneissose quartz-diorites, the Lower-Middle Paleozoic metamorphic allochthonous complex, and different magmatites. Earlier, the metamorphic complex was considered as indivisible set represented by the series of different temperature metamorphits. The degree of metamorphism of separate parts of the complex is due to different formation conditions. This fact according to authors of the abstract was explained by the allochthonous-flaky structure of the complex. It was stated that the complex thrust over the gneissose quartz diorites before the intrusion of Sudetic granites. During the detailed mapping, the authors turned out that the metamorphism issues need to be reviewed and additional researches to be carried out. Investigations were accomplished by using the following methodologies: finding of key sections, a sampling of rocks, microscopic description of the material, analytical determination of elements in the rocks, microprobe analysis of minerals and new interpretation of obtained data. According to the author’s recent data within the massif four tectonic plates: Lower Gorastskali, Sapharlo-Lok-Jandari, Moshevani and “mélange” overthrust sheets have been mapped. They differ from each other by composition, the degree of metamorphism and internal structure. It is confirmed that the initial rocks of the tectonic plates formed in different geodynamic conditions during overthrusting due to tectonic compression form a thick tectonic sheet. Based on the detailed laboratory investigations additional mineral assemblages were established, temperature limits were specified, and a renewed trend of metamorphism facies and subfacies was elaborated. The results are the following: 1. The Lower Gorastskali overthrust sheet is a fragment of ophiolitic association corresponding to the Paleotethys oceanic crust. The main rock-forming minerals are carbonate, chlorite, spinel, epidote, clinoptilolite, plagioclase, hornblende, actinolite, hornblende, albite, serpentine, tremolite, talc, garnet, and prehnite. Regional metamorphism of rocks corresponds to the greenschist facies lowest stage. 2. The Sapharlo-Lok-Jandari overthrust sheet metapelites are represented by chloritoid, chlorite, phengite, muscovite, biotite, garnet, ankerite, carbonate, and quartz. Metabasites containing actinolite, chlorite, plagioclase, calcite, epidote, albite, actinolitic hornblende and hornblende are also present. The degree of metamorphism corresponds to the greenschist high-temperature chlorite, biotite, and low-temperature garnet subfacies. Later the rocks underwent the contact influence of Late Variscan granites. 3. The Moshevani overthrust sheet is represented mainly by metapelites and rarely by metabasites. Main rock-forming minerals of metapelites are muscovite, biotite, chlorite, quartz, andalusite, plagioclase, garnet and cordierite and of metabasites - plagioclase, green and blue-green hornblende, chlorite, epidote, actinolite, albite, and carbonate. Metamorphism level corresponds to staurolite-andalusite subfacies of staurolite facies and partially to facies of biotite muscovite gneisses and hornfelse facies as well. 4. The “mélange” overthrust sheet is built of different size rock fragments and blocks of Moshevani and Lower Gorastskali overthrust sheets. The degree of regional metamorphism of first and second overthrust sheets of the Loki massif corresponds to chlorite, biotite, and low-temperature garnet subfacies, but of the third overthrust sheet – to staurolite-andalusite subfacies of staurolite facies and partially to facies of biotite muscovite gneisses and hornfelse facies.

Keywords: regional metamorphism, crystalline massif, mineral assemblages, the Caucasus

Procedia PDF Downloads 140
41 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 19
40 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 133
39 Evaluation and Provenance Studies of Heavy Mineral Deposits in Recent Sediment of Ologe Lagoon, South Western, Nigeria

Authors: Mayowa Philips Ibitola, Akinade-Solomon Olorunfemi, Abe Oluwaseun Banji

Abstract:

Heavy minerals studies were carried out on eighteen sediment samples from Ologe lagoon located at Lagos Barrier complex, with the aim of evaluating the heavy mineral deposits and determining the provenance of the sediments. The samples were subjected to grain analysis techniques in order to collect the finest grain size. Separation of heavy minerals from the samples was done with the aid of bromoform to enable petrographic analyses of the heavy mineral suite, under the polarising microscope. The data obtained from the heavy mineral analysis were used in preparing histograms and pie chart, from which the individual heavy mineral percentage distribution and ZTR index were derived. The percentage composition of the individual heavy mineral analyzed are opaque mineral 63.92%, Zircon 12.43%, Tourmaline 5.79%, Rutile 13.44%, Garnet 1.74% and Staurolite 3.52%. The calculated zircon, tourmaline, rutile index in percentage (ZTR) varied between 76.13 -92.15%, average garnet-zircon index (GZI), average rutile-zircon index (RuZI) and average staurolite-zircon index values in all the stations are 16.18%, 54.33%, 25.11% respectively. The mean ZTR index percentage value is 85.17% indicates that the sediments within the lagoon are mineralogically matured. The high percentage of zircon, rutile, and tourmaline indicates an acid igneous rock source for the sediments. However, the low percentage of staurolite, rutile and garnet occurrence indicates sediment of metamorphic rock source input.

Keywords: lagoon, provenance, heavy mineral, ZTR index

Procedia PDF Downloads 148
38 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 156
37 Rare Earth Elements and Radioactivity of Granitoid Rocks at Abu Marw Area, South Eastern Desert, Egypt

Authors: Adel H.El-Afandy, Abd Alrahman Embaby, Mona A. El Harairey

Abstract:

Abu Marw area is located in the southeastern part of the Eastern Desert, about 150km south east of Aswan. Abu Marw area is mainly covered by late Proterozoic igneous and metamorphic rocks. These basement rocks are nonconformably overlain by late Cretaceous Nubian sandstones in the western and northern parts of the areas. Abu Marw granitoid batholiths comprises a co-magmatic calc alkaline I type peraluminous suite of rocks ranging in composition from tonalite, granodiorite, monzogranite, syenogranite to alkali feldspar granite. The studied tonalite and granodiorite samples have ΣREE lower than the average REE values (250ppm) of granitic rocks, while the monzogranite, syenogranite and alkali feldspar granite samples have ΣREE above the average REE values of granitic rocks. Chondrite-normalized REE patterns of the considered granites display a gull-wing shape, characterized by large to moderately fractionated patterns and high LREE relative to the MREE and HREE contents. Furthermore, the studied rocks have a steadily decreasing Eu/Eu* values from the tonalite to the alkali feldspar granite with simultaneous increase in the ΣREE contents. The average U contents in different granitic rocks.

Keywords: granite, rare earth element, radioactivity, Abu Marw, south eastern desert

Procedia PDF Downloads 404
36 Mineralogical and Geochemical Characteristics of Serpentinite-Derived Ni-Bearing Laterites from Fars Province, Iran: Implications for the Lateritization Process and Classification of Ni-Laterites

Authors: S. Rasti, M. A. Rajabzadeh

Abstract:

Nickel-bearing laterites occur as two parallel belts along Sedimentary Zagros Orogenic (SZO) and Metamorphic Sanandaj-Sirjan (MSS) petrostructural zones, Fars Province, south Iran. An undisturbed vertical profile of these laterites includes protolith, saprolite, clay, and oxide horizons from base to top. Highly serpentinized harzburgite with relicts of olivine and orthopyroxene is regarded as the source rock. The laterites are unusual in lacking a significant saprolite zone with little development of Ni-silicates. Hematite, saponite, dolomite, smectite and clinochlore increase, while calcite, olivine, lizardite and chrysotile decrease from saprolite to oxide zones. Smectite and clinochlore with minor calcite are the major minerals in clay zone. Contacts of different horizons in laterite profiles are gradual and characterized by a decrease in Mg concentration ranging from 18.1 to 9.3 wt.% in oxide and saprolite, respectively. The maximum Ni concentration is 0.34 wt.% (NiO) in the base of the oxide zone, and goethite is the major Ni-bearing phase. From saprolite to oxide horizons, Al2O3, K2O, TiO2, and CaO decrease, while SiO2, MnO, NiO, and Fe2O3 increase. Silica content reaches up to 45 wt.% in the upper part of the soil profile. There is a decrease in pH (8.44-8.17) and an increase in organic matter (0.28-0.59 wt.%) from base to top of the soils. The studied laterites are classified in the oxide clans which were derived from ophiolite ultramafic rocks under Mediterranean climate conditions.

Keywords: Iran, laterite, mineralogy, ophiolite

Procedia PDF Downloads 309
35 Microdiamond and Moissanite Inclusions in Garnets from Pohorje Mountains, Eastern Alps, Slovenia

Authors: Mirijam Vrabec, Marian Janak, Bojan Ambrozic, Angelja K. Surca, Nastja Rogan Smuc, Nina Zupancic, Saso Sturm

Abstract:

Natural microdiamonds and moissanite (SiC) can form during the orogenic events under ultrahigh-pressure metamorphic conditions (UHP), when parts of Earth’s crust are subducted to extreme depths. So far, such processes were identified only in few places on the Earth, and therefore, represent unique opportunity to study the evolution of the Earth’s deep interior. An important discovery of microdiamonds and moissanite was reported from Pohorje, (Slovenia), where they occurred as single or polyphase inclusions in garnets. Metasedimentary rocks from Pohorje are predominantly gneisses representing parts of the Austroalpine metamorphic units of the Eastern Alps. During Cretaceous orogeny, (ca. 95–92 Ma) continental crustal rocks were deeply subducted to the mantle depths (below 100 km) and metamorphosed at pressures exceeding 3.5 GPa and temperatures between 800–850 °C. Microstructural and phase analysis of the inclusions as well as detailed elemental analysis of host garnets were carried out combining several analytical techniques: optical microscope in plane polarized transmitted light, electron probe microanalysis (EPMA) with wavelength-dispersive x-ray spectrometry (WDS) and field-emission scanning microscope (FEG-SEM) with energy-dispersive x-ray spectroscopy (EDS). Micro-Raman analysis revealed sharp, first order diamond bands sometimes accompanied by graphite bands implying that transformation of diamond back to graphite occurred. To study the chemical and crystallographic relationship between microdiamonds and co-inclusions, advanced techniques of transmission electron microscopy (TEM) were applied, which included high-angle annular dark-field scanning transmission electron microscopy (HAADF-STEM), combined with EDS and electron energy-loss spectroscopy (EELS). To prepare electron transparent TEM lamellae selectively a dual-beam Focused Ion Beam/SEM (FIB/SEM) was employed. Detailed study of TEM lamellae, which was cross-sectioned from the highly faceted inclusion body located within the host garnet crystal matrix, revealed rich and rather complex internal structure. Namely, the negative crystal facets of the main inclusion body were typically decorated with up to 1 μm thick amorphous layer, reflecting the general garnet composition with slight variations in Fe/Ca content. Within these layers, ELNES analysis revealed the presence of a 28–30 nm thick layer of amorphous carbon. The very last section of this layer corresponds to composition of SiO2. Within the inclusion, besides diamond and moissanite alumosilicate mineral with pronounced layered structure, iron sulfides and chlorine were identified under TEM and CO2 and CH4 using Raman. Moissanite is found as single crystal or composed from numerous highly textured nano-crystals with the average size of 10 nm. Moissanite inclusions were found embedded inside the amorphous crust implying that moissanite crystalized well before the deposition of the amorphous layer. From the microstructural, crystallographic and chemical observations so far we can deduce, that polyphase inclusions in diamond bearing garnets from Pohorje most probably crystallized from reduced supercritical fluids. Based on layered interface structure of the host mineral multiphase process of crystallization is possible. The presence of microdiamonds and moissanite in rocks from Pohorje demonstrates that these parts of the Eastern Alps were subducted to extreme depths, and were subsequently exhumed back to the Earth's surface without complete breakdown of UHP mineral phases, allowing a rear and exceptional opportunity to study them in-situ.

Keywords: diamond, fluid inclusions, moissanite, TEM, UHP metamorphism.

Procedia PDF Downloads 278