WorldWideScience

Sample records for angioedema hae attacks

  1. The hereditary angioedema burden of illness study in Europe (HAE-BOIS- Europe)

    DEFF Research Database (Denmark)

    Bygum, Anette; Aygören-Pürsün, Emel; Caballero, Teresa;

    2012-01-01

    of HAE-I or HAE-II. Data collection includes: (i) a survey on individuals' health care resource use, direct and indirect medical costs, impact on work and school, treatment satisfaction, and emotional functioning (via the Hospital Anxiety and Depression Scale); and (ii) one-on-one interviews to collect......ABSTRACT: BACKGROUND: Hereditary angioedema (HAE) is a rare but serious disease marked by swelling attacks in the extremities, face, trunk, airway, or abdominal areas that can be spontaneous or the result of trauma and other triggers. It can be life-threatening due to the risk of asphyxiation...... detailed descriptive data and patient testimonials on the impact of HAE on patients' health-related quality of life. CONCLUSION: The present manuscript describes the development and plans for implementing a multi-country European study with the aim of characterizing the humanistic and economic burden...

  2. Angioedema attacks in patients with hereditary angioedema: Local manifestations of a systemic activation process.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik

    2016-08-01

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors.

  3. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  4. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary;

    2015-01-01

    BACKGROUND: Icatibant, a selective bradykinin B2 receptor antagonist for the treatment of acute hereditary angio-oedema (HAE) attacks in adults, can be administered by health care professionals (HCPs) or self-administered. This analysis compared characteristics and outcomes of acute HAE attacks t...

  5. [Hereditary angioedema. Treatment of acute attacks in Argentina].

    Science.gov (United States)

    Malbrán, Alejandro; Malbrán, Eloisa; Menéndez, Alejandra; Fernández Romero, Diego S

    2014-01-01

    In the world, hereditary angioedema (HAE) affects 1 every 50000 persons. It is characterized by highly disabling and recurrent episodes of cutaneous, abdominal and laryngeal episodes of angioedema. Asphyxia related mortality ranges from 15 to 50%. In Argentina a plasma derived C1 inhibitor concentrate (pdC1INH) has been available for the treatment of acute attacks for many decades, however, only15 (26%) out of 58 patients had received pdC1INH at least once until 2008, and only2 (3.4%) had used it regularly. After worldwide approval of the new drugs for the treatment of acute HAE attacks, adding icatibant to pdC1INH in Argentina, and after publication of the therapeutic guide for the country, 42 (82%) out of 51 patients from the original group has pdC1INH available to treat their next attack. However, 16 (18%) patients continue without access to medication and other 15 (35.7%) obtain their therapy spuriously through some other affected relative in their environment. Only 12 (28.6%) patients of the group self-treated at home. Access to treatment has greatly improved, but needs to be extended to all patients and self-treatment at home should be encouraged.

  6. Helicobacter pylori infection as a triggering factor of attacks in patients with hereditary angioedema

    DEFF Research Database (Denmark)

    Visy, Beáta; Füst, George; Bygum, Anette;

    2007-01-01

    BACKGROUND: Helicobacter pylori infection is considered among the causative factors of urticaria and angioedema. Having conducted a study on 65 patients, Hungarian authors reported in 2001 that successful eradication of H. pylori is followed by a significant reduction in the number of attacks...... in patients with hereditary angioedema (HAE). The present study aimed to reinvestigate the relationship between H. pylori infection and the attack rate in the framework of an international collaborative study. MATERIALS AND METHODS: Within the framework of the PREHAEAT project launched by the European Union......, further 152 patients were studied in seven collaborating centers, and participants of the earlier study were followed up in order to detect any relationship between H. pylori infection and the occurrence of attacks in patients suffered from HAE. RESULTS: The proportion of patients experiencing frequent...

  7. Current characteristics associated with hereditary angioedema attacks and treatment: the home infusion based patient experience.

    Science.gov (United States)

    Tachdjian, Raffi; Banerji, Aleena; Guyer, Autumn; Morphew, Tricia

    2015-01-01

    This article presents a current perspective on the characteristics of hereditary angioedema (HAE) attacks and treatment as captured by a home infusion service. Retrospective data on 158 HAE patients who were enrolled in this acute treatment program were analyzed for factors surrounding an attack. The majority of patients had a high level of disease severity at baseline (88%), with a higher than expected likelihood of having a positive family history (87.8%). The most likely times for patients to call for home treatment were just before and during working hours (6:00 A.M.-5:00 P.M.). Eighty-three percent had more than one alternate mode of medication. Factors associated with a severe attack included an overall severe rating of HAE attacks in the previous year, an abdominal attack alone or a combination of peripheral and abdominal attacks versus a peripheral attack alone, and the use of two doses rather than one for treatment of the current attack. Average time to relief onset was 43.5 minutes. One dose of ecallantide was sufficient to treat the majority of attacks, and a second dose was needed in 23.6% of patients experiencing a severe attack. However, patients who reported both a severe attack rating during the previous year and experiencing only a peripheral current attack were more likely to experience a severe current attack. Acute treatment paradigms for HAE remain diverse. Understanding factors driving these decisions could help alleviate the overall burden of this disease and help overcome some of the challenges faced by the patients and their caretakers and improve their quality of life. Enhanced capture and analysis of prodromal factors in future studies should help us further alleviate the burden of this disease.

  8. Fresh Frozen Plasma for the Treatment of Hereditary Angioedema Acute Attacks

    Institute of Scientific and Technical Information of China (English)

    Rui Tang; Shi Chen; Hong-yu Zhang

    2012-01-01

    Objective To determine the safety and efficacy of fresh frozen plasma (FFP) infusion for the treatment of hereditary angioedema (HAE).Methods The medical records of patients with HAE admitted to Peking Union Medical College Hospital who had received FFP infusion during 2004 and 2010 were reviewed and PubMed database from 1966 to the present were searched using the following key words:hereditary angioedema and fresh frozen plasma.The patient's age,sex,body location of HAE attacks,the dose of FFP infusion,time of beginning to improvement,time to complete remission,complication,C1 inhibitor activity,and outcome were analyzed.Results A total of 13 enrolled patients (7 male and 6 female) received 16 times of FFP infusion,including 2 patients undergoing FFP infusion in Peking Union Medical College Hospital and 11 patients reported in the literature.The mean dosage of FFP infusion was 586±337 mL.Two cases suffered from worsening abdominal pain and one case experienced skin rash.Only 1 patient had no improvement in symptom owing to transfusion related reaction.There was a defimite improvement in symptom 49± 19 minutes after beginning FFP infusion.The remission time decreased from 61.7±27.0 hours to 3.3 (2.0,12.0) hours after FFP infusion.FFP infusion was effective for both type Ⅰ and type Ⅱ HAE.Conclusion FFP seems to be safe and effective for acute attacks of HAE.

  9. Urticaria and angioedema

    Directory of Open Access Journals (Sweden)

    Kanani Amin

    2011-11-01

    Full Text Available Abstract Urticaria (hives is a common disorder that often presents with angioedema (swelling that occurs beneath the skin. It is generally classified as acute, chronic or physical. Second-generation, non-sedating H1-receptor antihistamines represent the mainstay of therapy for both acute and chronic urticaria. Angioedema can occur in the absence of urticaria, with angiotensin-converting enzyme (ACE inhibitor-induced angioedema and idiopathic angioedema being the more common causes. Rarer causes are hereditary angioedema (HAE or acquired angioedema (AAE. Although the angioedema associated with these disorders is often self-limited, laryngeal involvement can lead to fatal asphyxiation in some cases. The management of HAE and AAE involves both prophylactic strategies to prevent attacks of angioedema (i.e., trigger avoidance, attenuated androgens, tranexamic acid, and plasma-derived C1 inhibitor replacement therapy as well as pharmacological interventions for the treatment of acute attacks (i.e., C1 inhibitor replacement therapy, ecallantide and icatibant. In this article, the authors review the causes, diagnosis and management of urticaria (with or without angioedema as well as the work-up and management of isolated angioedema, which vary considerably from that of angioedema that occurs in the presence of urticaria.

  10. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    DEFF Research Database (Denmark)

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen;

    2016-01-01

    OBJECTIVE: To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a...

  11. Hereditary angioedema

    DEFF Research Database (Denmark)

    Peterson, M P; Bygum, A

    2016-01-01

    We report a 64-year-old man who suffered from recurrent visible swelling attacks since the age of 20 as well as episodes with severe upper airway edema, resulting in 4 emergency tracheotomies. Eventually after 44 years he was diagnosed with hereditary angioedema (HAE) type II. The aims of this re...... of this report is to emphasize the importance of awareness concerning HAE, which does not respond to traditional anti-allergic therapy, and remind physicians to test for functional C1-INH deficiency....

  12. C1-inhibitor therapy for hereditary angioedema attacks: prospective patient assessments of health-related quality of life.

    Science.gov (United States)

    Bewtra, Againdra K; Levy, Robyn J; Jacobson, Kraig W; Wasserman, Richard L; Machnig, Thomas; Craig, Timothy J

    2012-01-01

    C1-inhibitor (INH) concentrate, which is recommended as first-line treatment for acute hereditary angioedema (HAE) attacks in many countries, was recently approved in the United States. We sought to solicit patients' feedback about their health-related quality of life (HRQoL) while being treated with C1-INH concentrate for acute HAE attacks under real-world conditions, as well as the personal impact of the availability of C1-INH on lifestyle and mental health domains. Subjects enrolled in an open-label study of C1-INH at 20 U/kg for acute HAE attacks were invited to participate in a prospectively designed survey to solicit "real-time" patient responses that were collected via an interactive voice response service or online with a personal computer. Eighteen subjects submitted 60 quarterly HRQoL and treatment impact survey responses over 29 months. Seventeen of 18 patients responding reported mean short form 12 HRQoL scores that were within a normal range. More than one-half indicated that C1-INH availability made them feel somewhat or much better, and >80% reported having a better outlook on the future and feeling more secure about the danger of life-threatening attacks. These data confirm a high level of HRQoL and a positive impact in lifestyle and emotional domains among patients who were treated for acute attacks of HAE with C1-INH concentrate.

  13. Elevated D-dimers in attacks of hereditary angioedema are not associated with increased thrombotic risk

    Science.gov (United States)

    Reshef, A; Zanichelli, A; Longhurst, H; Relan, A; Hack, C E

    2015-01-01

    Background Recommended management of attacks of hereditary angioedema (HAE) due to C1 esterase inhibitor (C1-INH) deficiency (C1-INH-HAE) includes therapy with exogenous C1INH. Thrombotic/thromboembolic events (TEE) have been reported with plasma-derived C1INH, but so far none with recombinant human C1INH (rhC1INH). This phase III, randomized, placebo (saline)-controlled study evaluated the safety of rhC1INH 50 IU/kg for the treatment of acute attacks in 74 patients with C1-INH-HAE. Methods Monitoring for TEE and assessment of risk of deep vein thrombosis (DVT) by the Wells prediction rule were performed, and levels of fibrin degradation products (plasma D-dimers) were assessed before study drug administration (baseline), 2 h, and 7 days posttreatment. Results Plasma D-dimer levels were elevated in 80% of the patients (median [25th–75th percentiles]: 2149 [480–5105] μg/l; normal ≤250 μg/l) and were higher in patients with submucosal (abdominal, oropharyngeal–laryngeal) attacks (3095 [890–10000] μg/l; n = 29) compared with subcutaneous (peripheral, facial) attacks (960 [450–4060] μg/l; n = 35). Median plasma D-dimer levels were comparable across treatment groups at baseline (1874 [475–4568] μg/l rhC1INH; 2259 [586–7533] μg/l saline) and 2 h postinfusion (2389 [760–4974] μg/l rhC1INH; 2550 [310–8410] μg/l saline); median plasma D-dimer levels were decreased by Day 7 in both groups (425 [232–3240] μg/l rhC1INH; 418 [246–2318] μg/l saline). No increased risk of DVT was identified, nor any TEE reported in rhC1INH treated or controls. Conclusion Elevated plasma D-dimer levels were associated with acute C1-INH-HAE attacks, particularly with submucosal involvement. However, rhC1INH therapy was not associated with thrombotic events. PMID:25640891

  14. Angioedema

    OpenAIRE

    Kaplan, Allen P

    2008-01-01

    Angioedema can be caused by either mast cell degranulation or activation of the kallikrein-kinin cascade. In the former case, angioedema can be caused by allergic reactions caused by immunoglobulin E (IgE)-mediated hypersensitivity to foods or drugs that can also result in acute urticaria or a more generalized anaphylactic reaction. Nonsteroidal anti-inflammatory drugs (cyclooxygenase 1 inhibitors, in particular) may cause angioedema with or without urticaria, and leukotrienes may have a part...

  15. The prophylactic use of C1 inhibitor in hereditary angioedema patients undergoing invasive surgical procedures: a retrospective study

    OpenAIRE

    Gavigan, Geneviève; Yang, William H; Santucci, Stephanie; Harrison, Rachel; Karsh, Jacob

    2014-01-01

    Background Hereditary Angioedema (HAE) is a rare autosomal dominant condition characterized by episodic angioedema, which may be triggered by invasive procedures and surgery. C1 inhibitor (C1 INH) was approved in the United States and Canada in 2009 and 2010, respectively, for the treatment of acute attacks. Most recently in April 2013, it was approved in Europe for short-term prophylaxis (STP), prior to medical, dental, or surgical procedures, to prevent HAE attacks in both children and adul...

  16. Generation of plasmin during acute attacks of hereditary angioedema.

    Science.gov (United States)

    Cugno, M; Hack, C E; de Boer, J P; Eerenberg, A J; Agostoni, A; Cicardi, M

    1993-01-01

    Hereditary angioedema is caused by a genetic deficiency of C1-inhibitor, a serine protease inhibitor that regulates activation of complement, contact, and fibrinolytic systems. Symptoms (bouts of subcutaneous and mucous swelling) depend on the release of a vasoactive mediator, probably through activation of these three systems. We studied the interrelationship among complement, contact, and fibrinolytic activation in 23 patients with hereditary angiodema, 18 during remission and five during an attack, by measuring plasma levels of C1-C1 inhibitor, factor XIIa-C1 inhibitor, kallikrein-C1 inhibitor, and plasmin-alpha 2-antiplasmin complexes, tissue plasminogen activator, and urokinase plasminogen activator. In addition, cleavage of high-molecular weight kininogen was detected by sodium dodecyl sulfate polyacrylamide gel electrophoresis analysis and quantified by densitometry. During remission, plasma levels of C1-C1 inhibitor complexes were elevated (p = 0.0002), whereas the other parameters were within the normal range. During acute attacks, not only plasma levels of C1-C1 inhibitor complexes but also those of plasmin-alpha 2-antiplasmin complexes (P = 0.0009) and cleaved high-molecular weight kininogen were elevated. A positive correlation between plasmin-alpha 2-antiplasmin complexes and cleaved high-molecular weight kininogen was observed (r = 0.75, p attacks is associated with the activation of the fibrinolytic system.

  17. Hereditary angioedema: classification, pathogenesis, and diagnosis.

    Science.gov (United States)

    Banerji, Aleena

    2011-01-01

    Hereditary angioedema (HAE) is a rare autosomal dominant genetic disorder associated with a deficiency in C1 inhibitor. More than 200 mutations in this gene, located on chromosome 11, have been identified. Although HAE is often inherited, 20-25% of cases are from new spontaneous mutations and they have no family history of swelling. Decreased C1 inhibitor activity leads to inappropriate activation of multiple pathways, including the complement and contact systems and the fibrinolysis and coagulation systems. Reduced C1 inhibitor activity results in increased activation of plasma kallikrein-kinin system proteases and increased bradykinin levels. Bradykinin is felt to be the main mediator of symptoms in HAE. Patients with HAE have recurrent episodes of swelling of the extremities, abdomen, face, and upper airway. Angioedema involving the gastrointestinal tract can lead to intestinal wall edema, which results in abdominal pain, nausea, vomiting, and diarrhea. Laryngeal swelling is life-threatening and may lead to asphyxia. Common triggers of an attack include trauma, stress, infection, menstruation, oral contraceptives, hormone replacement therapy, and angiotensin-converting enzyme inhibitors. Laboratory testing including C4, C1 inhibitor level, and function is needed to confirm or rule out the diagnosis of HAE. The treatment of HAE has improved significantly in recent years with the availability of several safe and effective therapies. Several consensus guidelines have been created to further assist in the management of HAE patients. This review will provide an update on the classification, pathophysiology, clinical presentation, and diagnosis of HAE. PMID:22221432

  18. Hereditary Angioedema in Childhood

    DEFF Research Database (Denmark)

    Kjaer, Line; Bygum, Anette

    2012-01-01

      Hereditary angioedema (HAE) is a rare inherited disease that is often difficult to diagnose. We report a case of a 9-year-old boy with a spontaneous mutation causing HAE, diagnosed after a life-threatening episode of angioedema of the head and upper respiratory tract after a 5-year history of...

  19. Recombinant human C1-inhibitor in the treatment of acute angioedema attacks

    NARCIS (Netherlands)

    Choi, Goda; Soeters, Maarten R.; Farkas, Henriette; Varga, Lilian; Obtulowicz, Krystyna; Bilo, Barbara; Porebski, Greg; Hack, C. Erik; Verdonk, Rene; Nuijens, Jan; Levi, Marcel

    2007-01-01

    Background: Patients with hereditary C1-inhibitor deficiency have recurrent attacks of angioedema, preferably treated with C1-inhibitor concentrate. A recombinant human C1-inhibitor (rHuC1INH) was developed, derived from milk from transgenic rabbits. This study was undertaken to investigate the effe

  20. Hereditary angioedema: what the gastroenterologist needs to know

    Directory of Open Access Journals (Sweden)

    Ali MA

    2014-11-01

    Full Text Available M Aamir Ali, Marie L Borum Division of Gastroenterology and Liver Diseases, George Washington University, Washington, DC, USA Abstract: Up to 93% of patients with hereditary angioedema (HAE experience recurrent abdominal pain. Many of these patients, who often present to emergency departments, primary care physicians, general surgeons, or gastroenterologists, are misdiagnosed for years and undergo unnecessary testing and surgical procedures. Making the diagnosis of HAE can be challenging because symptoms and attack locations are often inconsistent from one episode to the next. Abdominal attacks are common and can occur without other attack locations. An early, accurate diagnosis is central to managing HAE. Unexplained abdominal pain, particularly when accompanied by swelling of the face and extremities, suggests the diagnosis of HAE. A family history and radiologic imaging demonstrating edematous bowel also support an HAE diagnosis. Once HAE is suspected, C4 and C1 esterase inhibitor (C1-INH laboratory studies are usually diagnostic. Patients with HAE may benefit from recently approved specific treatments, including plasma-derived C1-INH or recombinant C1-INH, a bradykinin B2-receptor antagonist, or a kallikrein inhibitor as first-line therapy and solvent/detergent-treated or fresh frozen plasma as second-line therapy for acute episodes. Short-term or long-term prophylaxis with nanofiltered C1-INH or attenuated androgens will prevent or reduce the frequency and severity of episodes. Gastroenterologists can play a critical role in identifying and treating patients with HAE, and should have a high index of suspicion when encountering patients with recurrent, unexplained bouts of abdominal pain. Given the high rate of abdominal attacks in HAE, it is important for gastroenterologists to appropriately diagnose and promptly recognize and treat HAE, or refer patients with HAE to an allergist. Keywords: hereditary angioedema, abdominal pain, diagnosis

  1. Hereditary angioedema in women

    Directory of Open Access Journals (Sweden)

    Bouillet Laurence

    2010-07-01

    Full Text Available Abstract Women with hereditary angioedema (HAE are more likely to be symptomatic that men. Hormonal factors (puberty, contraception, pregnancy,.... play a significant role in the precipitation or worsening of the condition in women. So, combined contraceptive pills are not indicated and progestogen pill must be preferred. During pregnancy, attack rate can increase (38-48% of women. C1Inhibitor concentrate and tranexamic acid can be used during pregnancy. Attenuated androgens for long term prophylaxis are effective but side effects appear more often in female patients. These side effects are dose dependant and can be attenuated by titrating the dose down the lowest effective level.

  2. Management of acute attacks of hereditary angioedema: potential role of icatibant

    Directory of Open Access Journals (Sweden)

    Hilary J Longhurst

    2010-09-01

    Full Text Available Hilary J LonghurstDepartment of Immunology, Barts and The London NHS Trust, London, UKAbstract: Icatibant (Firazyr® is a novel subcutaneous treatment recently licensed in the European Union for acute hereditary angioedema. Hereditary angioedema, resulting from inherited partial C1 inhibitor deficiency, is a disabling condition characterized by intermittent episodes of bradykinin-mediated angioedema. Icatibant blocks bradykinin B2 receptors, attenutating the episode. Randomized double-blind, placebo-controlled trials of icatibant, showed significant superiority over oral tranexamic acid in 74 European patients and a trend to improvement in a similar US trial comparing icatibant with placebo in 55 patients. Outcomes for several endpoints did not reach significance in the US trial, perhaps because of low participant numbers and confounding factors: a further trial is planned. Open label studies have shown benefit in multiple treatments for attacks at all sites. Approximately 10% of patients require a second dose for re-emergent symptoms, usually 10 to 27 hours after the initial treatment. Its subcutaneous route of administration, good tolerability and novel mode of action make icatibant a promising addition to the limited repertoire of treatments for hereditary angioedema.Keywords: hereditary angioedema, bradykinin, icatibant, C1 inhibitor deficiency

  3. Burden of Illness in Hereditary Angioedema

    DEFF Research Database (Denmark)

    Bygum, Anette; Aygören-Pürsün, Emel; Beusterien, Kathleen;

    2015-01-01

    The objective of the Hereditary Angioedema Burden of Illness Study in Europe was to assess the real-world experience of HAE from the patient perspective. Based on open-ended qualitative interviews with 30 patients from Spain, Germany and Denmark, 5 key themes emerged characterizing the impact...... of HAE on health-related quality of life (HRQoL): (i) unnecessary treatments and procedures, (ii) symptom triggers, (iii) attack impacts, (iv) caregiver impacts, and (v) long-term impacts. Patients for example experienced unnecessary medical procedures due to diagnostic delays, anxiety and fear about...... attacks, and passing HAE to children, reduced work/school productivity, and limited career/educational achievement. Patient caregivers also experienced worry and work/activity interruption during the attacks. In conclusion, a conceptual model was developed illustrating the hypothesized relationships among...

  4. Pediatric Hereditary Angioedema: Onset, Diagnostic Delay, and Disease Severity.

    Science.gov (United States)

    Christiansen, Sandra C; Davis, Donna K; Castaldo, Anthony J; Zuraw, Bruce L

    2016-09-01

    Hereditary angioedema (HAE) typically presents in childhood. Large gaps remain in our understanding of the natural history of HAE during childhood. We examined age of onset, delay in diagnosis, androgen exposure, and their influence on ultimate disease severity in a large cohort of patients with HAE. Median age of first swelling was 11 years with a median age at diagnosis of 19 years. Earlier onset of symptoms correlated with longer delays in diagnosis (P < .001) and predicted a more severe disease course, including increased number of attacks per year (P = .0009) and hospital admissions (P = .009). Earlier age of onset also significantly correlated with increased perceived HAE severity (P = .0002), negative overall life impact (P < .0001), and use of anabolic androgen. Our observations highlight the importance of early HAE diagnosis and suggest the necessity of a disease management plan once the diagnosis has been made. PMID:26581355

  5. Novel Vasoregulatory Aspects of Hereditary Angioedema: the Role of Arginine Vasopressin, Adrenomedullin and Endothelin-1.

    Science.gov (United States)

    Kajdácsi, Erika; Jani, Péter K; Csuka, Dorottya; Varga, Lilian; Prohászka, Zoltán; Farkas, Henriette; Cervenak, László

    2016-02-01

    The elevation of bradykinin (BK) level during attacks of hereditary angioedema due to C1-Inhibitor deficiency (C1-INH-HAE) is well known. We previously demonstrated that endothelin-1 (ET-1) level also increases during C1-INH-HAE attacks. Although BK and ET-1 are both potent vasoactive peptides, the vasoregulatory aspect of the pathomechanism of C1-INH-HAE has not yet been investigated. Hence we studied the levels of vasoactive peptides in controls and in C1-INH-HAE patients, as well as evaluated their changes during C1-INH-HAE attacks. The levels of arginine vasopressin (AVP), adrenomedullin (ADM) and ET-1 were measured in the plasma of 100 C1-INH-HAE patients in inter-attack periods and of 111 control subjects, using BRAHMS Kryptor technologies. In 18 of the 100 C1-INH-HAE patients, the levels of vasoactive peptides were compared in blood samples obtained during attacks, or in inter-attack periods. AVP, ADM and ET-1 levels were similar in inter-attack samples from C1-INH-HAE patients and in the samples of controls, although cardiovascular risk has an effect on the levels of vasoactive peptides in both groups. The levels of all three vasoactive peptides increased during C1-INH-HAE attacks. Moreover, the levels of ET-1 and ADM as well as their changes during attacks were significantly correlated. This study demonstrated that vascular regulation by vasoactive peptides is affected during C1-INH-HAE attacks. Our results suggest that the cooperation of several vasoactive peptides may be necessary to counterbalance the actions of excess BK, and to terminate the attacks. This may reveal a novel pathophysiological aspect of C1-INH-HAE.

  6. C-reactive protein levels in hereditary angioedema.

    Science.gov (United States)

    Hofman, Z L M; Relan, A; Hack, C E

    2014-07-01

    Hereditary angioedema (HAE) patients experience recurrent episodes of angioedema attacks that can be painful, disfiguring and even life-threatening. The disorder results from a mutation in the gene that controls the synthesis of C1-inhibitor (C1INH). C1INH is a major regulator of activation of the contact system. It is often assumed that attacks results from uncontrolled local activation of the contact system with subsequent formation of bradykinin. To evaluate the involvement of inflammatory reactions in HAE, we analysed C-reactive protein (CRP) levels. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. For the current study we analysed CRP levels when patients were asymptomatic, during a clinical attack and in a follow-up period, and correlated these with the clinical manifestations of the attack. Data from 68 HAE patients were analysed and included CRP levels on 273 occasions. While asymptomatic, 20% of the patients analysed had increased CRP. At the onset of the attack (P = 0·049) and during the next 24 h CRP rose significantly (P = 0·002) in patients with an abdominal location, and post-attack levels were significantly higher in these patients than in patients with attacks at other locations (P = 0·034). In conclusion, CRP levels are elevated in a substantial proportion of asymptomatic HAE patients. Levels of CRP increase significantly during an abdominal attack. These data suggest low-grade systemic inflammatory reactions in HAE patients as well as a triggering event for attacks that starts prior to symptom onset.

  7. Hereditary and acquired angioedema: problems and progress: proceedings of the third C1 esterase inhibitor deficiency workshop and beyond.

    Science.gov (United States)

    Agostoni, Angelo; Aygören-Pürsün, Emel; Binkley, Karen E; Blanch, Alvaro; Bork, Konrad; Bouillet, Laurence; Bucher, Christoph; Castaldo, Anthony J; Cicardi, Marco; Davis, Alvin E; De Carolis, Caterina; Drouet, Christian; Duponchel, Christiane; Farkas, Henriette; Fáy, Kálmán; Fekete, Béla; Fischer, Bettina; Fontana, Luigi; Füst, George; Giacomelli, Roberto; Gröner, Albrecht; Hack, C Erik; Harmat, George; Jakenfelds, John; Juers, Mathias; Kalmár, Lajos; Kaposi, Pál N; Karádi, István; Kitzinger, Arianna; Kollár, Tímea; Kreuz, Wolfhart; Lakatos, Peter; Longhurst, Hilary J; Lopez-Trascasa, Margarita; Martinez-Saguer, Inmaculada; Monnier, Nicole; Nagy, István; Németh, Eva; Nielsen, Erik Waage; Nuijens, Jan H; O'grady, Caroline; Pappalardo, Emanuela; Penna, Vincenzo; Perricone, Carlo; Perricone, Roberto; Rauch, Ursula; Roche, Olga; Rusicke, Eva; Späth, Peter J; Szendei, George; Takács, Edit; Tordai, Attila; Truedsson, Lennart; Varga, Lilian; Visy, Beáta; Williams, Kayla; Zanichelli, Andrea; Zingale, Lorenza

    2004-09-01

    Hereditary angioedema (HAE), a rare but life-threatening condition, manifests as acute attacks of facial, laryngeal, genital, or peripheral swelling or abdominal pain secondary to intra-abdominal edema. Resulting from mutations affecting C1 esterase inhibitor (C1-INH), inhibitor of the first complement system component, attacks are not histamine-mediated and do not respond to antihistamines or corticosteroids. Low awareness and resemblance to other disorders often delay diagnosis; despite availability of C1-INH replacement in some countries, no approved, safe acute attack therapy exists in the United States. The biennial C1 Esterase Inhibitor Deficiency Workshops resulted from a European initiative for better knowledge and treatment of HAE and related diseases. This supplement contains work presented at the third workshop and expanded content toward a definitive picture of angioedema in the absence of allergy. Most notably, it includes cumulative genetic investigations; multinational laboratory diagnosis recommendations; current pathogenesis hypotheses; suggested prophylaxis and acute attack treatment, including home treatment; future treatment options; and analysis of patient subpopulations, including pediatric patients and patients whose angioedema worsened during pregnancy or hormone administration. Causes and management of acquired angioedema and a new type of angioedema with normal C1-INH are also discussed. Collaborative patient and physician efforts, crucial in rare diseases, are emphasized. This supplement seeks to raise awareness and aid diagnosis of HAE, optimize treatment for all patients, and provide a platform for further research in this rare, partially understood disorder.

  8. Hereditary angioedema: epidemiology, management, and role of icatibant

    Directory of Open Access Journals (Sweden)

    Ghazi A

    2013-05-01

    Full Text Available Aasia Ghazi, J Andrew GrantUniversity of Texas Medical Branch, Division of Allergy and Clinical Immunology, Galveston, TX, USAAbstract: Hereditary angioedema (HAE is an autosomal dominant, potentially life-threatening condition, manifesting as recurrent and self-limiting episodes of facial, laryngeal, genital, or peripheral swelling with abdominal pain secondary to intra-abdominal edema. The estimated prevalence of HAE in the general population is one individual per 50,000, with reported ranges from 1:10,000 to 1:150,000, without major sex or ethnic differences. Various treatment options for acute attacks and prophylaxis of HAE are authorized and available in the market, including plasma-derived (Berinert®, Cinryze®, and Cetor® and recombinant (Rhucin® and Ruconest™ C1 inhibitors, kallikrein inhibitor-ecallantide (Kalbitor®, and bradykinin B2 receptor antagonist-icatibant (Firazyr®. Some of these drugs are used only to treat HAE attacks, whereas others are only approved for prophylactic therapies and all of them have improved disease outcomes due to their different mechanisms of action. Bradykinin and its binding to B2 receptor have been demonstrated to be responsible for most of the symptoms of HAE. Thus icatibant (Firazyr®, a bradykinin B2 receptor antagonist, has proven to be an effective and more targeted treatment option and has been approved for the treatment of acute attacks of HAE. Rapid and stable relief from symptoms of cutaneous, abdominal, or laryngeal HAE attacks has been demonstrated by 30 mg of icatibant in Phase III clinical trials. Self-resolving mild to moderate local site reactions after subcutaneous injection of icatibant were observed. Icatibant is a new, safe, and effective treatment for acute attacks of HAE. HAE has been reported to result in enormous humanistic burden to patients, affecting both physical and mental health, with a negative impact on education, career, and work productivity, and with substantial

  9. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    Directory of Open Access Journals (Sweden)

    Aygören-Pürsün E

    2016-09-01

    Full Text Available Emel Aygören-Pürsün,1 Anette Bygum,2 Kathleen Beusterien,3 Emily Hautamaki,4 Zlatko Sisic,5 Henrik B Boysen,6 Teresa Caballero7 1Angioedema Centre, Department for Children and Adolescents, University Hospital Frankfurt, Goethe University, Frankfurt, Germany; 2Hereditary Angioedema Centre Denmark, Department of Dermatology and Allergy Centre, Odense University Hospital, Odense, Denmark; 3Outcomes Research Strategies in Health, Washington, DC, 4Patient Reported Outcomes, Oxford Outcomes Inc., an ICON plc company, Bethesda, MD, USA; 5ViroPharma Incorporated, Chatsworth House, Maidenhead, UK; 6HAEi – Hereditary Angioedema International Patient Organization for C1 Inhibitor Deficiencies, Skanderborg, Denmark; 7Allergy Department, Hospital La Paz Institute for Health Research (IdiPaz, Biomedical Research Network on Rare Diseases U754 (CIBERER, University Hospital La Paz, Madrid, Spain Objective: To estimate health status utility (preference weights for hereditary angioedema (HAE during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe survey. Utility measures quantitatively describe the net impact of a condition on a patient’s life; a score of 0.0 reflects death and 1.0 reflects full health.Study design and methods: The HAE-BOIS-Europe was a cross-sectional survey conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE from the patient perspective. Survey items that overlapped conceptually with the EuroQol 5-Dimensions (EQ-5D domains (pain/discomfort, mobility, self-care, usual activities, and anxiety/depression were manually crosswalked to the corresponding UK population-based EQ-5D utility weights. EQ-5D utilities were computed for each respondent in the HAE-BOIS-Europe survey for acute attacks and between attacks.Results: Overall, a total of 111 HAE-BOIS-Europe participants completed all selected survey items and thus allowed for computation

  10. Pediatric hereditary angioedema due to C1-inhibitor deficiency

    Directory of Open Access Journals (Sweden)

    Farkas Henriette

    2010-07-01

    Full Text Available Abstract Hereditary angioedema (HAE resulting from the deficiency of the C1 inhibitor (C1-INH is a rare, life-threatening disorder. It is characterized by attacks of angioedema involving the skin and/or the mucosa of the upper airways, as well as the intestinal mucosa. In approximately 50 per cent of cases, clinical manifestations may appear during childhood. The complex management of HAE in pediatric patients is in many respects different from the management of adults. Establishing the diagnosis early, preferably before the onset of clinical symptoms, is essential in cases with a positive family history. Complement studies usually afford accurate diagnosis, whereas molecular genetics tests may prove helpful in uncertain cases. Appropriate therapy, supported by counselling, suitable modification of lifestyle, and avoidance of triggering factors (which primarily include mechanical trauma, mental stress and airway infections in children may spare the patient unnecessary surgery and may prevent mortality. Prompt control of edematous attacks, short-term prophylaxis and intermittent therapy are recommended as the primary means for the management of pediatric cases. Medicinal products currently used for the treatment of children with hereditary angioedema include antifibrinolytics, attenuated androgens, and C1-INH replacement therapy. Current guidelines favour antifibrinolytics for long-term prophylaxis because of their favorable safety profile but efficacy may be lacking. Attenuated androgens administered in the lowest effective dose are another option. C1-INH replacement therapy is also an effective and safe agent for children. Regular monitoring and follow-up of patients are necessary.

  11. Self-administered C1 esterase inhibitor concentrates for the management of hereditary angioedema: usability and patient acceptance

    Directory of Open Access Journals (Sweden)

    Li HH

    2016-09-01

    Full Text Available Huamin Henry Li Institute for Asthma and Allergy, Chevy Chase, MD, USA Abstract: Hereditary angioedema (HAE is a rare genetic disease characterized by episodic subcutaneous or submucosal swelling. The primary cause for the most common form of HAE is a deficiency in functional C1 esterase inhibitor (C1-INH. The swelling caused by HAE can be painful, disfiguring, and life-threatening. It reduces daily function and compromises the quality of life of affected individuals and their caregivers. Among different treatment strategies, replacement with C1-INH concentrates is employed for on-demand treatment of acute attacks and long-term prophylaxis. Three human plasma-derived C1-INH preparations are approved for HAE treatment in the US, the European Union, or both regions: Cinryze®, Berinert®, and Cetor®; however, only Cinryze is approved for long-term prophylaxis. Postmarketing studies have shown that home therapy (self-administered or administered by a caregiver is a convenient and safe option preferred by many HAE patients. In this review, we summarize the role of self-administered plasma-derived C1-INH concentrate therapy with Cinryze at home in the prophylaxis of HAE. Keywords: C1-INH concentrate, hereditary angioedema, disease management, first line, prophylaxis, self-administration 

  12. Treatment of Hereditary Angioedema: items that need to be addressed in practice parameter

    Directory of Open Access Journals (Sweden)

    Dagen Callie

    2010-05-01

    Full Text Available Abstract Background Hereditary Angioedema (HAE is a rare, autosomal dominant (AD disorder caused by a C1 esterase inhibitor (C1-inh deficiency or qualitative defect. Treatment of HAE in many parts of the world fall short and certain items need to be addressed in future guidelines. Objective To identify those individuals who should be on long-term prophylaxis for HAE. Additionally, to determine if prodromal symptoms are sensitive and specific enough to start treatment with C-1 INH and possibly other newly approved therapies. Also, to discuss who is appropriate to self-administer medications at home and to discuss training of such patients. Methods A literature review (PubMed and Google was performed and articles published in peer-reviewed journals, which addressed HAE prophylaxis, current HAE treatments, prodromal symptoms of HAE and self-administration of injected home medications were selected, reviewed and summarized. Results Individuals whom have a significant decrease in QOL or have frequent or severe attacks and who fail or are intolerant to androgens should be considered for long-term prophylaxis with C1INH. Prodromal symptoms are sensitive, but non-specific, and precede acute HAE attacks in the majority of patients. Although the treatment of prodromal symptoms could lead to occasional overtreatment, it could be a viable option for those patients able to adequately predict their attacks. Finally, self-administration, has been shown to be feasible, safe and effective for patients who require IV therapy for multiple other diseases to include, but not limited to, hemophilia. Conclusions Prophylactic therapy, treatment at the time of prodromal symptoms and self-administration at home all should allow a reduction in morbidity and mortality associated with HAE.

  13. Not all ACE inhibitor related angioedema is always evident: a case which is misdiagnosed as panic attack and speech disorder.

    Science.gov (United States)

    Gulec, M; Caliskaner, Z; Kartal, O; Erel, F; Karaayvaz, M

    2007-01-01

    Angiotensin-converting enzyme (ACE) inhibitors are the most common medications responsible for angioedema. Angioedema is a potentially life threatening conditions especially in geriatric age patients that they have take a several medications include ACE inhibitors and non steroidal anti inflammatory drugs. We present a case an ACE inhibitor induced angioedema that confused many clinical events. PMID:18047821

  14. New therapies for hereditary angioedema: disease outlook changes dramatically.

    Science.gov (United States)

    Frank, Michael M; Jiang, Haixiang

    2008-01-01

    Hereditary angioedema (HAE) is an autosomal dominant disease associated with episodic attacks of nonpitting edema that may affect any external or mucosal body surface. Attacks most often affect the extremities, causing local swelling, the GI tract, leading to severe abdominal pain, and the mouth and throat, at times causing asphyxiation. Most patients with HAE have low levels of the plasma serine protease inhibitor C1 inhibitor. The edema in these patients is caused by unregulated generation of bradykinin. Effective chronic therapy of patients with impeded androgens or plasmin inhibitors has been available for decades, but in the United States, we do not have therapy for acute attacks. Five companies have completed or are in the process of conducting phase 3 clinical trials, double-blind, placebo-controlled studies of products designed to terminate acute attacks or to be used in prophylaxis. Two companies, Lev Pharmaceuticals and CSL Behring, have preparations of C1 inhibitor purified from plasma that have been used in Europe for decades (trade names Cinryze and Berinert P, respectively). One company, Pharming, has developed a recombinant C1 inhibitor preparation. One company, Dyax, is testing a kallikrein inhibitor (ecallantide), and one company, Jerini, is completing testing of a bradykinin type 2 receptor antagonist (Icatibant). Although little has been published thus far, all of these products may prove effective. It is likely that HAE treatment will change dramatically within the next few years. PMID:18206518

  15. New therapies for hereditary angioedema: disease outlook changes dramatically.

    Science.gov (United States)

    Frank, Michael M; Jiang, Haixiang

    2008-01-01

    Hereditary angioedema (HAE) is an autosomal dominant disease associated with episodic attacks of nonpitting edema that may affect any external or mucosal body surface. Attacks most often affect the extremities, causing local swelling, the GI tract, leading to severe abdominal pain, and the mouth and throat, at times causing asphyxiation. Most patients with HAE have low levels of the plasma serine protease inhibitor C1 inhibitor. The edema in these patients is caused by unregulated generation of bradykinin. Effective chronic therapy of patients with impeded androgens or plasmin inhibitors has been available for decades, but in the United States, we do not have therapy for acute attacks. Five companies have completed or are in the process of conducting phase 3 clinical trials, double-blind, placebo-controlled studies of products designed to terminate acute attacks or to be used in prophylaxis. Two companies, Lev Pharmaceuticals and CSL Behring, have preparations of C1 inhibitor purified from plasma that have been used in Europe for decades (trade names Cinryze and Berinert P, respectively). One company, Pharming, has developed a recombinant C1 inhibitor preparation. One company, Dyax, is testing a kallikrein inhibitor (ecallantide), and one company, Jerini, is completing testing of a bradykinin type 2 receptor antagonist (Icatibant). Although little has been published thus far, all of these products may prove effective. It is likely that HAE treatment will change dramatically within the next few years.

  16. Hereditary Angioedema and Gastrointestinal Complications: An Extensive Review of the Literature

    Science.gov (United States)

    Patel, Napoleon; Suarez, Lisbet D.; Kapur, Sakshi; Bielory, Leonard

    2015-01-01

    Hereditary Angioedema (HAE) is a rare autosomal dominant (AD) disease characterized by deficient (type 1) or nonfunctional (type 2) C1 inhibitor protein. The disorder is associated with episodes of angioedema of the face, larynx, lips, abdomen, or extremities. The angioedema is caused by the activation of the kallikrein-kinin system that leads to the release of vasoactive peptides, followed by edema, which in severe cases can be life threatening. The disease is usually not diagnosed until late adolescence and patients tend to have frequent episodes that can be severely impairing and have a high incidence of morbidity. Gastrointestinal involvement represents up to 80% of clinical presentations that are commonly confused with other gastrointestinal disorders such as appendicitis, cholecystitis, pancreatitis, and ischemic bower. We present a case of an HAE attack presenting as colonic intussusception managed conservatively with a C1 esterase inhibitor. Very few cases have been reported in the literature of HAE presentation in this manner, and there are no reports of any nonsurgical management of these cases. PMID:26339513

  17. Angioedema Related to Angiotensin-Converting Enzyme Inhibitors: Attack Severity, Treatment, and Hospital Admission in a Prospective Multicenter Study.

    Science.gov (United States)

    Javaud, Nicolas; Achamlal, Jallal; Reuter, Paul-George; Lapostolle, Frédéric; Lekouara, Akim; Youssef, Mustapha; Hamza, Lilia; Karami, Ahmed; Adnet, Frédéric; Fain, Olivier

    2015-11-01

    The number of cases of acquired angioedema related to angiotensin converting enzyme inhibitors induced (ACEI-AAE) is on the increase, with a potential concomitant increase in life-threatening attacks of laryngeal edema. Our objective was to determine the main characteristics of ACEI-AAE attacks and, in doing so, the factors associated with likelihood of hospital admission from the emergency department (ED) after a visit for an attack.A prospective, multicenter, observational study (April 2012-December 2014) was conducted in EDs of 4 French hospitals in collaboration with emergency services (SAMU 93) and a reference center for bradykinin-mediated angioedema. For each patient presenting with an attack, emergency physicians collected demographic and clinical presentation data, treatments, and clinical course. They recorded time intervals from symptom onset to ED arrival and to treatment decision, from ED arrival to specific treatment with plasma-derived C1-inhibitor (C1-INH) or icatibant, and from specific treatment to onset of symptom relief. Attacks requiring hospital admission were compared with those not requiring admission.Sixty-two eligible patients with ACEI-AAE (56% men, median age 63 years) were included. Symptom relief occurred significantly earlier in patients receiving specific treatment than in untreated patients (0.5 [0.5-1.0] versus 3.9 [2.5-7.0] hours; P patients, 27 (44%) were admitted to hospital from the ED. In multivariate analysis, laryngeal involvement and progressive swelling at ED arrival were independently associated with admission (Odds ratio [95% confidence interval] = 6.2 [1.3-28.2] and 5.9 [1.3-26.5], respectively). A favorable course was observed in all patients. Three patients (5%) experienced a recurrence after angiotensin-converting enzyme inhibitor discontinuation after a median follow-up of 18 (11-30) months.Two severity criteria-laryngeal edema and the progression of the edema-were independent factors associated with

  18. The humanistic burden of hereditary angioedema

    DEFF Research Database (Denmark)

    Caballero, Teresa; Aygören-Pürsün, Emel; Bygum, Anette;

    2014-01-01

    extremities; 24% experienced an attack in more than one site. The impact of HAE on daily activities was high during attacks and did not vary significantly by body site affected; patients also reported that HAE impacted their daily activities between attacks. Patients reported substantial anxiety about future...... attacks, traveling, and passing HAE to their children. Based on Hospital Anxiety and Depression Scale scores, 38 and 14% had clinically meaningful anxiety and depression, respectively. Despite standard of care, HAE patients still have frequent and painful attacks. Patients experience substantial...

  19. rhC1INH: a new drug for the treatment of attacks in hereditary angioedema caused by C1-inhibitor deficiency.

    Science.gov (United States)

    Varga, Lilian; Farkas, Henriette

    2011-03-01

    Recombinant human C1 esterase inhibitor (rhC1INH) (Ruconest(®), Pharming) is a new drug developed for the relief of symptoms occurring in patients with angioedema due to C1-inhibitor deficiency. Pertinent results have already been published elsewhere; this article summarizes the progress made since then. Similar to the purified C1-inhibitor derived from human plasma, the therapeutic efficacy of rhC1INH results from its ability to block the actions of enzymes belonging to the overactivated bradykinin-forming pathway, at multiple locations. During clinical trials into the management of acute edema, a total of 190 subjects received recombinant C1-inhibitor by intravenous infusion on 714 occasions altogether. Dose-ranging efficacy studies established 50 U/kg as the recommended dose, and demonstrated the effectiveness of this agent in all localizations of hereditary angioedema attacks. Studies into the safety of rhC1INH based on 300 administrations to healthy subjects or hereditary angioedema patients followed-up for 90 days have not detected the formation of autoantibodies against rhC1INH or IgE antibodies directed against rabbit proteins, even after repeated administration on multiple occasions. These findings met favorable appraisal by the EMA, which granted European marketing authorization for rhC1INH. Pharming is expected to file a biological licence with the US FDA by the end of 2010 to obtain marketing approval in the USA. The launch of rhC1INH onto the pharmaceutical market may represent an important progress in the management of hereditary angioedema patients. PMID:21426252

  20. rhC1INH: a new drug for the treatment of attacks in hereditary angioedema caused by C1-inhibitor deficiency.

    Science.gov (United States)

    Varga, Lilian; Farkas, Henriette

    2011-03-01

    Recombinant human C1 esterase inhibitor (rhC1INH) (Ruconest(®), Pharming) is a new drug developed for the relief of symptoms occurring in patients with angioedema due to C1-inhibitor deficiency. Pertinent results have already been published elsewhere; this article summarizes the progress made since then. Similar to the purified C1-inhibitor derived from human plasma, the therapeutic efficacy of rhC1INH results from its ability to block the actions of enzymes belonging to the overactivated bradykinin-forming pathway, at multiple locations. During clinical trials into the management of acute edema, a total of 190 subjects received recombinant C1-inhibitor by intravenous infusion on 714 occasions altogether. Dose-ranging efficacy studies established 50 U/kg as the recommended dose, and demonstrated the effectiveness of this agent in all localizations of hereditary angioedema attacks. Studies into the safety of rhC1INH based on 300 administrations to healthy subjects or hereditary angioedema patients followed-up for 90 days have not detected the formation of autoantibodies against rhC1INH or IgE antibodies directed against rabbit proteins, even after repeated administration on multiple occasions. These findings met favorable appraisal by the EMA, which granted European marketing authorization for rhC1INH. Pharming is expected to file a biological licence with the US FDA by the end of 2010 to obtain marketing approval in the USA. The launch of rhC1INH onto the pharmaceutical market may represent an important progress in the management of hereditary angioedema patients.

  1. Activation of the ficolin-lectin pathway during attacks of hereditary angioedema

    DEFF Research Database (Denmark)

    Csuka, Dorottya; Munthe-Fog, Lea; Hein, Estrid;

    2014-01-01

    enrolled. We analyzed blood samples drawn during attacks, and obtained 35 samples from the same patients during symptom-free periods. The serum levels of ficolin-2, ficolin-3, MASP-2, ficolin-3/MASP-2 complex, C1-INH, and C4, as well as the extent of ficolin-3-mediated terminal complement complex (FCN3-TCC......) deposition, were measured using ELISA-based methods. RESULTS: Levels of MASP-2 and of the ficolin-3/MASP-2 complex were elevated (P TCC was lower (P TCC...

  2. Idiopathic Thrombocytopenic Purpura Misdiagnosed as Hereditary Angioedema

    DEFF Research Database (Denmark)

    Andersen, Michelle Fog; Bygum, Anette

    2015-01-01

    Hereditary angioedema is a rare, but potentially life-threatening genetic disorder that results from an autosomal dominant trait. It is characterized by acute, recurrent attacks of severe local edema, most commonly affecting the skin and mucosa. Swelling in hereditary angioedema patients does...... of hereditary angioedema. The case illustrates how clinicians can have difficulties in handling patients with rare diseases, especially in the emergency care setting....

  3. Self-administration of intravenous C1-inhibitor therapy for hereditary angioedema and associated quality of life benefits

    DEFF Research Database (Denmark)

    Bygum, Anette; Andersen, Klaus Ejner; Mikkelsen, Carsten Sauer

    2009-01-01

    Hereditary angioedema (HAE) is often debilitating with a serious effect on quality of life (QOL). Treatment of acute HAE attacks is usually with C1 esterase inhibitor (C1-INH) concentrates; however, treatment can be delayed by patients' travel time for attending emergency units. We assessed...... the Dermatology Life Quality Index (DLQI) and 36-Item Short Form Survey (SF-36) questionnaires. Seven patients were recruited into the study. QOL was assessed at baseline and after 3 to 48 months of home therapy. The mean DLQI score fell from 12.6 +/- 4.65 to 2.7 +/- 1.38 (P ... for the individual and combined components also improved significantly. No serious complications were documented during a follow-up period of 27 to 72 months. Self-administration of C1-INH improved QOL on both physical and psychological parameters. Patients were able to resume a normal life without restrictions...

  4. Fresh Frozen Plasma for the Treatment of a Chinese Patient with Hereditary Angioedema

    Institute of Scientific and Technical Information of China (English)

    Rui Tang; Hong-yu Zhang; Jia Gan

    2009-01-01

    HEREDITARY angioedema (HAE) is an autosomal dominant inherited condition which was initially described by Osier in 1888.~1 Patients with HAE can develop rapid subcutaneous or submucosal edema involving the hands, feet, limbs, face, intestinal tract, even larynx and trachea.

  5. Disease expression in women with hereditary angioedema

    DEFF Research Database (Denmark)

    Bouillet, Laurence; Longhurst, Hilary; Boccon-Gibod, Isabelle;

    2008-01-01

    OBJECTIVE: Fluctuations in sex hormones can trigger angioedema attacks in women with hereditary angioedema. Combined oral contraceptive therapies, as well as pregnancy, can induce severe attacks. The course of angioedema may be very variable in different women. STUDY DESIGN: Within the PREHAEAT...... project launched by the European Union, data on 150 postpubertal women with hereditary angioedema were collected in 8 countries, using a patient-based questionnaire. RESULTS: Puberty worsened the disease for 62%. Combined oral contraceptives worsened the disease for 79%, whereas progestogen-only pills...... improved it for 64%. During pregnancies, 38% of women had more attacks, but 30% had fewer attacks. Vaginal delivery was usually uncomplicated. Attacks occurred within 48 hours in only 6% of cases. Those more severely affected during menses had more symptoms during pregnancies, suggesting a hormone...

  6. Gastrointestinal Manifestations of Hereditary Angioedema Diagnosed by Ultrasound in the Emergency Department

    Directory of Open Access Journals (Sweden)

    Christine Riguzzi

    2014-11-01

    Full Text Available Abdominal angioedema is a less recognized type of angioedema, which can occur in patients with hereditary angioedema (HAE. The clinical signs may range from subtle, diffuse abdominal pain and nausea, to overt peritonitis. We describe two cases of abdominal angioedema in patients with known HAE that were diagnosed in the emergency department by point-of-care (POC ultrasound. In each case, the patient presented with isolated abdominal complaints and no signs of oropharyngeal edema. Findings on POC ultrasound included intraperitoneal free fluid and bowel wall edema. Both patients recovered uneventfully after receiving treatment. Because it can be performed rapidly, requires no ionizing radiation,and can rule out alternative diagnoses, POC ultrasound holds promise as a valuable tool in the evaluation and management of patients with HAE. [West J Emerg Med. 2014;15(7:-0.

  7. Socioeconomic burden of hereditary angioedema

    DEFF Research Database (Denmark)

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen;

    2014-01-01

    who were working or in school (n = 120), 72 provided work/school absenteeism data, resulting in an estimated 20 days missing from work/school on average per year; 51% (n = 84) indicated that HAE has hindered their career/educational advancement. CONCLUSION: HAE poses a considerable burden on patients...... the past 6 months. A regression model examined predictors of medical resource utilization. RESULTS: Overall, 164 patients had an attack in the past 6 months and were included in the analysis. The most significant predictor of medical resource utilization was the severity of the last attack (OR 2.6; p ....001). Among patients who sought medical care during the last attack (23%), more than half utilized the emergency department. The last attack prevented patients from their normal activities an average of 4-12 hours. Patient and caregiver absenteeism increased with attack severity and frequency. Among patients...

  8. Psychometric Field Study of Hereditary Angioedema Quality of Life Questionnaire for Adults

    DEFF Research Database (Denmark)

    Prior, Nieves; Remor, Eduardo; Pérez-Fernández, Elia;

    2016-01-01

    BACKGROUND: Hereditary angioedema due to C1 inhibitor deficiency (C1-INH-HAE) may affect health-related quality of life (HRQoL). A specific HRQoL questionnaire for adult patients with C1-INH-HAE, the HAE-QoL, has recently been developed in Spain. OBJECTIVE: The objective of this study was to perf......BACKGROUND: Hereditary angioedema due to C1 inhibitor deficiency (C1-INH-HAE) may affect health-related quality of life (HRQoL). A specific HRQoL questionnaire for adult patients with C1-INH-HAE, the HAE-QoL, has recently been developed in Spain. OBJECTIVE: The objective of this study...... was to perform a cross-cultural validation and psychometric study of the HAE-QoL in an international setting. METHODS: Cross-cultural adaptation of the Spanish HAE-QoL draft version and an international rating phase with experts were performed. The resultant version of the HAE-QoL, a clinical questionnaire...

  9. Obstetrical Complications and Outcome in Two Families with Hereditary Angioedema due to Mutation in the F12 Gene

    Directory of Open Access Journals (Sweden)

    Olivier Picone

    2010-01-01

    Full Text Available Backgroud. Hereditary angioedema (HAE is characterized by recurrent swelling of the skin, the abdomen (causing severe acute pain, and the airways. A recently discovered type caused by mutations in the factor XII gene (designated as HAE type III occurs mainly in women. Estrogens may play an important role, but few obstetrical complications have been reported. Case. We report the symptoms and obstetrical complications of women in two families with HAE attributable to the p. Thr328Lys mutation in the F12 gene. Clinical manifestations included acute and severe maternal abdominal pain, with transient ascites, laryngeal edema, and fetal and neonatal deaths. Patients had normal C4 levels and a normal C1 inhibitor gene. Administration of C1-inhibitor concentration twice monthly decreased the attack rate in one mother, and its predelivery administration (1000 U led to the delivery of healthy girls. Conclusions. Obstetricians and anesthesiologists should be aware of this rare cause of unexplained maternal ascites and in utero or fetal death associated with edema.

  10. Management of hereditary angioedema in pregnant women: a review

    Directory of Open Access Journals (Sweden)

    Caballero T

    2014-09-01

    Full Text Available Teresa Caballero,1,2 Julio Canabal,1 Daniela Rivero-Paparoni,1 Rosario Cabañas1 1Hospital La Paz Institute for Health Research, (IdiPaz 2Biomedical Research Network on Rare Diseases-U754 (CIBERER, Madrid, Spain Abstract: Three types of hereditary angioedema (HAE have been described: two are due to C1 inhibitor (C1-INH deficiency (C1-INH-HAE types I and II and one is characterized by normal C1-INH (nC1-INH-HAE. The management of pregnancy in patients with HAE is often a clinical challenge owing to potential worsening of the disease in relation to the physiological increase in estrogens and the limited treatment options. This review addresses the potential influence of pregnancy on the clinical severity of hereditary angioedema and the management of this disease during pregnancy with currently available treatments. Keywords: hereditary angioedema, pregnancy, female, treatment, C1 inhibitor concentrate, tranexamic acid

  11. Acute dystonia mimicking angioedema of the tongue

    DEFF Research Database (Denmark)

    Rasmussen, Eva Rye; Pallesen, Kristine A U; Bygum, Anette

    2013-01-01

    We report a case of acute dystonia of the face, jaw and tongue caused by metoclopramide and mimicking angioedema. The patient had attacks for several years before the correct diagnosis was made and we present the first ever published video footage of an attack. This adverse drug reaction is known...

  12. 2010 International consensus algorithm for the diagnosis, therapy and management of hereditary angioedema

    Directory of Open Access Journals (Sweden)

    Bowen Tom

    2010-07-01

    Full Text Available Abstract Background We published the Canadian 2003 International Consensus Algorithm for the Diagnosis, Therapy, and Management of Hereditary Angioedema (HAE; C1 inhibitor [C1-INH] deficiency and updated this as Hereditary angioedema: a current state-of-the-art review: Canadian Hungarian 2007 International Consensus Algorithm for the Diagnosis, Therapy, and Management of Hereditary Angioedema. Objective To update the International Consensus Algorithm for the Diagnosis, Therapy and Management of Hereditary Angioedema (circa 2010. Methods The Canadian Hereditary Angioedema Network (CHAEN/Réseau Canadien d'angioédème héréditaire (RCAH http://www.haecanada.com and cosponsors University of Calgary and the Canadian Society of Allergy and Clinical Immunology (with an unrestricted educational grant from CSL Behring held our third Conference May 15th to 16th, 2010 in Toronto Canada to update our consensus approach. The Consensus document was reviewed at the meeting and then circulated for review. Results This manuscript is the 2010 International Consensus Algorithm for the Diagnosis, Therapy and Management of Hereditary Angioedema that resulted from that conference. Conclusions Consensus approach is only an interim guide to a complex disorder such as HAE and should be replaced as soon as possible with large phase III and IV clinical trials, meta analyses, and using data base registry validation of approaches including quality of life and cost benefit analyses, followed by large head-to-head clinical trials and then evidence-based guidelines and standards for HAE disease management.

  13. Radiologic manifestations of angioedema

    OpenAIRE

    Ishigami, Kousei; Averill, Sarah L.; Pollard, Janet H.; McDonald, Joshua M.; Sato, Yutaka

    2014-01-01

    Objectives The purpose of this pictorial review is to present imaging findings of angioedema involving the various organs. Conclusion The role of imaging for patients with angioedema includes the evaluation of the upper airway for obstruction and the exclusion of other possible aetiologies, such as neoplastic or infectious processes. Glossomegaly is a common finding of head and neck angioedema. Angioedema may involve organ systems beyond the superficial regions and the head and neck including...

  14. 84 Immuno-Safety of Recombinant Human C1 Inhibitor in Patients With Hereditary Angioedema: An Integrated Analysis

    Science.gov (United States)

    Hack, Erik; Relan, Anurag; Kaufman, Leonard; Pijpstra, Rienk

    2012-01-01

    Background Recombinant C1 inhibitor (rhC1INH) is a novel therapeutic option for the treatment of acute angioedema attacks in patients with hereditary angioedema (HAE). The amino acid sequence of rhC1INH is identical to that of endogenous C1INH. However, any recombinant protein may elicit antibodies against the protein and/or host related impurities (HRI). Clinical consequences of these antibodies can theoretically range from no clinical symptoms to allergic reactions and reduced C1INH activity due to neutralizing antibodies. Objective To analyze the immuno-safety of rhC1INH in symptomatic patients with HAE. Methods Plasma samples were collected pre-treatment and 22 and 90 days post-treatment of an acute angioedema attack. Plasma samples were tested for the presence of antibodies against plasma-derived C1INH and rhC1INH using 6 different, validated enzyme-linked immunosorbent assays (ELISAs), to detect IgM, IgG and IgA antibodies against plasma-derived C1INH or rhC1INH. Antibodies against HRI in plasma samples were measured in an ELISA testing for all antibody classes. Plasma samples from normal healthy controls and HAE patients, never exposed to rhC1INH, were used to estimate cut off levels of the assays. Plasma samples with antibody levels above the cut-off level in the screening assays were tested in confirmatory displacement assay in case of anti-HRI antibodies and in an assay for neutralizing antibodies in case of antibodies against C1INH. Results Data from 155 symptomatic HAE patients having received a total of 424 administrations of rhC1INH were analyzed. The frequency of anti-C1INH antibody levels above the assay cut-off was low and similar in pre- and post-exposure samples (1.7 and 1.8%, respectively). Results above the assay cut-off were sporadic and transient. Occurrence of anti-C1INH antibodies did not correlate with repeated treatment or time since last treatment. No neutralizing antibodies were detected. A total of 5/155 (3%) rhC1INH-treated patients

  15. Urticaria and Prodromal Symptoms Including Erythema Marginatum in Danish Patients with Hereditary Angioedema

    DEFF Research Database (Denmark)

    Rasmussen, Eva R; Valente de Freitas, Priscila; Bygum, Anette

    2015-01-01

    Erythema marginatum is a characteristic skin rash seen in patients with hereditary angioedema (HAE); however, it can be confused with urticaria, leading to delay in correct diagnosis. The aim of this study was to clarify how often erythema marginatum is misinterpreted as urticaria, potentially...

  16. Recurrent angioedema and urticaria.

    OpenAIRE

    Bishop, P C; Wisnieski, J J; Christensen, J

    1993-01-01

    The case reported here illustrates the life-threatening aspects of angioedema and the need to thoroughly investigate the possible causes of this clinical finding. As discussed, the causes of angioedema are numerous. Commonly implicated in drug-induced angioedema are antihypertensive ACE inhibitor drugs, as was originally thought with this patient. Because of her skin lesions and macrocytic anemia, further studies were done. These studies led to a diagnosis of hypocomplementemic urticarial vas...

  17. Recurrent angioedema and urticaria.

    Science.gov (United States)

    Bishop, P C; Wisnieski, J J; Christensen, J

    1993-11-01

    The case reported here illustrates the life-threatening aspects of angioedema and the need to thoroughly investigate the possible causes of this clinical finding. As discussed, the causes of angioedema are numerous. Commonly implicated in drug-induced angioedema are antihypertensive ACE inhibitor drugs, as was originally thought with this patient. Because of her skin lesions and macrocytic anemia, further studies were done. These studies led to a diagnosis of hypocomplementemic urticarial vasculitis syndrome, an uncommon to rare form of acquired angioedema, urticarial vasculitis, arthritis, and obstructive airway disease associated with the production of autoantibodies to C1q. It is an autoimmune disorder related to but separate from SLE. PMID:8279170

  18. Clinical similarities among bradykinin-mediated and mast cell-mediated subtypes of non-hereditary angioedema : a retrospective study

    NARCIS (Netherlands)

    Schulkes, Karlijn J G; van den Elzen, Mignon T.; Hack, Erik C.; Otten, Henderikus G; Bruijnzeel-Koomen, Carla A.F.M.; Knulst, André C.

    2015-01-01

    BACKGROUND: Non-hereditary angioedema (non-HAE) is characterized by local swelling due to self-limiting, subcutaneous or submucosal extravasation of fluid, and can be divided into three subtypes. These subtypes are believed to have different pathophysiological backgrounds and are referred to in rece

  19. International consensus on the diagnosis and management of pediatric patients with hereditary angioedema with C1 inhibitor deficiency

    DEFF Research Database (Denmark)

    Farkas, H; Martinez-Saguer, I; Bork, K;

    2016-01-01

    BACKGROUND: The consensus documents published to date on hereditary angioedema with C1 inhibitor deficiency (C1-INH-HAE) have focused on adult patients. Many of the previous recommendations have not been adapted to pediatric patients. We intended to produce consensus recommendations for the diagn...

  20. Brazilian guidelines for the diagnosis and treatment of hereditary angioedema

    Directory of Open Access Journals (Sweden)

    Pedro Giavina-Bianchi

    2011-01-01

    Full Text Available Hereditary angioedema is an autosomal dominant disease characterized by edema attacks with multiple organ involvement. It is caused by a quantitative or functional deficiency of the C1 inhibitor, which is a member of the serine protease inhibitor family. Hereditary angioedema is unknown to many health professionals and is therefore an underdiagnosed disease. The causes of death from hereditary angioedema include laryngeal edema with asphyxia. The estimated mortality rate in patients in whom the disease goes undetected and who are therefore incorrectly treated is 25-40%. In addition to edema of the glottis, hereditary angioedema often results in edema of the gastrointestinal tract, which can be incapacitating. Patients with hereditary angioedema may undergo unnecessary surgical interventions because the digestive tract can be the primary or only organ system involved, thus mimicking acute surgical abdomen. It is estimated that patients with hereditary angioedema experience some degree of disability 20-100 days per year. The Experts in Clinical Immunology and Allergy of the "Associação Brasileira de Alergia e Imunopatologia -ASBAI" developed these guidelines for the diagnosis, therapy, and management of hereditary angioedema.

  1. International consensus and practical guidelines on the gynecologic and obstetric management of female patients with hereditary angioedema caused by C1 inhibitor deficiency

    DEFF Research Database (Denmark)

    Caballero, Teresa; Farkas, Henriette; Bouillet, Laurence;

    2012-01-01

    BACKGROUND: There are a limited number of publications on the management of gynecologic/obstetric events in female patients with hereditary angioedema caused by C1 inhibitor deficiency (HAE-C1-INH). OBJECTIVE: We sought to elaborate guidelines for optimizing the management of gynecologic/obstetri...... patients, genetic counseling, infertility, abortion, lactation, menopause treatment, and endometrial cancer. CONCLUSIONS: A consensus for the management of female patients with HAE-C1-INH is presented....

  2. A novel assay to diagnose hereditary angioedema utilizing inhibition of bradykinin-forming enzymes

    DEFF Research Database (Denmark)

    Joseph, Kusumam; Bains, Sonia; Tholanikunnel, Baby G;

    2015-01-01

    BACKGROUND: Hereditary angioedema types I and II are caused by a functional deficiency of C1 inhibitor (C1-INH) leading to overproduction of bradykinin. The current functional diagnostic assays employ inhibition of activated C1s, however, an alternative, more physiologic method, is desirable...... samples were considered equivocal (4 controls and 38 patients). CONCLUSIONS: Diagnosis of HAE types I and II can be ascertained by inhibition of enzymes of the bradykinin-forming cascade; namely, factor XIIa and kallikrein. Either method yields functional C1-INH levels in HAE patients (types I & II...

  3. Angioedema hereditario: Guía de tratamiento

    Directory of Open Access Journals (Sweden)

    Alejandro Malbrán

    2012-04-01

    Full Text Available El angioedema hereditario (HAE es una enfermedad rara, autosómica dominante, caracterizada por episodios que comprometen la piel, el tracto gastrointestinal y la laringe. Tiene una mortalidad histórica por asfixia del 15 al 50%. Es producida por la deficiencia funcional del C1 inhibidor. La identificación de la bradiquinina como mediador principal ha estimulado el desarrollo de nuevos medicamentos para tratar la enfermedad. El tratamiento del HAE se establece en consensos internacionales. El desarrollo de guías para el tratamiento de la enfermedad permite ordenar el uso de procedimientos diagnósticos y drogas. Describimos aquí algunas características farmacológicas de los medicamentos utilizados en el tratamiento del HAE en la Argentina: el concentrado plasmático de C1 inhibidor, el antagonista de la bradiquinina, icatibant, el andrógeno atenuado danazol y los agentes anti-fibrinolíticos ácidos épsilon aminocaproico (EACA y tranexámico. Asimismo, se describe su forma de uso y del control de los eventos adversos más frecuentes, así como las recomendaciones del último consenso internacional, aplicables para conformar una primera guía de tratamiento del HAE en la Argentina.

  4. Angioedema Related to Angiotensin-Converting Enzyme Inhibitors

    OpenAIRE

    Javaud, Nicolas; Achamlal, Jallal; Reuter, Paul-George; Lapostolle, Frédéric; Lekouara, Akim; Youssef, Mustapha; Hamza, Lilia; Karami, Ahmed; Adnet, Frédéric; Fain, Olivier

    2015-01-01

    Abstract The number of cases of acquired angioedema related to angiotensin converting enzyme inhibitors induced (ACEI-AAE) is on the increase, with a potential concomitant increase in life-threatening attacks of laryngeal edema. Our objective was to determine the main characteristics of ACEI-AAE attacks and, in doing so, the factors associated with likelihood of hospital admission from the emergency department (ED) after a visit for an attack. A prospective, multicenter, observational study (...

  5. [Histaminergic angioedema and chronic urticaria].

    Science.gov (United States)

    Hacard, Florence; Nosbaum, Audrey; Bensaid, Benoit; Nicolas, Jean-François; Augey, Frédéric; Goujon, Catherine; Bérard, Frédéric

    2015-01-01

    Most angioedemas are histaminergic and correspond to deep urticarial swelling. Recurrent histaminergic angioedema led to the diagnosis of chronic urticaria, even when there are no superficial associated hives. Chronic urticaria is a benign disease, and autoimmune in 40 % of cases. The occurrence of angioedema in chronic urticaria is not a sign of severity. The occurrence of angioedema in chronic urticaria is associated with a longer duration of urticarial disease. NSAIDs and/or systemic corticotherapy are classic triggers of angioedema in chronic urticaria. In the absence of clinical endpoints, there is no need to make further assessment in chronic urticaria good responders to antihistamines.

  6. Trifluoperazine-Induced Angioedema

    Directory of Open Access Journals (Sweden)

    Mugtaba Osman

    2014-01-01

    Full Text Available Angioedema is a serious adverse drug reaction that can rarely be associated with trifluoperazine treatment. We present the case of a 44-year-old male with an established diagnosis of schizoaffective disorder, for which trifluoperazine therapy was considered. He presented to the emergency department with bilateral lower limb oedematous painful erythematous swelling that eased off completely when trifluoperazine was stopped. The possibility of allergic reaction, such as angioedema, should always be kept in mind by psychiatrists and mental health professionals when prescribing trifluoperazine antipsychotic.

  7. Angioedema hereditario: Tratamiento del ataque agudo en la Argentina

    Directory of Open Access Journals (Sweden)

    Alejandro Malbrán

    2014-06-01

    Full Text Available En el mundo, el angioedema hereditario (HAE afecta a 1 de cada 50 000 personas. Produce episodios de angioedema cutáneo, abdominal y laríngeos que generan gran incapacidad. La mortalidad por la enfermedad oscila entre 15 y 50%. Aunque en Argentina un concentrado plasmático de C1 inhibidor (pdC1INH ha estado aprobado y disponible por décadas para el tratamiento del ataque agudo, solo 15 (26% de 58 pacientes había recibido pdC1INH alguna vez hasta el año 2008, y solo 2(3.4% lo usaban regularmente. Luego de la aprobación de los nuevos medicamentos para HAE, incluido el icatibant en Argentina y de la publicación de las guías terapéuticas, 42 (82% de 51 pacientes del grupo original tienen pdC1INH para tratar el próximo ataque. Sin embargo, 16 (18% de estos pacientes continúan sin acceso a la medicación y otros 15 (35.7% acceden a través de otro enfermo en forma espuria. Solo 12 (28.6% de los pacientes con el medicamento puede auto tratarse en su domicilio. La mejora en el acceso a la medicación es importante pero debe extenderse a todos los afectados y facilitarse el auto-tratamiento.

  8. Hereditary Angioedema - Consequences of a New Treatment Paradigm in Denmark

    DEFF Research Database (Denmark)

    Bygum, Anette

    2014-01-01

    stopped long-term prophylaxis with danazol or tranexamic acid and changed treatment regimen to on-demand treatment with C1 inhibitor concentrate or icatibant. At least 10% of the attacks remained un-treated. More than half of the patients felt that hereditary angioedema had a significant psychological...

  9. Anaesthetic management of a patient with hereditary angioedema

    Directory of Open Access Journals (Sweden)

    Nergis Ataol

    2015-12-01

    Full Text Available Hereditary angioedema is a rare autosomal dominant disorder caused by reduced activity of the C1 esterase inhibitor. Patients with hereditary angioedema are clinically characterized by recurrent episodes of swelling of the extremities, face, trunk, airways and abdominal organs. Attacks may occur either spontaneously or following trauma, stress, surgery, infections and hormonal fluctuations. The most common cause of death is asphyxia related to laryngeal edema. Giving C1 esterase inhibitor is the most effective method of treatment. Also fresh frozen plasma, androgen steroids, quinine pathway inhibitors, antifibrinolytics and bradykinin receptor antagonists can be used as treatment. In this paper, the anesthetic management of a patient with hereditary angioedema undergoing inguinal hernia repair surgery is reported.

  10. Benefits and risks of danazol in hereditary angioedema

    DEFF Research Database (Denmark)

    Bork, Konrad; Bygum, Anette; Hardt, Jochen

    2008-01-01

    the benefits and risks of long-term treatment with danazol. METHODS: Data were generated retrospectively from 118 German and Danish patients who had HAE due to C1 inhibitor deficiency and were treated with danazol from 2 months to 30 years. The frequency and severity of acute attacks were registered before...

  11. Hereditary angioedema: beyond international consensus - circa December 2010 - The Canadian Society of Allergy and Clinical Immunology Dr. David McCourtie Lecture

    Directory of Open Access Journals (Sweden)

    Bowen Tom

    2011-02-01

    Full Text Available Abstract Background The 2010 International Consensus Algorithm for the Diagnosis, Therapy and Management of Hereditary Angioedema was published earlier this year in this Journal (Bowen et al. Allergy, Asthma & Clinical Immunology 2010, 6:24 - http://www.aacijournal.com/content/6/1/24. Since that publication, there have been multiple phase III clinical trials published on either prophylaxis or therapy of hereditary angioedema and some of these products have changed approval status in various countries. This manuscript was prepared to review and update the management of hereditary angioedema. Objective To review approaches for the diagnosis and management of hereditary angioedema (HAE circa December 2010 and present thoughts on moving from HAE management from international evidence-based consensus to facilitate more local health unit considerations balancing costs, efficacies of treatments, and risk benefits. Thoughts will reflect Canadian and international experiences. Methods PubMed searches including hereditary angioedema and diagnosis, therapy, management and consensus were reviewed as well as press releases from various pharmaceutical companies to early December 2010. Results The 2010 International Consensus Algorithms for the Diagnosis, Therapy and Management of Hereditary Angioedema is reviewed in light of the newly published phase III Clinical trials for prevention and therapy of HAE. Management approaches and models are discussed. Conclusions Consensus approach and double-blind placebo controlled trials are only interim guides to a complex disorder such as HAE and should be replaced as soon as possible with large phase IV clinical trials, meta analyses, data base registry validation of approaches including quality of life and cost benefit analyses, safety, and head-to-head clinical trials investigating superiority or non-inferiority comparisons of available approaches. Since not all therapeutic products are available in all jurisdictions

  12. Social costs of icatibant self-administration vs. health professional-administration in the treatment of hereditary angioedema in Spain

    OpenAIRE

    Blasco, Antonio J.; Lázaro, Pablo; Caballero, Teresa; Guilarte, Mar

    2013-01-01

    Background: Icatibant is the only subcutaneous treatment for acute Type I and Type II hereditary angioedema with C1-esterase inhibitor deficiency (HAE-C1-INH) licensed for self-administration in Europe. Aim: To compare the economic impact of two icatibant administration strategies: health professional-administration only (strategy 1) versus including the patient self-administration option (strategy 2). Methods:Economic evaluation model based on the building of a decision tree. Both strategies...

  13. Acebrophylline-induced angioedema

    Directory of Open Access Journals (Sweden)

    Sanitha Kuriachan

    2015-01-01

    Full Text Available A 53-year-old woman visited her physician complaining of acute breathlessness and productive cough. Her medications included budesonide and formoterol for asthma, fixed-dose combination aspirin 150 mg + clopidogrel 75 mg + atorvastatin 20 mg for ischemic heart disease. History revealed that she had allergic rhinitis and was hypersensitive to penicillins. The patient was prescribed acebrophylline (ABP. Six hours after ABP therapy she presented with generalized urticarial lesions, swelling of hands, feet, lips and face, suggestive of angioedema. ABP was stopped immediately, and the patient was treated symptomatically. This case was categorized as probable as per standard causality assessment scale.

  14. Genetics Home Reference: hereditary angioedema

    Science.gov (United States)

    ... Cicardi M. C1-inhibitor deficiency and angioedema: molecular mechanisms and clinical progress. Trends Mol Med. 2009 Feb; ... with a qualified healthcare professional . About Genetics Home Reference Site Map Contact Us Selection Criteria for Links ...

  15. Analysis on treating hereditary angioedema acute attack with fresh frozen plasma in 16 case-times%新鲜冰冻血浆治疗遗传性血管性水肿急性发作16例次分析

    Institute of Scientific and Technical Information of China (English)

    汤蕊; 陈适; 张宏誉

    2012-01-01

    目的 探讨新鲜冰冻血浆(FFP)治疗遗传性血管性水肿(HAE)的适应证、安全性和有效性.方法 回顾性分析北京协和医院4例次及文献中12例次共16例次FFP治疗HAE急性发作的病例.结果 共13例HAE患者急性期16次输注FFP,输注量平均(586±337)mL,输注后15例次病情得到改善,1例次因输血反应中断用药.症状开始缓解时间为(49±19)min,输注后完全缓解时间由输注前的(6.7±27.0)h缩短为(2.0±12.0)h.除2例次患者出现腹痛加重、1例次患者出现皮疹外,其他患者均未出现不良反应.结论 FFP用于HAE急性发作期治疗相对安全有效.%Objective To discuss the indication, safety and efficiency of FFP for the treatment of HAE. Methods Retrospective analyze the clinical data of 2 patients with HAE in Peking Union medical college hospital and 11 patients in the medical literatures. Results Thirteen cases of patients were injected with FFP totally 16 times, and the average dosage of FFP is ( 586 ± 337 ) mL. Only one patient failed to be cured because of transfusion reaction. The symptoms begin to ease ( 49 ± 19 ) minutes after injection. And the time of complete remission reduced from ( 61. 7 ± 27.0 ) hours to( 2. 0 ± 12.0 )hours after FFP injection. There were 2 cases of abdominal pain and 1 case of skin rash, and others have no adverse reaction. Conclusion FFP is safe and effective for acute attacks of HAE.

  16. The Janus faces of acquired angioedema: C1-inhibitor deficiency, lymphoproliferation and autoimmunity.

    Science.gov (United States)

    Wu, Maddalena Alessandra; Castelli, Roberto

    2016-02-01

    Several clinical and biological features of lymphoproliferative diseases have been associated with an increased risk of developing autoimmune manifestations. Acquired deficiency of C1-inhibitor (C1-INH) (AAE) is a rare syndrome clinically similar to hereditary angioedema (HAE) characterized by local increase in vascular permeability (angioedema) of the skin and the gastrointestinal and oro-pharyngo-laryngeal mucosa. Bradykinin, a potent vasoactive peptide, released from high molecular weight kininogen when it is cleaved by plasma kallikrein (a serine protease controlled by C1-INH), is the mediator of symptoms. In total 46% of AAE patients carry an underlying hematological disorder including monoclonal gammopathy of uncertain significance (MGUS) or B cell malignancies. However, 74% of AAE patients have anti-C1-INH autoantibodies without hematological, clinical or instrumental evidence of lymphoproliferative disease. Unlike HAE patients, AAE patients usually have late-onset symptoms, do not have a family history of angioedema and present variable response to treatment due to the hypercatabolism of C1-INH. Experiments show that C1-INH and/or the classical complement pathway were consumed by the neoplastic lymphatic tissues and/or anti-C1-INH neutralizing autoantibodies. Therapy of AAE follows two directions: 1) prevention/reversal of the symptoms of angioedema; and 2) treatment of the associated disease. Different forms of B cell disorders coexist and/or evolve into each other in AAE and seem to be dominated by an altered control of B cell proliferation, thus AAE represents an example of the strict link between autoimmunity and lymphoproliferation. PMID:26068904

  17. Complements Are Not Always a Good Thing: Novel Therapies for Angioedema.

    Science.gov (United States)

    Bailey, Abby Mynatt; Reed, Brittany S; Weant, Kyle A; Justice, Stephanie Baker

    2016-01-01

    Hereditary angioedema attacks are rare, but emergency care providers must be aware of the clinical presentation and treatment of these patients because the emergency department remains the most common setting where these patients seek treatment. If providers are not aware of the past medical history of these patients, they are likely to receive standard therapies for respiratory distress and anaphylaxis including antihistamines, corticosteroids, and epinephrine. However, these medications may not work in these patients, given the pathophysiology of their underlying disease. Since 2009, several new therapies have been approved for the treatment of acute hereditary angioedema attacks. This article discusses pathophysiology, clinical presentation, and use of novel therapies for the management of angioedema. PMID:27139131

  18. Recent Advances in Drug-Induced Angioedema

    Directory of Open Access Journals (Sweden)

    Naoko Inomata

    2012-01-01

    Full Text Available Angioedema is the end result of deep dermal, subcutaneous and/or mucosal swelling, and is potentially a life- threatening condition in cases where the pharynx or larynx is involved. Drug-induced angioedema has been reported to occur in response to a wide range of drugs and vaccines. Drug-induced angioedema, like other cutaneous drug reactions, has been reported to be most frequently elicited by beta-lactam antibiotics and nonsteroidal anti-inflammatory drugs, although reliable data from epidemiologic studies are scarce. Recent reports suggested an increasing role of angiotensin-converting enzyme inhibitors (ACEIs in the causation of life- threatening angioedema. ACEI-related angioedema is never accompanied by urticaria and occurs via a kinin- dependent mechanism. ACEI-related angioedema not only can start years after beginning the treatment, but it can then recur irregularly while under that treatment. Furthermore, allergy tests are unreliable for the diagnosis of ACEI-related angioedema, and so the relationship between angioedema and ACEIs is often missed and consequently quite underestimated. Accordingly, better understanding of the kinin-dependent mechanism, which is particular to angioedema, is necessary for the appropriate management of drug-induced angioedema.

  19. Use of a C1 Inhibitor Concentrate in Adults ≥65 Years of Age with Hereditary Angioedema

    DEFF Research Database (Denmark)

    Bygum, Anette; Martinez-Saguer, Inmaculada; Bas, Murat;

    2016-01-01

    BACKGROUND: Treatment of hereditary angioedema (HAE) in 'older adults' (those aged ≥65 years) has not been well studied. The international Berinert Patient Registry collected data on the use of intravenous plasma-derived, pasteurized, nanofiltered C1-inhibitor concentrate (pnfC1-INH; Berinert......(®)/CSL Behring) in patients of any age, including many older adults. METHODS: This observational registry, conducted from 2010 to 2014 at 30 US and seven European sites, gathered prospective (post-enrollment) and retrospective (pre-enrollment) usage and adverse event (AE) data on subjects treated with pnfC1-INH...... doses were lower than those reported for 252 'younger adults' (those aged

  20. Angioedema-Urticaria Due to Acitretin.

    Science.gov (United States)

    Solak, Berna; Metin, Nurcan; Erdem, Mustafa Teoman

    2016-01-01

    Acitretin is a synthetic oral retinoid that has been used for a number of dermatological diseases. Several side effects of acitretin have been reported such as teratogenicity, cheilitis, xerosis, dyslipidemia, and photosensitivity. Many drugs, mainly antibiotics and nonsteroidal anti-inflammatory drugs, can cause angioedema-urticaria. We present the case of angioedema-urticaria due to acitretin, confirmed by oral provocation test, in a 61-year-old man with psoriasis. To the best of our knowledge, only 1 case of angioedema due to oral acitretin has been reported in the literature so far. We report this case to draw attention that acitretin may cause angioedema-urticaria and to inform patients about this risk besides other side effects due to acitretin. PMID:26820109

  1. Coexistence of hereditary angioedema and Turner's syndrome.

    OpenAIRE

    Fletcher, A; Weetman, A P

    1998-01-01

    A 34-year-old woman presented to the out-patient clinic with angioedema and type II hereditary angioedema was confirmed immunologically. She also volunteered she had never had a menstrual period and physical examination identified several features of Turner's syndrome. A mosaic karyotype with XY and XO was found on chromosomal analysis and gonadectomy was performed in view of the high risk of gonadoblastoma. After commencing oestrogen at physiological replacement doses, the patient experience...

  2. Safety and Usage of C1-Inhibitor in Hereditary Angioedema

    DEFF Research Database (Denmark)

    Riedl, Marc A; Bygum, Anette; Lumry, William;

    2016-01-01

    of this study was to describe safety and usage patterns of pnfC1-INH. METHODS: A multicenter, observational, registry was conducted between 2010 and 2014 at 30 United States and 7 European sites to obtain both prospective (occurring after enrollment) and retrospective (occurring before enrollment) safety...... and usage data on subjects receiving pnfC1-INH for any reason. RESULTS: Of 343 enrolled patients, 318 received 1 or more doses of pnfC1-INH for HAE attacks (11,848 infusions) or for prophylaxis (3142 infusions), comprising the safety population. Median dosages per infusion were 10.8 IU/kg (attack treatment......) and 16.6 IU/kg (prophylaxis). Approximately 95% of infusions were administered outside of a health care setting. No adverse events (AEs) were reported in retrospective data. Among prospective data (n = 296 subjects; 9148 infusions), 252 AEs were reported in 85 (28.7%) subjects (rate of 0.03 events...

  3. Before and after, the impact of available on-demand treatment for HAE

    DEFF Research Database (Denmark)

    Christiansen, Sandra C; Bygum, Anette; Banerji, Aleena;

    2015-01-01

    on their lives. Patients at a United States HAE Association summit meeting were asked to rate the burden of HAE currently and compare by recall with 2009 when these therapies were not available. Questions covered five domains: psychological/emotional status, ability to carry out daily activities, fear...... of suffocation, worry about their children inheriting HAE, and medication side effects. Data were analyzed using Wilcoxon signed-rank tests or analysis of variance. Responses were obtained from 134 self-identified HAE subjects: 85 type I, 21 type II, and 28 with normal C1 inhibitor (C1INH). Burden of disease...

  4. Life-threatening angioedema of the tongue: the detection of the RNA of B henselae in the saliva of a male patient and his dog as well as of the DNA of three Bartonella species in the blood of the patient.

    Science.gov (United States)

    Lösch, Barbara; Wank, Rudolf

    2014-01-01

    Non-hereditary angioedema is a common disease with a prevalence between 5% and 19% and approximately half of the patients experience a swelling of the tongue. We report a case of a 49-year-old Caucasian man with a gross life-threatening angioedema of the tongue, whose attacks occurred every 4 weeks. The most frequent causes of angioedema were excluded. We detected DNA and RNA from Bartonella henselae in the blood and saliva of the patient and in the saliva of the patient's hunting dog. Treatment with azithromycin plus minocycline cleared the blood and saliva of RNA and DNA of Bartonella species, and the patient has been free from angioedema for 1 year. None of the therapy modalities used to treat the hereditary form or ACE or allergy-induced angioedema affect the detrimental course caused by Bartonella species. We therefore suggest that a molecular Bartonella test be included in the analysis of angioedema. PMID:24654245

  5. Cytokine-associated angioedema syndromes including episodic angioedema with eosinophilia (Gleich's Syndrome).

    Science.gov (United States)

    Banerji, Aleena; Weller, Peter F; Sheikh, Javed

    2006-11-01

    Angioedema can be associated with many disorders and the presentation can be variable. Subsets of the angioedema syndromes are thought to be cytokine mediated (Table 1). Of these, the best described are the episodic angioedema with eosinophilia syndrome (Gleich's syndrome) and non-episodic angioedema with eosinophilia, which share some common features, but appear to have differences in pathophysiology. NERDS (nodules, eosinophilia, rheumatism, dermatitis and swelling), Clarkson syndrome (idiopathic capillary leak syndrome), and angioedema associated with aldesleukin (human recombinant IL-2) and IFN-alpha have also been reported in the literature, and have been discussed in this review. There is still much to be learned about the pathophysiology, diagnosis, and treatment of patients with these disorders. Our hope is that this review will be of help to those readers who care for patients with these disorders, and will stimulate interest in further research into the pathophysiology of these conditions. PMID:17085290

  6. Transcriptional profiling of the Arabidopsis abscission mutant hae hsl2 by RNA-Seq

    Directory of Open Access Journals (Sweden)

    Niederhuth Chad E

    2013-01-01

    Full Text Available Abstract Background Abscission is a mechanism by which plants shed entire organs in response to both developmental and environmental signals. Arabidopsis thaliana, in which only the floral organs abscise, has been used extensively to study the genetic, molecular and cellular processes controlling abscission. Abscission in Arabidopsis requires two genes that encode functionally redundant receptor-like protein kinases, HAESA (HAE and HAESA-LIKE 2 (HSL2. Double hae hsl2 mutant plants fail to abscise their floral organs at any stage of floral development and maturation. Results Using RNA-Seq, we compare the transcriptomes of wild-type and hae hsl2 stage 15 flowers, using the floral receptacle which is enriched for abscission zone cells. 2034 genes were differentially expressed with a False Discovery Rate adjusted p INFLORESCENCE DEFICIENT IN ABSCISSION (ida mutants shows that many of the same genes are co-regulated by IDA and HAE HSL2 and support the role of IDA in the HAE and HSL2 signaling pathway. Comparison to microarray data from stamen abscission zones show distinct patterns of expression of genes that are dependent on HAE HSL2 and reveal HAE HSL2- independent pathways. Conclusion HAE HSL2-dependent and HAE HSL2-independent changes in genes expression are required for abscission. HAE and HSL2 affect the expression of cell wall modifying and defense related genes necessary for abscission. The HAE HSL2-independent genes also appear to have roles in abscission and additionally are involved in processes such as hormonal signaling, senescence and callose deposition.

  7. Classification, diagnosis, and approach to treatment for angioedema

    DEFF Research Database (Denmark)

    Cicardi, M; Aberer, W; Banerji, A;

    2014-01-01

    angioedema as a distinct disease. In the absence of accepted classification, different types of angioedema are not uniquely identified. For this reason, the European Academy of Allergy and Clinical Immunology gave its patronage to a consensus conference aimed at classifying angioedema. Four types of acquired...

  8. Idiopathic histaminergic angioedema without wheals: a case series of 31 patients.

    Science.gov (United States)

    Faisant, C; Boccon-Gibod, I; Mansard, C; Dumestre Perard, C; Pralong, P; Chatain, C; Deroux, A; Bouillet, L

    2016-07-01

    Idiopathic histaminergic acquired angioedema (IH-AAE) is a common cause of recurrent angioedema without wheals. It is a mast cell-mediated disease thought to belong to the same clinical entity as chronic urticaria (CU). The objective of this study was to describe the clinical and epidemiological characteristics of IH-AAE patients. From 2014 to 2015, 534 patients were seen at our national reference centre for angioedema and/or urticaria. Among them, we identified 31 patients with idiopathic histaminergic acquired angioedema without wheals (IH-AAE). Thirty-one patients (15 men and 16 women) with a mean age of 50 years met the criteria for IH-AAE. The average delay in diagnosis was 6·3 years. A history of allergy was found in 12 patients (38·7%), nine suffering from allergic rhinitis. The mean duration of attacks was 28·1 h. The AE attack was located in the upper respiratory tract in 54·8% of cases (17 patients). A lingual location was found in 29% of patients. Men were more likely than women to have an upper airway involvement. No intubations or admissions to intensive care units were reported. The dosage of anti-histamines to control the symptoms was onefold the recommended dose in 51·6% of patients (16 patients), twofold in 32% (10 patients) and three-fourfold in 16·1% (five patients). IH-AAE is characterized by an important delay in diagnosis, a frequent involvement of the upper airway and a benign course during attacks. As in CU, a trial of up to fourfold dose of H1-anti-histamines may be necessary to control symptoms. PMID:26969870

  9. Angioedema due to Systemic Isotretinoin Therapy

    Directory of Open Access Journals (Sweden)

    Pelin Üstüner

    2014-01-01

    Full Text Available Angioedema is the swelling of the mucosal membranes as a variant of urticaria induced by hereditary C1 esterase inhibitor enzyme deficiency, certain foods, or drugs. Herein, we report the case of a 23-year-old woman, with mild-moderate acne presenting with widespread facial angioedema on the 2nd day of systemic isotretinoin treatment. The patient had taken no drugs other than isotretinoin in the preceding days and had no known food allergy. Her angioedema was resolved after the isotretinoin was discontinued. We want to draw the attention of dermatologists to this rare adverse allergic effect of isotretinoin which is frequently used in the treatment of acne vulgaris.

  10. Treatment of type I and II hereditary angioedema with Rhucin, a recombinant human C1 inhibitor.

    Science.gov (United States)

    Varga, Lilian; Farkas, Henriette

    2008-11-01

    Hereditary and acquired angioedema are of outstanding clinical importance, as edematous attacks associated with these conditions can thrust afflicted patients into mortal danger. Currently, C1 inhibitor concentrate - a human blood product - is available as a replacement therapy. In view of the limited number of donors, as well as the risk of transmission of blood-borne infections, it is a reasonable expectation to develop a therapeutic alternative based on recombinant technology, which would eliminate all these shortcomings. Pharming (Leiden, The Netherlands) has developed Rhucin, a recombinant human C1 inhibitor, as a proprietary product, which is currently being evaluated in Phase III clinical trials. Ongoing studies conducted within the framework of the development program are almost complete and their interim findings are reassuring. This should facilitate successful regulatory approval in the near future, which is indispensable in order to make Rhucin available for patients with hereditary angioedema or other disorders amenable to C1 inhibitor replacement. PMID:20477114

  11. Treatment of type I and II hereditary angioedema with Rhucin, a recombinant human C1 inhibitor.

    Science.gov (United States)

    Varga, Lilian; Farkas, Henriette

    2008-11-01

    Hereditary and acquired angioedema are of outstanding clinical importance, as edematous attacks associated with these conditions can thrust afflicted patients into mortal danger. Currently, C1 inhibitor concentrate - a human blood product - is available as a replacement therapy. In view of the limited number of donors, as well as the risk of transmission of blood-borne infections, it is a reasonable expectation to develop a therapeutic alternative based on recombinant technology, which would eliminate all these shortcomings. Pharming (Leiden, The Netherlands) has developed Rhucin, a recombinant human C1 inhibitor, as a proprietary product, which is currently being evaluated in Phase III clinical trials. Ongoing studies conducted within the framework of the development program are almost complete and their interim findings are reassuring. This should facilitate successful regulatory approval in the near future, which is indispensable in order to make Rhucin available for patients with hereditary angioedema or other disorders amenable to C1 inhibitor replacement.

  12. Life Threatening Idiopathic Recurrent Angioedema Responding to Cannabis

    Directory of Open Access Journals (Sweden)

    Amit Frenkel

    2015-01-01

    Full Text Available We present a case of a 27-year-old man with recurrent episodes of angioedema since he was 19, who responded well to treatment with medical grade cannabis. Initially, he responded to steroids and antihistamines, but several attempts to withdraw treatment resulted in recurrence. In the last few months before prescribing cannabis, the frequency and severity of the attacks worsened and included several presyncope events, associated with scrotal and neck swelling. No predisposing factors were identified, and extensive workup was negative. The patient reported that he was periodically using cannabis socially and that during these periods he was free of attacks. Recent data suggest that cannabis derivatives are involved in the control of mast cell activation. Consequently, we decided to try a course of inhaled cannabis as modulators of immune cell functions. The use of inhaled cannabis resulted in a complete response, and he has been free of symptoms for 2 years. An attempt to withhold the inhaled cannabis led to a recurrent attack within a week, and resuming cannabis maintained the remission, suggesting a cause and effect relationship.

  13. Epidemiology of Non-hereditary Angioedema

    DEFF Research Database (Denmark)

    Madsen, Flemming; Attermann, Jorn; Linneberg, Allan

    2012-01-01

    The prevalence of non-hereditary angioedema was investigated in a general population sample (n = 7,931) and in a sample of Danish patients (n = 7,433) tested for deficiency of functional complement C1 esterase inhibitor protein (functional C1 INH). The general population sample (44% response rate...

  14. Epidemiology of Non-hereditary Angioedema

    DEFF Research Database (Denmark)

    Madsen, Flemming; Attermann, Jørn; Linneberg, Allan

    2012-01-01

    The prevalence of non-hereditary angioedema was investigated in a general population sample (n¿=¿7,931) and in a sample of Danish patients (n¿=¿7,433) tested for deficiency of functional complement C1 esterase inhibitor protein (functional C1 INH). The general population sample (44% response rate...

  15. Self-administration of C1-inhibitor concentrate in patients with hereditary or acquired angioedema caused by C1-inhibitor deficiency

    NARCIS (Netherlands)

    M. Levi; G. Choi; C. Picavet; C.E. Hack

    2006-01-01

    Background: Administration of C1-inhibitor concentrate is effective for prophylaxis and treatment of severe angioedema attacks caused by Cl-inhibitor deficiency. The concentrate should be administered intravenously and hence needs to be administered by health care professionals, which might cause co

  16. Acute allergic angioedema of upper lip.

    Science.gov (United States)

    Mahendran, Kavitha; Padmini, Govindasway; Murugesan, Ramesh; Srikumar, Arthiseethalakshmi

    2016-01-01

    Mishaps can occur during dental procedures, some owing to inattention to detail and others are totally unpredictable. They usually include anaphylaxis or allergic reactions to materials used for restorative purposes or drugs such as local anesthetics. A patient reported to our department with moderate dental fluorosis, and the treatment was planned with indirect composite veneering. During the procedure while cementation acute allergic reaction occurred, the specific cause could not be identified after allergic testing. During the procedure while cementationacute allergic angioedema of upper lip. Anaphylaxis, urticaria, allergy, hereditary atopic eczema, cellulitis, cheilitis granulomatosa, and cheilitis glandularis. The patient was reassured and given prednisolone 10 mg and cetirizine 10 mg orally, once daily for 3 days after which the symptoms subsided. This paper will discuss the pathogenesis, classification, identification, and management of angioedema during dental procedures. PMID:27217646

  17. Acute allergic angioedema of upper lip

    Science.gov (United States)

    Mahendran, Kavitha; Padmini, Govindasway; Murugesan, Ramesh; Srikumar, Arthiseethalakshmi

    2016-01-01

    Mishaps can occur during dental procedures, some owing to inattention to detail and others are totally unpredictable. They usually include anaphylaxis or allergic reactions to materials used for restorative purposes or drugs such as local anesthetics. A patient reported to our department with moderate dental fluorosis, and the treatment was planned with indirect composite veneering. During the procedure while cementation acute allergic reaction occurred, the specific cause could not be identified after allergic testing. During the procedure while cementationacute allergic angioedema of upper lip. Anaphylaxis, urticaria, allergy, hereditary atopic eczema, cellulitis, cheilitis granulomatosa, and cheilitis glandularis. The patient was reassured and given prednisolone 10 mg and cetirizine 10 mg orally, once daily for 3 days after which the symptoms subsided. This paper will discuss the pathogenesis, classification, identification, and management of angioedema during dental procedures. PMID:27217646

  18. Angioedema: Clinical Presentations and Pharmacological Management.

    Science.gov (United States)

    Collins-Yoder, Angela Smith

    2016-01-01

    Angioedema (AE) is a unique clinical presentation of an unchecked release of bradykinin. The origin of this clinical presentation can be either genetic or acquired. The outcome within the patient is subcutaneous swelling of the lower layers of the epidermis. Symptoms are most often localized to the upper airway or the gastrointestinal tract. A typical course resolves in 5 to 7 days, but in some patients, the clinical manifestations exist up to 6 weeks. Hereditary AE is rare and genetically linked, and typically, the patient has episodes for many years before diagnosis. Episodes of acquired AE may be drug induced, triggered by a specific allergen, or idiopathic. Angioedema can elicit the need for critical care interventions, for advanced airway management, or unnecessary abdominal surgery. The treatment for these patients is evolving as new pharmacological agents are developed. This article addresses subtypes of AE, triggers, pharmacology, and information for interdisciplinary team planning of individualized case management. PMID:27258954

  19. Angioedema due to Pomegranate: Original Image

    Directory of Open Access Journals (Sweden)

    Meliha Findik

    2014-03-01

    Full Text Available  Acute allergic angioedema is an abrupt-onset, unpredictable inflammatory reaction of the skin and mucous membranes. A 35-year-old female patient presented to our emergency department with redness on the cheeks and edema in her mouth and eyelids. It was learned from the history that her symptoms were begun 15 minutes after eating a pomegranate. 40 mg methylprednisolone and 50 mg diphenhydramine were administered intravenously.

  20. [Hereditary angioedema: strange cause of abdominal pain].

    Science.gov (United States)

    Salas-Lozano, Nereo Guillermo; Meza-Cardona, Javier; González-Fernández, Coty; Pineda-Figueroa, Laura; de Ariño-Suárez, Mauricio

    2014-01-01

    Antecedentes: el angioedema hereditario es un trastorno inflamatorio episódico, que se hereda de manera autosómica dominante y se caracteriza por episodios de edema periférico. Los pacientes pueden tener edema de la pared de cualquier víscera hueca, incluido el intestino. Caso clínico: se comunica el caso de un paciente masculino de 33 años de edad, sin antecedentes de importancia, con dolor abdominal, localizado en el epigastrio, irradiado al cuadrante inferior derecho, acompañado de 5 vómitos. La tomografía abdominal mostró engrosamiento de la pared de la segunda y tercera porción del duodeno, con infiltración de grasa y líquido libre. Los exámenes de laboratorio mostraron: concentraciones bajas del complemento C4 (5.5 mg/dL) y actividad del inhibidor de C1 del complemento de 30%. Conclusiones: el angioedema hereditario es consecuencia de la deficiencia (tipo I) o disfunción (tipo II) del inhibidor C1 del complemento. El dolor abdominal asociado con angioedema es de inicio súbito, como dolor cólico, recurrente y de intensidad moderada. En la actualidad existen dos medicamentos aprobados por la Food and Drug Administration para el tratamiento de pacientes con esta afección.

  1. Hereditary angioedema type I: a case report

    Directory of Open Access Journals (Sweden)

    Francisca Muñoz Peralta

    2016-03-01

    Full Text Available El angioedema hereditario es una enfermedad rara, de gran heterogeneidad en los síntomas, manifestándose con edema a nivel cutáneo, mucosa gastrointestinal y de laringe/faringe. Aunque existen tres variedades, el tipo I es el más frecuente y es provocado por una deficiencia en la síntesis del complemento C1 inhibidor. La gravedad de la clínica, junto a la baja prevalencia de la enfermedad y la necesidad de un tratamiento específico, hacen que el diagnóstico y tratamiento de dicha patología sea aún una asignatura pendiente para el médico de familia en atención primaria. Presentamos el caso de un adolescente varón con déficit de α-1 antitripsina desde los seis meses de edad, con aparición de angioedemas en piernas y brazos a los 11 años, diagnosticado de angioedema hereditario tipo I un año después. El diagnóstico definitivo de la enfermedad permitió instaurar un tratamiento adecuado a su patología, que consiste en la prevención de brotes que puedan comprometer la vida del paciente y, en el caso de que aparezcan, en la administración del complemento C1 inhibidor.

  2. Angiotensin Converting Enzyme-induced Angioedema - A Dangerous New Epidemic

    DEFF Research Database (Denmark)

    Rasmussen, Eva Rye; Mey, Kristianna; Bygum, Anette

    2013-01-01

    Angioedema is a sudden localised and often asymmetric swelling of the skin or mucous membranes caused by transient increased endothelial permeability causing plasma extravasation. In the last decades the incidence of severe angioedema involving the upper airways and even fatal outcome due to asph...

  3. Differentiation of Neisseria gonorrhoeae from other Neisseria species by use of the restriction endonuclease HaeIII.

    OpenAIRE

    Torres, A. R. de; Li, M K; Ward, D C; Edberg, S C

    1984-01-01

    We used the restriction endonuclease HaeIII to differentiate Neisseria gonorrhoeae from other Neisseria species and Branhamella catarrhalis. A total of 16 clinical isolates and four American Type Culture Collection strains of N. gonorrhoeae were resistant to HaeIII digestion, whereas 17 isolates and four American Type Culture Collection strains from eight different bacterial species were susceptible. This resistance was not caused by an enzyme inhibitor. We propose that protection of the HaeI...

  4. Angioedema por rellenos faciales: Descripción de cinco casos Facial angioedema after filler injections: Description of five cases

    Directory of Open Access Journals (Sweden)

    Micaela A. Cosatti

    2010-12-01

    Full Text Available En los últimos años se ha incrementado la utilización de sustancias de relleno facial con fines estéticos. Estos productos, originalmente considerados inertes, se asocian con diversos efectos adversos localizados alrededor del sitio de la aplicación. Describimos a 5 mujeres con antecedentes de inyecciones de sustancia de relleno facial que presentaron como síntoma inicial angioedema facial duro y persistente seguido por la aparición de nódulos subcutáneos. Todas las pacientes fueron derivadas al servicio de alergia por sospecha de angioedema de causa alérgica sin respuesta al tratamiento con antihistamínicos. El angioedema inició 27.6 meses (1 a 48 luego de la inyección del producto, y las pacientes evolucionaron con brotes y remisiones que fueron tratados con corticoides orales y en 2 oportunidades con inyecciones locales. El tiempo medio desde el inicio de los síntomas hasta la remisión del angioedema fue 8.75 meses (1 a 24. A octubre de 2009 cuatro pacientes se mantuvieron en remisión persistente, luego de un seguimiento clínico de 24.5 meses (7 a 36. Una paciente continúa con exacerbaciones luego de 11 meses de iniciados los síntomas. Las sustancias de relleno facial pueden producir angioedema como evento adverso y deben ser consideradas en el diagnóstico diferencial del angioedema persistente. Sólo responden al tratamiento con esteroides y en algunos casos esteroides dependientes, con ciclosporina. La frecuencia de angioedema por rellenos faciales entre pacientes con angioedema asistidos en la Unidad de Asma, Alergia e Inmunología Clínica fue del 0.5%.The use of fillers for cosmetic purposes is becoming increasingly frequent. Although initially considered inert, these products produce adverse reactions around the injection site. We present 5 cases of women with a history of filler injections who presented a hard and persistent angioedema followed by local subcutaneous nodules . They were referred to the allergist for

  5. How Not to Be Misled by Disorders Mimicking Angioedema

    DEFF Research Database (Denmark)

    Andersen, Michelle Fog; Longhurst, Hilary J; Rasmussen, Eva Rye;

    2016-01-01

    BACKGROUND: Angioedema is a vascular reaction involving the lower dermis, subcutis and/or submucosal tissue and causing a temporary localized swelling in any part of the body. For many health care professionals, the diagnosis presents an ongoing challenge; several disorders may manifest with...... subcutaneous or submucosal swelling and falsely be assumed to be angioedema. The clinicians at the emergency department and in the immunology/allergy clinics must be skilled at recognizing the features of angioedema and its differential diagnosis. METHODS: The review is based on a literature search with...... specific indexing terms in PubMed, a review of bibliographies and the authors' clinical experience. RESULTS: The most essential diseases that mimic angioedema, the so-called pseudoangioedemas, will each be discussed and illustrated by clinical photos, pointing out key features that help clarify the...

  6. Visceral Angioedema Induced by Angiotensin Converting Enzyme Inhibitor: Case Report

    Directory of Open Access Journals (Sweden)

    Beatriz Frutuoso

    2016-05-01

    Conclusion: The diagnosis of intestinal angioedema induced by angiotensin converting enzyme inhibitor can be challenging and time consuming due to its rarity and nonspecific symptoms, which may lead to underdiagnosis of this entity.

  7. Refractory Angioedema in a Patient with Systemic Lupus Erythematosus

    Directory of Open Access Journals (Sweden)

    Zahra Habibagahi

    2015-07-01

    Full Text Available Angioedema secondary to C1 inhibitor deficiency has been rarely reported to be associated with systemic lupus erythematosus. A genetic defect of C1 inhibitor produces hereditary angioedema, which is usually presented with cutaneous painless edema, but edema of the genital area, gastrointestinal and laryngeal tracts have also been reported. In lupus patients, angioedema may be the result of an acquired type of C1 inhibitor deficiency, most probably due to antibody formation directed against the C1 inhibitor molecule. Herein we report a new case of lupus nephritis that developed angioedema and a rapid course of disease progression with acute renal failure and alveolar hemorrhage without response to high dose steroid and plasmapheresis.

  8. Angioedema associated with Crohn's disease: Response to biologics

    Institute of Scientific and Technical Information of China (English)

    Flavio Habal; Vivian Huang

    2012-01-01

    A 46-year-old female patient with terminal ileum Crohn's disease and ankylosing spondylitis presented with recurrent angioedema and urticaria.Investigations ruled out hereditary angioedema,and environmental or food allergen triggers.She was diagnosed with chronic idiopathic urticaria with angioedema,and was treated with a trial of intravenous immunoglobulin immunotherapy,danazol,prednisone and hydroxyzine.Due to ongoing bowel and arthritic complaints,she was started on infliximab infusions and within 2 treatments,she had complete resolution of the angioedema and urticaria,as well as of the bowel and arthritic symptoms.Unfortunately she developed allergic reactions to the infliximab and was switched to another anti-tumor necrosis factor (TNF)-α agent,adalimumab.Since then,she has had no further angioedema or urticaria,and her Crohn's disease has been quiescent.This is the first known case report of chronic idiopathic urticaria with angioedema coexistent with Crohn's disease that was successfully treated with anti-TNF-α agents.

  9. ACE-I Angioedema: Accurate Clinical Diagnosis May Prevent Epinephrine-Induced Harm

    OpenAIRE

    R. Mason Curtis; Sarah Felder; Rozita Borici-Mazi; Ian Ball

    2016-01-01

    Introduction: Upper airway angioedema is a life-threatening emergency department (ED) presentation with increasing incidence. Angiotensin-converting enzyme inhibitor induced angioedema (AAE) is a non-mast cell mediated etiology of angioedema. Accurate diagnosis by clinical examination can optimize patient management and reduce morbidity from inappropriate treatment with epinephrine. The aim of this study is to describe the incidence of angioedema subtypes and the management of AAE. We evaluat...

  10. Exploring the HME and HAE1 efflux systems in the genus Burkholderia

    Directory of Open Access Journals (Sweden)

    Pasca Maria

    2010-06-01

    Full Text Available Abstract Background The genus Burkholderia includes a variety of species with opportunistic human pathogenic strains, whose increasing global resistance to antibiotics has become a public health problem. In this context a major role could be played by multidrug efflux pumps belonging to Resistance Nodulation Cell-Division (RND family, which allow bacterial cells to extrude a wide range of different substrates, including antibiotics. This study aims to i identify rnd genes in the 21 available completely sequenced Burkholderia genomes, ii analyze their phylogenetic distribution, iii define the putative function(s that RND proteins perform within the Burkholderia genus and iv try tracing the evolutionary history of some of these genes in Burkholderia. Results BLAST analysis of the 21 Burkholderia sequenced genomes, using experimentally characterized ceoB sequence (one of the RND family counterpart in the genus Burkholderia as probe, allowed the assembly of a dataset comprising 254 putative RND proteins. An extensive phylogenetic analysis revealed the occurrence of several independent events of gene loss and duplication across the different lineages of the genus Burkholderia, leading to notable differences in the number of paralogs between different genomes. A putative substrate [antibiotics (HAE1 proteins/heavy-metal (HME proteins] was also assigned to the majority of these proteins. No correlation was found between the ecological niche and the lifestyle of Burkholderia strains and the number/type of efflux pumps they possessed, while a relation can be found with genome size and taxonomy. Remarkably, we observed that only HAE1 proteins are mainly responsible for the different number of proteins observed in strains of the same species. Data concerning both the distribution and the phylogenetic analysis of the HAE1 and HME in the Burkholderia genus allowed depicting a likely evolutionary model accounting for the evolution and spreading of HME and HAE

  11. Pathophysiology, clinical manifestation and management of angioedema - our experience

    Directory of Open Access Journals (Sweden)

    Aleksić Aleksandra

    2015-01-01

    Full Text Available Introduction. Angioedema is characterized by subcutaneous and/or submucosal swelling usually localized to the lips, eyelids, tongue, oral cavity, larynx and pharynx. Various types of angioedema, caused by different pathophysiologic mechanisms, can have the same or very similar clinical picture and require different diagnostic and therapeutic procedures. The immediate threat to life as a result of rapidly developed edema of the pharynx and larynx with airway obstruction requires endotracheal intubation or emergency tracheotomy. Standard therapy, which includes epinephrine, second-generation antihistamines and steroids, is not effective in the treatment of all types of angioedema. Objective. On the basis of the clinical presentation and course of angioedema, this retrospective study was aimed at contributing to a better understanding of the etiopathogenesis of the disease and at helping determine the most effective available treatment modalities. Methods. This retrospective study included patients treated under the diagnosis of angioedema of the upper aerodigestive tract between 2000 and 2012 in the Department of Otorhinolaryngology, Clinical Center of Banja Luka. Results. A total of 76 subjects were included in the study. The average age was 62.8 years. There were 40 (52.6% male and 36 (47.4% female patients. The largest number of patients (44.7% had type II angioedema. Almost half of the patients or 36 patients (47.4% were on treatment with an angiotensinconverting enzyme inhibitor (ACEi, but there was no statistically significant difference under the total number of patients (p=0.678. Conclusion. Better understanding of pathophysiologic mechanisms and the adoption of diagnostic protocols contributes to more effective treatment of angioedema.

  12. Epidemiology of angioedema without wheals in an allergy and immunology center.

    Science.gov (United States)

    Malbrán, Eloisa; Fernández Romero, Diego; Juri, Maria Cecilia; Larrauri, Blas J; Malbrán, Alejandro

    2015-01-01

    We describe the diagnostic epidemiology, the clinical course, the family history and the response to treatment of patients with angioedema without wheals (AWW) at an Allergy and Immunology Clinical Center. We reviewed the case records of all patients at our office from January 1997 to April 2013. We recorded sex, age, age at onset of symptoms, family history of angioedema, number of visits to the office, type of angioedema, and response to treatment from those patients with angioedema without wheals. We classified angioedema according to its pathophysiology. We also describe those patients with angioedema mimics. From a total of 17,823 new patients, 303 had a presumptive diagnosis of angioedema without wheals. Twenty-three patients had an angioedema mimic. Forty percent were male and 60% were female. Average age at first visit was 40.6. Average number of visits was 2.4. Fifty-seven patients referred a family history. We attributed idiopathic angioedema to 55.7% of patients, 24.3% were drug related, 15.7% were due to C1 inhibitor deficiency, 2.1% were drug related+idiopathic angioedema, 1.4% were type III and 0.7% had exercise-induced angioedema. Ninety six percent of 53 evaluable idiopathic angioedema patients referred a benefit with anti-histamine therapy. AWW was a rare cause of consultation. Most of our patients had anti H1 responsive idiopathic angioedema and none had allergic angioedema. Women cases prevailed over men's. Family history and average age of onset of symptoms were different among the different types of angioedema.

  13. Prevalence of autoantibodies in a group of hereditary angioedema patients Prevalência de autoanticorpos em uma população com angioedema hereditário

    Directory of Open Access Journals (Sweden)

    Sergio Duarte Dortas Junior

    2012-04-01

    Full Text Available Hereditary Angioedema is a dominantly inherited disease. Routine screening of autoantibodies (AAB is not recommended for individuals with Hereditary Angioedema; however, prevalence of these antibodies in Hereditary Angioedema patients is not well documented. We aim to determine the prevalence of AAB so that individuals at risk of developing autoimmune diseases can be identified. Fifteen patients with Hereditary Angioedema attended at Clementino Fraga Filho University Hospital accepted to participate in this study. Prevalence of AAB was 40%. Our data indicate high prevalence of AAB in patients with Hereditary Angioedema. Large-scale studies should be considered to determine the significance of these AAB in the follow-up care of patients with Hereditary Angioedema.O Angioedema Hereditário é uma doença autossômica dominante. A pesquisa de rotina para autoanticorpos não é recomendada para pacientes com Angioedema Hereditário; entretanto, a prevalência desses anticorpos em pacientes com Angioedema Hereditário não está bem documentada. Objetivamos determinar a prevalência de autoanticorpos para identificar indivíduos sob risco de desenvolver doenças autoimunes. Quinze pacientes com Angioedema Hereditário atendidos no Hospital Universitário Clementino Fraga Filho aceitaram participar do estudo. A prevalência de autoanticorpos foi de 40%. Nossos dados indicam alta prevalência de autoanticorpos em pacientes com Angioedema Hereditário. Estudos de maior escala deveriam ser considerados para determinar a significância desses autoanticorpos no acompanhamento clínico de pacientes com Angioedema Hereditário.

  14. Isotretinoin induced rash, urticaria, and angioedema: a case report

    Directory of Open Access Journals (Sweden)

    Zonunsanga

    2015-10-01

    Full Text Available Isotretinoin is a vitamin A analogue, which is readily isomerized to tretinoin. It causes normalization of abnormal keratinisation. It also reduces sebum secretion. It also has anti-inflammatory as well as antibacterial properties. It has some adverse effects like teratogenecity, hypertriglyceridemia, pancreatitis, dryness of skin, cheilitis, altered liver functions etc. A 25 years old unmarried lady presented with acne vulgaris, who did not showed improvements with conventional (antibiotics therapy was given isotretinoin. She developed maculopapular rash, urticaria and angioedema Isotretinoin induced urticarial rashes and angioedema is rarely reported as far as our knowledge is concerned.

  15. Angioedema-like allergic contact dermatitis related to black henna

    OpenAIRE

    Gokalp, Hilal; Kaya, Kismet

    2014-01-01

    Allergic contact dermatitis related to para-phenylendiamine (PPD) from temporary black henna tattoos and hair dyes has become an epidemic in recent years. Several cases of adverse skin reactions to PPD have been reported in the literature. Herein, we present a case of angioedema-like allergic contact dermatitis related to hair coloring with henna.

  16. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  17. Acute urticaria and angioedema caused by horse-chestnut (aesculus hippocastanum) ingestion: a case report

    OpenAIRE

    Akinci, Emine; OĞUZTÜRK, Oğuzhan; Coşkun, Figen

    2012-01-01

    Acute urticaria and angioedema, which can develop due to various causes, are common life threatening condition seen in emergency departments (EDs). The literature includes reports of angioedema cases developing after contacting various plants and seeds. We present the case of a 47-year-old male patient who developed acute urticaria and angioedema after eating horse-chestnut (aesculus hippocastanum). The patient presented to the ED with redness and irritation spread around the body and swellin...

  18. [Round Table: Urticaria and angioedema: introduction and classification].

    Science.gov (United States)

    Alonso Lebrero, E

    1999-01-01

    Urticaria and angioedema are common diseases in children and adults. Approximately 15-25% of the population will have urticaria or angioedema at least once in their life-time. Urticaria is characterized as the appearance of erythematous, circumscribed, elevated, pruritic, edematous swelling of the upper dermal tissue. Erythematous swelling of the deeper cutaneous and subcutaneous tissue is called angioedema. In angioedema lesions are less pruritic but pain and burning are common. Urticaria may occur in any part of the body, whereas angioedema often involves face, extremities or genitalia. In contrast to other forms of edema there are not symmetric distribution. Urticaria and angioedema are often associated. Urticaria is considered acute if symptoms are present for less than 6 weeks, but usually in childhood lesions disappear in a few days. In chronic urticaria symptoms are longer than 6 weeks; if the episodes were of shorter duration than the symptoms-free periods urticaria is considered recurrent. Acute urticaria has been reported to be the common type in childhood and chronic urticaria is more frequent in adults. Acute urticaria is usually a self-limited benign disease in young children. Nevertheless it is an uncomfortable nuisance, interfering daily activities and sleep, and produces psychosocial impact in patients and parents (an altered self-image is always an alarming situation). Urticaria is a frequent cause of emergency room visit but few patients need to be admitted. Urticaria has long been believed to be an allergic disease but clinically it has rare been proved to be so. The basic mechanism involves the release of diverse vasoactive mediators that arise from the activation of cells or enzymatic pathways. Histamine is the best known of these substances, and elicits the classic triple response consisting of vasodilatation (erythema), increased vascular permeability (edema) and an axon reflex that increases reaction. In contrast to simple symptoms and easy

  19. Transient small bowel angioedema due to intravenous iodinated contrast media

    OpenAIRE

    Hu, Xiu-Hua; Gong, Xiang-Yang; Hu, Peng

    2012-01-01

    Three cases of transient proximal small bowel angioedema induced by intravenous administration of nonionic iodinated contrast media (CM) are presented. Computed tomography (CT) images in the venous phase displayed the proximal small bowel with circumferential thickening of the wall including the duodenum and proximal segment of the jejunum. The bowel wall was normal in non-enhanced images, and normal or inconspicuous in arterial phase enhanced images. In one of the three cases, the bowel wall...

  20. Visceral Angioedema Induced by Angiotensin Converting Enzyme Inhibitor: Case Report

    OpenAIRE

    Beatriz Frutuoso; Joana Esteves; Mafalda Silva; Pedro Gil; Ana Cristina Carneiro; Sílvio Vale

    2016-01-01

    Introduction: Intestinal angioedema is a rare adverse effect of angiotensin converting enzyme inhibitors. Clinical case: A 42-year old woman presented to the Emergency Department complaining of diffuse abdominal pain, predominantly in the right quadrants, with no other associated symptoms. She had been started on perindopril plus indapamide 72 h before the admission for arterial hypertension. There was no other relevant background. Physical examination suggested peritoneal irritation...

  1. [Exercise-induced urticaria and angioedema - case report].

    Science.gov (United States)

    Stelmach, Iwona; Sztafińska, Anna; Lechańka, Joanna; Balcerak, Joanna; Jerzyńska, Joanna

    2014-01-01

    Urticaria is a heterogeneous group of disorders, with various clinical manifestations and intensity of symptoms. Urticaria can be induced with a wide variety of environmental stimuli, such as cold, pressure, vibration, sunlight, exercise, temperature changes, heat, and water. In a select group of patients, exercise can induce a spectrum of urticaria symptoms, ranging from cutaneous pruritus and warmth, generalised urticaria, angioedema, and the appearance of such additional manifestations as collapse, upper respiratory distress, and anaphylaxis. Specific provocation tests should be carried out on an individual basis to investigate the suspected cause and proper diagnosis. Modification of activities and behaviour is the mainstay of treatment in patients with physical urticaria. The aim of this study was to emphasise that primary care paediatricians should be able to recognise physical urticaria, supply a patient with rescue medications, and refer him/her to a specialist. In the article, the authors present a 13-year-old girl with typical urticaria lesions and angioedema after exercise. According to the history, physical examination, and provocation test, exercise-induced urticaria and angioedema were diagnosed.

  2. [Exercise-induced urticaria and angioedema - case report].

    Science.gov (United States)

    Stelmach, Iwona; Sztafińska, Anna; Lechańka, Joanna; Balcerak, Joanna; Jerzyńska, Joanna

    2014-01-01

    Urticaria is a heterogeneous group of disorders, with various clinical manifestations and intensity of symptoms. Urticaria can be induced with a wide variety of environmental stimuli, such as cold, pressure, vibration, sunlight, exercise, temperature changes, heat, and water. In a select group of patients, exercise can induce a spectrum of urticaria symptoms, ranging from cutaneous pruritus and warmth, generalised urticaria, angioedema, and the appearance of such additional manifestations as collapse, upper respiratory distress, and anaphylaxis. Specific provocation tests should be carried out on an individual basis to investigate the suspected cause and proper diagnosis. Modification of activities and behaviour is the mainstay of treatment in patients with physical urticaria. The aim of this study was to emphasise that primary care paediatricians should be able to recognise physical urticaria, supply a patient with rescue medications, and refer him/her to a specialist. In the article, the authors present a 13-year-old girl with typical urticaria lesions and angioedema after exercise. According to the history, physical examination, and provocation test, exercise-induced urticaria and angioedema were diagnosed. PMID:25133816

  3. Functional C1-inhibitor diagnostics in hereditary angioedema: assay evaluation and recommendations

    DEFF Research Database (Denmark)

    Wagenaar-Bos, Ineke G A; Drouet, Christian; Aygören-Pursun, Emel;

    2008-01-01

    their own assays and standards. A double-blind survey was conducted using plasma/serum samples from healthy donors and HAE patients and the uniformity of HAE diagnosis was evaluated. It can be concluded that the diagnosis of fC1-Inh deficiency was made correctly in most cases in this survey. We can...... especially useful when a laboratory first starts to offer assays on fC1-Inh for HAE diagnosis. In the present study we evaluated the performance of fC1-Inh assays in the 15 different laboratories that are specialised in HAE diagnostics and assessed inter-laboratory variation with each laboratory using...

  4. Pharmacogenetics of ACE inhibitor-induced angioedema and cough : a systematic review and meta-analysis

    NARCIS (Netherlands)

    Mahmoudpour, Seyed Hamidreza; Leusink, Maarten; van der Putten, Lisa; Terreehorst, Ingrid; Asselbergs, Folkert W.; de Boer, Anthonius; Maitland-van der Zee, Anke H.

    2013-01-01

    Aim: Angioedema and cough are the two most important adverse effects of ACE inhibitors (ACEIs). Evidence exists that ACEI-related angioedema/cough is partly genetically determined and several genes have been identified to play a role in the development of ACEI-related adverse effects. Materials & me

  5. Immunomodulatory Effects of Balneotherapy with Hae-Un-Dae Thermal Water on Imiquimod-Induced Psoriasis-Like Murine Model

    OpenAIRE

    Lee, Young Bok; Lee, Jun Young; Lee, Hye Jin; Yun, Seong Taek; Lee, Jong Tae; Kim, Hong Jig; Yu, Dong Soo; Woo, So Youn; Kim, Jin-Wou

    2014-01-01

    Background Balneotherapy, although not a well-established dermatological treatment, is thought to have therapeutic properties for psoriasis and is used as an alternative treatment modality throughout the world. Objective To evaluate the mechanism underlying the therapeutic immunologic effects of thermomineral water. Methods A murine model of imiquimod-induced psoriasis-like skin inflammation was used for evaluating the therapeutic effects of balneotherapy with Hae-Un-Dae hot spring mineral wa...

  6. Disrupting ER-associated protein degradation suppresses the abscission defect of a weak hae hsl2 mutant in Arabidopsis

    Science.gov (United States)

    Baer, John; Taylor, Isaiah; Walker, John C.

    2016-01-01

    In Arabidopsis thaliana, the process of abscission, or the shedding of unwanted organs, is mediated by two genes, HAESA (HAE) and HAESA-LIKE 2 (HSL2), encoding receptor-like protein kinases (RLKs). The double loss-of-function mutant hae-3 hsl2-3 is completely deficient in floral abscission, but, interestingly, the hae-3 hsl2-9 mutant displays a less severe defect. This mutant was chosen for an ethyl methanesulfonate (EMS) screen to isolate enhancer and suppressor mutants, and two such suppressors are the focus of this study. Pooled DNA from the F2 generation of a parental backcross was analyzed by genome sequencing to reveal candidate genes, two of which complement the suppressor phenotype. These genes, EMS-MUTAGENIZED BRI1 SUPPRESSOR 3 (EBS3) and EBS4, both encode mannosyltransferases involved in endoplasmic reticulum (ER)-associated degradation (ERAD) of proteins. Further analysis of these suppressor lines revealed that suppressor mutations are acting solely on the partially functional hsl2-9 mutant receptor to modify the abscission phenotype. Expressing a hsl2-9–yellow fluorescent protein (YFP) transgene in ebs3 mutants yields a higher fluorescent signal than in EBS3/ebs3, suggesting that these mutants restore abscission by disrupting ERAD to allow accumulation of the hsl2-9 receptor, which probably escapes degradation to be trafficked to the plasma membrane to regain signaling. PMID:27566817

  7. GHRH|HaeIII Gene Polymorphism in Dairy and Beef Cattle at National Livestock Breeding Centers

    Directory of Open Access Journals (Sweden)

    A. O. Rini

    2013-12-01

    Full Text Available This study was aimed to identify polymorphism of growth hormone releasing hormone (GHRH gene in 89 heads of Holstein-Friesian (HF dairy cattle from Lembang Artificial Insemination Center/LAIC (17 bulls, Singosari Artificial Insemination Center/SAIC (32 bulls, and Cipelang Livestock Embryo Center/CLEC (40 cows; as well as in 4 breeds of female beef cattle from CLEC for comparison, providing Simmental (13 cows, Limousin (14 cows, Brahman (5 cows, and Angus (5 cows. This study used PCR-RFLP method by using HaeIII restriction enzyme. The enzyme cut the GHRH gene at nucleotides of GG|CC at the base positions of 118, 312, and 406 and produced 4 fragments of 118, 194, 94, and 45 bp respectively. Genotyping the GHRH gene produced two types of allele, namely A (312, 94, and 45 bp and B (194, 118, 94, and 45 bp. These two alleles resulted in three types of genotype, namely AA (312, 94, and 45 bp, AB (312, 194, 118, 94, and 45 bp, and BB (194, 118, 94, and 45 bp. Frequency of the B allele was dominant to the A allele. Chi-Square analysis showed that all of HF dairy and beef cattle observed were in Hardy-Weinberg equilibrium (X2 < X2(0.05. The highest heterozygosity value was 0.471 for HF bulls in LAIC, while the lowest one was for HF bulls in SAIC. Heterozygosity values in Simmental and Limousin cattles were higher than that of in HF cattle. The GHRH gene in HF and beef cattle was polymorphic, the exception was for Brahman with the only B allele. This result will improve the understanding of the polymorphism of GHRH gene in dairy and beef cattle.

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  9. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  10. Angioedema: Classification, management and emerging therapies for the perioperative physician

    Directory of Open Access Journals (Sweden)

    Lopa Misra

    2016-01-01

    Full Text Available Angioedema is a rare condition which manifests as sudden localised, non-pitting swelling of certain body parts including skin and mucous membranes. It is vital that anaesthesiologists understand this condition, as it may present suddenly in the perioperative period with airway compromise. To identify literature for this review, the authors searched the PubMed, Medline, Embase, Scopus and Web of Science databases for English language articles covering a 10-year period, 2006 through 2016. Angioedema can be either mast-cell mediated or bradykinin-induced. Older therapies for histaminergic symptoms are well known to anaesthesiologists (e.g., adrenaline, anti-histamines and steroids, whereas older therapies for bradykinin-induced symptoms include plasma and attenuated androgens. New classes of drugs for bradykinin-induced symptoms are now available, including anti-bradykinin, plasma kallikrein inhibitor and C1 esterase inhibitors. These can be used prophylactically or as rescue medications. Anaesthesiologists are in a unique position to coordinate perioperative care for this complex group of patients.

  11. Angioedema: Classification, management and emerging therapies for the perioperative physician.

    Science.gov (United States)

    Misra, Lopa; Khurmi, Narjeet; Trentman, Terrence L

    2016-08-01

    Angioedema is a rare condition which manifests as sudden localised, non-pitting swelling of certain body parts including skin and mucous membranes. It is vital that anaesthesiologists understand this condition, as it may present suddenly in the perioperative period with airway compromise. To identify literature for this review, the authors searched the PubMed, Medline, Embase, Scopus and Web of Science databases for English language articles covering a 10-year period, 2006 through 2016. Angioedema can be either mast-cell mediated or bradykinin-induced. Older therapies for histaminergic symptoms are well known to anaesthesiologists (e.g., adrenaline, anti-histamines and steroids), whereas older therapies for bradykinin-induced symptoms include plasma and attenuated androgens. New classes of drugs for bradykinin-induced symptoms are now available, including anti-bradykinin, plasma kallikrein inhibitor and C1 esterase inhibitors. These can be used prophylactically or as rescue medications. Anaesthesiologists are in a unique position to coordinate perioperative care for this complex group of patients. PMID:27601734

  12. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  13. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  14. [Panic attack].

    Science.gov (United States)

    Scantamburlo, G; Ansseau, M

    2004-05-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. PMID:15264579

  15. Amitriptyline and bromazepam in the treatment of vibratory angioedema: which role for neuroinflammation?

    Science.gov (United States)

    Guarneri, Fabrizio; Guarneri, Claudio; Marini, Herbert Ryan

    2014-01-01

    Vibratory angioedema is a rare form of physical urticaria, hereditary or acquired, which occurs at body sites exposed to vibrations. Pathogenic mechanisms of disease are not completely clear and, consequently, current pharmacological treatment is sometimes unsatisfactory. We report the case of a horn player affected by acquired vibratory angioedema, relapsing after prolonged use of the instrument and resistant to systemic antihistamines and corticosteroids, which successfully responded to therapy with low doses of amitriptyline and bromazepam. A neuroinflammatory mechanism can be likely implicated in the pathogenesis of vibratory angioedema, in line with many different cutaneous/mucosal diseases involving a complex interplay of homeostatic/allostatic systems. Furthermore, in mucosal diseases, such as vibratory angioedema, physical/psychological stressors have a relevant role. In such cases, because of the complex interplay between nervous and immune system, the pharmacological activity of benzodiazepines and typical antidepressants may downregulate neuroinflammation. PMID:25052839

  16. Angiodema due to oral acitretin and isotretinoin Angioedema por acitretina e isotretinoína oral

    OpenAIRE

    Roberto Rheingantz da Cunha Filho; Hiram Larangeira de Almeida Jr.; Juliano de Avelar Breunig

    2011-01-01

    Angioedema may be caused by nonsteroidal antiinflammatory drugs, angiotensin- converting enzyme inhibitors, radiocontrast media, antibiotics, sea food etc. It can involve an allergic (IgE-mediated) or non-allergic hypersensitivity reaction, both with a similar clinical presentation. While angioedema due to isotretionin has been described previously, this is the first description of angiodema due to acitretin. We report two uncommon cases of palpebral and labial angiodema due to retinoids, by ...

  17. Angioedema por rellenos faciales: Descripción de cinco casos

    Directory of Open Access Journals (Sweden)

    Micaela A. Cosatti

    2010-12-01

    Full Text Available En los últimos años se ha incrementado la utilización de sustancias de relleno facial con fines estéticos. Estos productos, originalmente considerados inertes, se asocian con diversos efectos adversos localizados alrededor del sitio de la aplicación. Describimos a 5 mujeres con antecedentes de inyecciones de sustancia de relleno facial que presentaron como síntoma inicial angioedema facial duro y persistente seguido por la aparición de nódulos subcutáneos. Todas las pacientes fueron derivadas al servicio de alergia por sospecha de angioedema de causa alérgica sin respuesta al tratamiento con antihistamínicos. El angioedema inició 27.6 meses (1 a 48 luego de la inyección del producto, y las pacientes evolucionaron con brotes y remisiones que fueron tratados con corticoides orales y en 2 oportunidades con inyecciones locales. El tiempo medio desde el inicio de los síntomas hasta la remisión del angioedema fue 8.75 meses (1 a 24. A octubre de 2009 cuatro pacientes se mantuvieron en remisión persistente, luego de un seguimiento clínico de 24.5 meses (7 a 36. Una paciente continúa con exacerbaciones luego de 11 meses de iniciados los síntomas. Las sustancias de relleno facial pueden producir angioedema como evento adverso y deben ser consideradas en el diagnóstico diferencial del angioedema persistente. Sólo responden al tratamiento con esteroides y en algunos casos esteroides dependientes, con ciclosporina. La frecuencia de angioedema por rellenos faciales entre pacientes con angioedema asistidos en la Unidad de Asma, Alergia e Inmunología Clínica fue del 0.5%.

  18. Anaphylactoid reactions and angioedema during alteplase treatment of acute ischemic stroke

    OpenAIRE

    Hill, M D; Barber, P.A.; Takahashi, J.; Demchuk, A.M.; Feasby, T E; Buchan, A M

    2000-01-01

    Among 105 patients given recombinant tissue plasminogen activator (rt-PA, alteplase) intravenously for acute stroke, 2 (1.9%) had lingual angioedema, which progressed to a fatal anaphylactoid reaction in 1. The authors review the 2 cases and possible mechanisms responsible. They warn that patients who are taking an angiotensin-converting-enzyme inhibitor may be at increased risk for angioedema with concomitant alteplase therapy.

  19. ACE-I Angioedema: Accurate Clinical Diagnosis May Prevent Epinephrine-Induced Harm

    Directory of Open Access Journals (Sweden)

    R. Mason Curtis

    2016-06-01

    Full Text Available Introduction: Upper airway angioedema is a life-threatening emergency department (ED presentation with increasing incidence. Angiotensin-converting enzyme inhibitor induced angioedema (AAE is a non-mast cell mediated etiology of angioedema. Accurate diagnosis by clinical examination can optimize patient management and reduce morbidity from inappropriate treatment with epinephrine. The aim of this study is to describe the incidence of angioedema subtypes and the management of AAE. We evaluate the appropriateness of treatments and highlight preventable iatrogenic morbidity. Methods: We conducted a retrospective chart review of consecutive angioedema patients presenting to two tertiary care EDs between July 2007 and March 2012. Results: Of 1,702 medical records screened, 527 were included. The cause of angioedema was identified in 48.8% (n=257 of cases. The most common identifiable etiology was AAE (33.1%, n=85, with a 60.0% male predominance. The most common AAE management strategies included diphenhydramine (63.5%, n=54, corticosteroids (50.6%, n=43 and ranitidine (31.8%, n=27. Epinephrine was administered in 21.2% (n=18 of AAE patients, five of whom received repeated doses. Four AAE patients required admission (4.7% and one required endotracheal intubation. Epinephrine induced morbidity in two patients, causing myocardial ischemia or dysrhythmia shortly after administration. Conclusion: AAE is the most common identifiable etiology of angioedema and can be accurately diagnosed by physical examination. It is easily confused with anaphylaxis and mismanaged with antihistamines, corticosteroids and epinephrine. There is little physiologic rationale for epinephrine use in AAE and much risk. Improved clinical differentiation of mast cell and non-mast cell mediated angioedema can optimize patient management.

  20. Rituximab therapy in a patient with low grade B-cell lymphoproliferative disease and concomitant acquired angioedema

    Directory of Open Access Journals (Sweden)

    Kaur R

    2014-12-01

    Full Text Available Ravdeep Kaur, Aerik Anthony Williams, Catherine Baker Swift, Jason W Caldwell Wake Forest University School of Medicine, Wake Forest University, Winston-Salem, NC, USA Abstract: Acquired angioedema is often associated with significant morbidity. An underlying lymphatic malignancy, autoimmune disorder, adenocarcinoma, or other malignancy may be present. Screening for these disorders should occur in all patients with acquired angioedema as treatment may result in resolution of angioedema. Keywords: complement, C1-INH deficiency, ecallantide, hemopathy

  1. BSACI guideline for the management of chronic urticaria and angioedema.

    Science.gov (United States)

    Powell, R J; Leech, S C; Till, S; Huber, P A J; Nasser, S M; Clark, A T

    2015-03-01

    This guidance for the management of patients with chronic urticaria and angioedema has been prepared by the Standards of Care Committee of the British Society for Allergy and Clinical Immunology (BSACI). The guideline is based on evidence as well as on expert opinion and is aimed at both adult physicians and paediatricians practising in allergy. The recommendations are evidence graded. During the development of these guidelines, all BSACI members were included in the consultation process using a Web-based system. Their comments and suggestions were carefully considered by the Standards of Care Committee. Where evidence was lacking, a consensus was reached by the experts on the committee. Included in this management guideline are clinical classification, aetiology, diagnosis, investigations, treatment guidance with special sections on children with urticaria and the use of antihistamines in women who are pregnant or breastfeeding. Finally, we have made recommendations for potential areas of future research.

  2. Presence of C1-Inhibitor Polymers in a Subset of Patients Suffering from Hereditary Angioedema

    DEFF Research Database (Denmark)

    Elenius Madsen, Daniel; Hansen, Søren; Gram, Jørgen Brodersen;

    2014-01-01

    , and it is speculated that C1-inh polymers may exist in patient plasma, challenging the current classification of HAE patients. To investigate the presence of C1-inh polymers in patient plasma samples, we developed an immunological method, where monoclonal antibodies produced against polymerized C1-inh were applied...... in native PAGE western blotting. Using this approach we analyzed genuine plasma samples from 31 Danish HAE families, and found that plasma samples from three genotypically distinct HAE type I families (classified upon C1-inh plasma concentrations) contained C1-inh polymers. Identical C1-inh polymerization....... Subjects suffering from HAE have been classified in type I patients with decreased functional and antigenic levels of C1-inh, and type II patients with decreased functional but normal antigenic C1-inh levels. However, a few reports have demonstrated that some mutations cause C1-inh polymerization in vitro...

  3. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  4. Lactobacillus plantarum LG42 Isolated from Gajami Sik-Hae Inhibits Adipogenesis in 3T3-L1 Adipocyte

    Directory of Open Access Journals (Sweden)

    Jeong-Eun Park

    2013-01-01

    Full Text Available We investigated whether lactic acid bacteria isolated from gajami sik-hae (GLAB are capable of reducing the intracellular lipid accumulation by downregulating the expression of adipogenesis-related genes in differentiated 3T3-L1 cells. The GLAB, Lactobacillus plantarum LG42, significantly decreased the intracellular triglyceride storage and the glycerol-3-phosphate dehydrogenase (GPDH activity in a dose-dependent manner. mRNA expression of transcription factors like peroxisome proliferator-activated receptor (PPAR γ and CCAAT/enhancer-binding protein (C/EBP α involved in adipogenesis was markedly decreased by the GLAB treatment. Moreover, the GLAB also decreased the expression level of adipogenic markers like adipocyte fatty acid binding protein (aP2, leptin, GPDH, and fatty acid translocase (CD36 significantly. These results suggest that the GLAB inhibits lipid accumulation in the differentiated adipocyte through downregulating the expression of adipogenic transcription factors and other specific genes involved in lipid metabolism.

  5. Mars attacks.

    Science.gov (United States)

    Cohain, Judy Slome

    2008-01-01

    "Mars Attacks" is a new term coined to describe unjustified violation of women by care providers at the time of birth, as well as the purposeful abandonment of the peer review system by major obstetric journals and the abandonment of the use of research evidence by ACOG in their latest protocols, in order to justify continued use of this form of violence against women. PMID:19244777

  6. [A Case of Life-Threatening Angioedema Occurred During Prolonged Angiotensin-Converting Enzyme Inhibitor Treatment].

    Science.gov (United States)

    Nakamura, Rintaro; Nihei, Shun-Ichi; Arai, Hideaki; Nagata, Keiji; Isa, Yasuki; Harayama, Nobuya; Aibara, Keiji; Kamochi, Msayuki

    2016-03-01

    Although angiotensin-converting enzyme (ACE) inhibitors are widely used as the first choice drug for treating hypertension, we have only a superficial understanding of their relationship to angioedema. We report a case of life-threatening angioedema. The case was a 60-year-old man who had been taking an ACE inhibitor for hypertension for 11 years. He visited his home doctor for dyspnea, and tongue and neck swelling. He was transported to our hospital because of the possibility of airway obstruction. On admission, his tongue and neck swelling became more severe. We performed an intubation using an endoscope and started airway management. We also stopped his ACE inhibitor. The severe tongue and neck swelling improved gradually and he was extubated on day 3. On the fifth day he was discharged. We diagnosed angioedema caused by an ACE inhibitor. Although the risk of airway obstruction with ACE inhibitors is acknowledged, we have only a superficial understanding of how prolonged ACE inhibitor treatment induces angioedema. So we should consider angioedema in cases of taking ACE inhibitors, especially in cases of prolonged treatment. PMID:26972946

  7. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  8. Management of upper airway edema caused by hereditary angioedema

    Directory of Open Access Journals (Sweden)

    Farkas Henriette

    2010-07-01

    Full Text Available Abstract Hereditary angioedema is a rare disorder with a genetic background involving mutations in the genes encoding C1-INH and of factor XII. Its etiology is unknown in a proportion of cases. Recurrent edema formation may involve the subcutis and the submucosa - the latter can produce obstruction in the upper airways and thereby lead to life-threatening asphyxia. This is the reason for the high, 30-to 50-per-cent mortality of undiagnosed or improperly managed cases. Airway obstruction can be prevented through early diagnosis, meaningful patient information, timely recognition of initial symptoms, state-of-the-art emergency therapy, and close monitoring of the patient. Prophylaxis can substantially mitigate the risk of upper airway edema and also improve the patients' quality of life. Notwithstanding the foregoing, any form of upper airway edema should be regarded as a potentially life-threatening condition. None of the currently available prophylactic modalities is capable of preventing UAE with absolute certainty.

  9. Angiodema due to oral acitretin and isotretinoin Angioedema por acitretina e isotretinoína oral

    Directory of Open Access Journals (Sweden)

    Roberto Rheingantz da Cunha Filho

    2011-08-01

    Full Text Available Angioedema may be caused by nonsteroidal antiinflammatory drugs, angiotensin- converting enzyme inhibitors, radiocontrast media, antibiotics, sea food etc. It can involve an allergic (IgE-mediated or non-allergic hypersensitivity reaction, both with a similar clinical presentation. While angioedema due to isotretionin has been described previously, this is the first description of angiodema due to acitretin. We report two uncommon cases of palpebral and labial angiodema due to retinoids, by acitretin and oral isotretinoin respectively: a 48-year-old man with psoriasis and a 24-year-old woman with severe acne resistant to antibiotics and topical drugs. In both cases the reaction persisted through-out treatment with these drugs, but resolved quickly after discontinuation. Reintroduction of the drugs brought on angioedema againAngioedema pode ser causado por diversos fármacos como : antiinflamatórios não-esteroidais, inibidores da ECA, contrastes, antibióticos e frutos do mar, entre outras causas. Pode ser uma reação alérgica, mediada por IgE, ou não-alérgica, com apresentações clínicas semelhantes. Angioedema por isotretinoína já foi relatado, mas não por acitretina. Relatamos dois casos, uma com angioedema palpebral e um labial, por acitretina e isotretinoína, respectivamente: um paciente de 48 anos com psoríase e uma paciente de 24 anos com acne resistente à terapia convencional. Em ambos casos a afecção persistiu durante o tratamento, resolveu com a interrupção e recidivou com reexposição

  10. Disease: H01006 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available H01006 Hereditary angioedema Hereditary angioedema (HAE) is a rare genetic disorder...l 41:114-22 (2011) PMID:19160940 (drug) Reshef A, Leibovich I, Goren A Hereditary angioedema: new hopes for

  11. [Edematous syndromes caused by capillary hyperpermeability. Diffuse angioedema].

    Science.gov (United States)

    Lagrue, G; Behar, A; Maurel, A

    1989-01-01

    Edema due to increased capillary permeability (ICP) may be diffuse or localized. Local edemas (Quincke edema, angioneurotic edema) are most often allergic or very rarely due to a defect in C1-inhibitor. Generalized edemas due to ICP share the following clinical features: Fluid retention (subcutaneous edema and diffused swelling) is predominant in lower limbs; it is worsened by orthostatism and warmth and alleviated by decubitus and cold, with important weight variations between morning and evening. It is associated with enhanced thirst, hypotension, oliguria, headaches and blood volume reduction; secondary hyperaldosteronism is the main mechanism. These troubles are due to ICP, associated with lymphatic drainage abnormalities; ICP is measured by the isotopic Landis Test. This abnormality is present in several diseases. Idiopathic orthostatic edema (IOE) is frequent and often unrecognized, occurring mainly in women, often associated with luteal insufficiency. Iatrogenic complications (diuretic and laxative abuses) are frequently superimposed. ICP may be corrected by vitamins P (rutin, anthocyanosides, diosmin, Ginkgo biloba extracts...) Cyclic shock due to ICP is rare. It is characterized by cyclic edema and shock with hypovolemia, hypoproteinemia; the mechanism of shock is a severe loss of fluid and protein from the vascular bed. It is often associated with monoclonal gammapathy and complement activation. In our personal case, the trouble in CP was present all along the disease with permanent edema and low blood pressure (especially in orthostatism). Vit "P" and Ginkgo biloba extracts were able to partially improve CP and the clinical troubles. However, in spite of this treatment a fatal shock occurred after ten years follow-up. Episodic angioedema associated with eosinophilia was first described by Gleich.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:2778397

  12. Rhucin, a recombinant C1 inhibitor for the treatment of hereditary angioedema and cerebral ischemia.

    Science.gov (United States)

    Longhurst, Hilary

    2008-03-01

    Pharming NV and Esteve are developing Rhucin, a recombinant human C1 esterase inhibitor. Rhucin is currently undergoing phase III clinical trials in North America and is awaiting regulatory approval in Western Europe for the treatment of prophylactic and acute hereditary angioedema. Pharming is also investigating Rhucin for the potential treatment of cerebral ischemic injury. PMID:18311668

  13. Cricothyroidotomy in a angiotensin-converting enzyme (ACE Inhibitor tongue´s angioedema.

    Directory of Open Access Journals (Sweden)

    Acle-Cervera L, Morales-Angulo C, García-Zornoza R, Rubio Suárez A

    2013-01-01

    Full Text Available Hereditary angioedema by inhibitors of Angiotensin Converting Enzyme(ACE is a very rare disorder. It usually affects the upper airway mucosa andproduce rapidly evolving acute exacerbations requiring urgent treatment.We repost the case of a patient being treated with ACE inhibitors and anreview of prevalence, pathophysiology and management of angioedemawith ACE inhibitors for treatment and the latest treatments.

  14. Postanesthetic Severe Oral Angioedema in Patient’s Taking Angiotensin-Converting Enzyme Inhibitor

    Directory of Open Access Journals (Sweden)

    Acílio Marques

    2014-01-01

    Full Text Available Angiotensin-converting enzyme (ACE inhibitors are the leading cause of a drug-induced angioedema. This occurrence is frequently underdiagnosed, but its relapse can be life-threatening. The authors’ intention in reporting this clinical case is to sound a warning about reviewing attitudes and surveillance to try to improve patient perioperative safety.

  15. Rhucin, a recombinant C1 inhibitor for the treatment of hereditary angioedema and cerebral ischemia.

    Science.gov (United States)

    Longhurst, Hilary

    2008-03-01

    Pharming NV and Esteve are developing Rhucin, a recombinant human C1 esterase inhibitor. Rhucin is currently undergoing phase III clinical trials in North America and is awaiting regulatory approval in Western Europe for the treatment of prophylactic and acute hereditary angioedema. Pharming is also investigating Rhucin for the potential treatment of cerebral ischemic injury.

  16. Asymmetric oro-facial angioedema following alteplase for acute ischaemic stroke.

    Science.gov (United States)

    Wu, Teddy Y; Wei, Diana Y; Baker, Yvette; Sharkey, Brendan; Frith, Richard W

    2014-11-01

    We present a patient with asymmetric oro-facial angioedema following thrombolysis for acute ischaemic stroke with serial photographs of this phenomenon. We discuss the mechanism for the development of asymmetric oro-facial oedema following thrombolysis and suggest a management plan. PMID:24974191

  17. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  18. A Quest for PMS candidate stars at low metallicity: Variable HAe/Be and Be stars in the Small Magellanic Cloud

    CERN Document Server

    De Wit, W J; Lamers, Henny J G L M; Lesquoy, E; Marquette, J B

    2003-01-01

    We report the discovery of 5 new Herbig Ae/Be candidate stars in the Small Magellanic Cloud in addition to the 2 reported in Beaulieu et al. (2001). We discuss these 7 HAeBe candidate stars in terms of (1) their irregular photometric variability, (2) their near infrared emission, (3) their Halpha emission and (4) their spectral type. One star has the typical photometric behaviour that is observed only among Pre-Main Sequence UX Orionis type stars. The objects are more luminous than Galactic HAeBe stars and Large Magellanic Cloud HAeBe candidates of the same spectral type. The stars were discovered in a systematic search for variable stars in a subset of the EROS2 database consisting of 115,612 stars in a field of 24x24 arcmin in the Small Magellanic Cloud. In total we discovered 504 variable stars. After classifying the different objects according to their type of variability, we concentrate on 7 blue objects with irregular photometric behaviour. We cross-identified these objects with emission line catalogues...

  19. Fibronectin gene polymorphisms and clinical manifestations of mixed cryoglobulinemic syndrome: increased risk of lymphoma associated to MspI DD and HaeIII AA genotypes

    Directory of Open Access Journals (Sweden)

    C. Fabro

    2011-09-01

    Full Text Available Objective: To analyse FN gene polymorphisms in type II mixed cryoglobulinemic syndrome (MCsn, an immune-complex mediated systemic vasculitis linked to hepatitis C virus (HCV infection and characterized by rheumatoid factor (RF positive B-cell proliferation at high risk for the progression into non Hodgkin’s lymphoma (NHL. Methods: Samples from eighty-one patients, with MCsn (type II serum cryoglobulins and clinical signs of vasculitis were studied. Sixthy-five (65/81, 80.3% patients were HCV-positive. Twenty-one (25.9% patients had developed a B-cell NHL during the course of MCsn. Seventy-two patients with HCV-negative and MC-unrelated NHL and 110 healthy blood donors (HBDs were taken as controls. HaeIIIb and MspI FN gene polymorphisms were analysed by PCR and specific restriction enzyme digestions, following reported procedures. Plasma FN levels were analysed by ELISA, whenever possible. Results: HaeIIIb and MspI allele and genotype frequencies did not differ between MCsn patients and HBDs. Of note, the DD-MspI (OR=5.56; CI=1.67-18.51, p=0.0046 and the AA-HaeIIIb (OR=5.54; CI=1.64-18.76, p=0.0066 homozygosis appeared significantly and independently associated with the development of B-cell NHL in MCsn patients, with the HaeIIIb A allele possibly conferring an increased risk of NHL in the general population (OR=1.72, CI=1.128- 2.635, p=0.0133. In contrast, the major vasculitic manifestations, such as peripheral neuropathy, skin ulcers and glomerulonephritis tended to be associated with the counterpart MspI C allele. No association between FN plasma levels and FN genotypes was found. Conclusion: Genotyping for MspI and HaeIIIb FN gene polymorphisms may be clinically relevant to define the predisposition to the major clinical manifestations in MCsn.

  20. The Humanistic, Societal, and Pharmaco-economic Burden of Angioedema

    DEFF Research Database (Denmark)

    Longhurst, Hilary; Bygum, Anette

    2016-01-01

    nature of the disorder, the lack of awareness of this ultra-rare condition amongst medical personnel, lack of specialist centers, and limited treatment options have contributed to under-diagnosis and under-treatment of the condition. Incorrect treatment of attacks has been common, even when medical help...

  1. Recombinant replacement therapy for hereditary angioedema due to C1 inhibitor deficiency.

    Science.gov (United States)

    Moldovan, Dumitru; Bernstein, Jonathan A; Cicardi, Marco

    2015-01-01

    Hereditary angioedema is a rare genetic condition transmitted as an autosomal dominant trait and characterized most commonly by the production of either inadequate or nonfunctioning C1 esterase inhibitor (C1-INH), a blood protein that regulates proteases in the complement, fibrinolytic and contact systems. Patients with hereditary angioedema suffer from episodic, unpredictable manifestations of edema affecting multiple anatomical locations, including the GI tract, facial tissue, the upper airway, oropharynx, urogenital region and/or the arms and legs. A rational approach to treatment is replacement of C1-INH protein, to normalize the levels of C1-INH activity and halt the progression of the biochemical activation processes underlying the edema formation. Ruconest is a highly purified recombinant human C1-INH. This article will focus on the results of ten clinical studies demonstrating the efficacy and safety of Ruconest(®) (Pharming Group NV, Leiden, the Netherlands), which is now approved for use in Europe, Israel and the USA. PMID:26250409

  2. Recombinant replacement therapy for hereditary angioedema due to C1 inhibitor deficiency.

    Science.gov (United States)

    Moldovan, Dumitru; Bernstein, Jonathan A; Cicardi, Marco

    2015-01-01

    Hereditary angioedema is a rare genetic condition transmitted as an autosomal dominant trait and characterized most commonly by the production of either inadequate or nonfunctioning C1 esterase inhibitor (C1-INH), a blood protein that regulates proteases in the complement, fibrinolytic and contact systems. Patients with hereditary angioedema suffer from episodic, unpredictable manifestations of edema affecting multiple anatomical locations, including the GI tract, facial tissue, the upper airway, oropharynx, urogenital region and/or the arms and legs. A rational approach to treatment is replacement of C1-INH protein, to normalize the levels of C1-INH activity and halt the progression of the biochemical activation processes underlying the edema formation. Ruconest is a highly purified recombinant human C1-INH. This article will focus on the results of ten clinical studies demonstrating the efficacy and safety of Ruconest(®) (Pharming Group NV, Leiden, the Netherlands), which is now approved for use in Europe, Israel and the USA.

  3. Conservation of the abscission signaling peptide IDA during Angiosperm evolution: withstanding genome duplications and gain and loss of the receptors HAE/HSL2

    Directory of Open Access Journals (Sweden)

    Ida M. Stø

    2015-10-01

    Full Text Available The peptide INFLORESCENCE DEFICIENT IN ABSCISSION (IDA, which signals through the leucine-rich repeat receptor-like kinases HAESA (HAE and HAESA-LIKE2 (HSL2, controls different cell separation events in Arabidopsis thaliana. We hypothesize the involvement of this signaling module in abscission processes in other plant species even though they may shed other organs than A. thaliana. As the first step towards testing this hypothesis from an evolutionarily perspective we have identified genes encoding putative orthologues of IDA and its receptors by BLAST searches of publically available protein, nucleotide and genome databases for angiosperms. Genes encoding IDA or IDA-LIKE (IDL peptides and HSL proteins were found in all investigated species, which were selected as to represent each angiosperm order with available genomic sequences. The 12 amino acids representing the bioactive peptide in A. thaliana have virtually been unchanged throughout the evolution of the angiosperms; however, the number of IDL and HSL genes varies between different orders and species. The phylogenetic analyses suggest that IDA, HSL2 and the related HSL1 gene, were present in the species that gave rise to the angiosperms. HAE has arisen from HSL1 after a genome duplication that took place after the monocot - eudicots split. HSL1 has also independently been duplicated in the monocots, while HSL2 has been lost in gingers (Zingiberales and grasses (Poales. IDA has been duplicated in eudicots to give rise to functionally divergent IDL peptides. We postulate that the high number of IDL homologs present in the core eudicots is a result of multiple whole genome duplications. We substantiate the involvement of IDA and HAE/HSL2 homologs in abscission by providing gene expression data of different organ separation events from various species.

  4. Per una retorica intermediale: corpo femminile, pubblicità e ideologia nelle opere digitali di Young-Hae Chang Heavy Industries

    Directory of Open Access Journals (Sweden)

    Beatrice Seligardi

    2014-06-01

    Full Text Available L'articolo si propone di analizzare, in prospettiva intermediale, due opere digitali di Young-Hae Chang Heavy Industries: "Cunnilingus in North Korea" e "Samsung Means To Come". Si tratta di animazioni in Adobe Flash che combinano testi e musica jazz, e sono visibili da parte di qualunque utente sul sito web del gruppo http://www.yhchang.com/. L’attenzione si concentrerà sulle scelte retoriche e stilistiche degli artisti attraverso cui viene problematizzato in maniera controversa il rapporto fra corpo femminile, tecnologia e poteri dominanti.

  5. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  6. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  7. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  8. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  9. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  10. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  11. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  12. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  13. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  14. Orolingual angioedema to alteplase. Identify, counsel and monitor at risk patients.

    Science.gov (United States)

    Timmis, Christopher; Epstein, Elliot; Salim, Mohmad

    2016-01-01

    Orolingual angioedema (OLA) is a known complication of intravenous alteplase used to treat ischaemic stroke. The incidence may be as high as 5.1%. ACE inhibitors are thought to increase the risk of developing this potentially life-threatening complication. This case report demonstrates how we may improve in the identification of risk factors in the history; the counselling of patients appropriately; in seeking alternative therapies such as mechanical thrombectomy; and in the monitoring of patients for signs of OLA once alteplase has been given. PMID:27591036

  15. Transient angioedema of small bowel secondary to intravenous iodinated contrast medium

    Directory of Open Access Journals (Sweden)

    Kirankumar N Kulkarni

    2014-01-01

    Full Text Available We report the clinical details and imaging findings of a case of transient angioedema of the small bowel following intravenous administration of non-ionic iodinated contrast material in a 17 year old female with no predisposing risk factors. Findings included long segment, symmetric, circumferential, low-density, bowel wall thickening involving the duodenum, jejunum, and most of the ileum on computed tomography scan obtained at 7 min following intravenous contrast material injection. This entity is self-limiting with a favourable clinical outcome and requires no specific treatment but only aggressive clinical monitoring.

  16. Building Computer Network Attacks

    CERN Document Server

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  17. Building Computer Network Attacks

    OpenAIRE

    Futoransky, Ariel; Notarfrancesco, Luciano; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities o...

  18. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  19. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  20. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  1. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  2. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  3. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  4. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  6. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  8. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  9. Acutely Onset Amiodarone-Induced Angioedema in a Patient with New Atrial Fibrillation

    Directory of Open Access Journals (Sweden)

    Hossein Vakili

    2014-01-01

    Full Text Available A 50-year-old man was admitted to our emergency department due to new episode of palpitation. He had history of angioplasty of right coronary artery (RCA with drug eluting stent 2 years ago. His electrocardiogram revealed atrial fibrillation (AF. Intravenous amiodarone 150 mg during 10 minutes and then 1 mg/min infusion were started to achieve rate control and pharmacologic conversion to sinus rhythm. After 60 minutes of starting amiodarone infusion, he developed swelling of the skin around his mouth and eyes, and also mucosa of the mouth, eyes and tongue. To conclude, angioedema should be considered a rare side effect of amiodarone which is used broadly in cardiovascular field.

  10. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  11. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  12. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  13. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  14. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  15. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  16. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  17. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  18. [Acquired angioedema with C1-INH deficiency and accompanying chronic spontaneous urticaria in a patient with chronic lymphatic B cell leukemia].

    Science.gov (United States)

    Klossowski, N; Braun, S A; von Gruben, V; Losem, C; Plewe, D; Homey, B; Meller, S

    2015-10-01

    Acquired angioedema due to C1 inhibitor deficiency (C1-INH-AAE) is characterized by recurrent edema of the subcutaneous and/or submucosal tissue without wheals and negative family history of angioedema. Here, we present the case of a patient with a chronic lymphatic B cell leukemia who suffered from both C1-INH-AAE and chronic spontaneous urticaria. Oral corticosteroids, antihistamines, and the anti-IgE antibody omalizumab were applied to treat the chronic urticaria in combination with the plasma-derived C1 esterase inhibitor concentrate Berinert® and the bradykinin B2 receptor antagonist icatibant, but the symptoms did not improved significantly. Thus, polychemotherapy targeting the slow-growing lymphoproliferative disease including rituximab was initiated, which resulted in remission of both the urticaria and the angioedema.

  19. The Use of Plasma-Derived Complement C1-Esterase Inhibitor Concentrate (Berinert®) in the Treatment of Angiotensin Converting Enzyme-Inhibitor Related Angioedema

    Science.gov (United States)

    Hermanrud, Thorbjørn; Duus, Nicolaj; Bygum, Anette; Rasmussen, Eva Rye

    2016-01-01

    Angioedema of the upper airways is a severe and potentially life-threatening condition. The incidence has been increasing in the past two decades, primarily due to pharmaceuticals influencing the generation or degradation of the vasoactive molecule bradykinin. Plasma-derived C1-esterase inhibitor concentrate is a well-established treatment option of hereditary and acquired complement C1-esterase inhibitor deficiency, which are also mediated by an increased level of bradykinin resulting in recurrent angioedema. We here present a case of severe angiotensin converting enzyme-inhibitor related angioedema (ACEi-AE) of the hypopharynx that completely resolved rapidly after the infusion of plasma-derived C1-inhibitor concentrate adding to the sparse reports in the existing literature. PMID:27123347

  20. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  1. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  2. Defective glycosylation of coagulation factor XII underlies hereditary angioedema type III

    Science.gov (United States)

    Björkqvist, Jenny; de Maat, Steven; Lewandrowski, Urs; Di Gennaro, Antonio; Oschatz, Chris; Schönig, Kai; Nöthen, Markus M.; Drouet, Christian; Braley, Hal; Nolte, Marc W.; Sickmann, Albert; Panousis, Con; Maas, Coen; Renné, Thomas

    2015-01-01

    Hereditary angioedema type III (HAEIII) is a rare inherited swelling disorder that is associated with point mutations in the gene encoding the plasma protease factor XII (FXII). Here, we demonstrate that HAEIII-associated mutant FXII, derived either from HAEIII patients or recombinantly produced, is defective in mucin-type Thr309-linked glycosylation. Loss of glycosylation led to increased contact-mediated autoactivation of zymogen FXII, resulting in excessive activation of the bradykinin-forming kallikrein-kinin pathway. In contrast, both FXII-driven coagulation and the ability of C1-esterase inhibitor to bind and inhibit activated FXII were not affected by the mutation. Intravital laser-scanning microscopy revealed that, compared with control animals, both F12–/– mice reconstituted with recombinant mutant forms of FXII and humanized HAEIII mouse models with inducible liver-specific expression of Thr309Lys-mutated FXII exhibited increased contact-driven microvascular leakage. An FXII-neutralizing antibody abolished bradykinin generation in HAEIII patient plasma and blunted edema in HAEIII mice. Together, the results of this study characterize the mechanism of HAEIII and establish FXII inhibition as a potential therapeutic strategy to interfere with excessive vascular leakage in HAEIII and potentially alleviate edema due to other causes. PMID:26193639

  3. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  4. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  5. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  6. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  7. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  8. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  9. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  10. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  11. 沙棘种子萌发期过氧化物酶活性检测%Detect of POD Activity in HipopopHae Seed Germination Phase

    Institute of Scientific and Technical Information of China (English)

    何士敏

    2012-01-01

    沙棘是一种生命力极强的灌木,一般生长在干燥、寒冷的贫瘠山区.沙棘果实和叶片中含有丰富的生物活性成分,是珍贵的药食两用植物资源.同时沙棘还对防止水土流失、改善生态环境,具有十分重要的作用.对沙棘进行高层次的综合开发利用具有重要意义.过氧化物酶(POD)作为植物细胞内保护酶系统的一种,与植物抵御极端温度、干旱、重金属胁迫、病害等各种不良环境有着密切的关系.本文研究了在不同pH、温度条传下,沙棘种子萌发期过氧化物酶的稳定性.结果表明,沙棘种子萌发期过氧化物酶的pH值稳定性和热稳定性都比较低,其作用最适pH值为6.2,最适温度为35℃.同时,实验还检测了底物浓度对沙棘种子萌发期过氧化物酶活性的影响,其最适底物浓度为0.06 mol/L.%The Seabuckthorn is a kind of bush with great vitality and it often grows in the dry and cold barren mountain areas. The fruit and the leaves which contain the active coposition of rich living things are the valuable plant resources with medicine and food for dual purpose, besides, it plays a very important role in guarding against soil erosion and improving the ecological environment. Therefore,a high-level comprehensive development on Sea buckthorn has great significance. Peroxidase (POD) as one of the enzyme with protection enzyme system in the cells of plant, which has close relation with plans withstanding extreme temperatures, drought, heavy metal stress, disease and other adverse environment. This study discussed the stability of peroxidase extracted from the Seabuckthorn leaves at different pH or temperatures. The results showed that the peroxidase from the HipopopHae bud had not better thermally stability and pH stability, the optimal pH was 6. 2 and the optimal temperature was 35 ℃. Meanwhile, this experiment also detected the influence that the substrate concentration to peroxidase activity. Its

  12. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  13. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  14. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  15. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  16. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  17. Defense mechanisms against attacks on reputation systems

    OpenAIRE

    Qian, Yuchen

    2013-01-01

    Vain tiivistelmÀ. OpinnÀytteiden arkistokappaleet ovat luettavissa Helsingin yliopiston kirjastossa. Hae HELKA-tietokannasta (http://www.helsinki.fi/helka/index.htm). Abstract only. The paper copy of the whole thesis is available for reading room use at the Helsinki University Library. Search HELKA online catalog (http://www.helsinki.fi/helka/index.htm). Endast avhandlingens sammandrag. Pappersexemplaret av hela avhandlingen finns för lÀsesalsbruk i Helsingfors universitets bibliote...

  18. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  19. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  20. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  1. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  2. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  3. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  4. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  5. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  6. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  8. Sertraline-induced panic attack.

    Science.gov (United States)

    González-Berríos, Nereida

    2009-01-01

    Selective Serotonin Reuptake Inhibitors are the treatment of choice for depression and anxiety disorders due to its tolerability, safety and side effects profile. However, with the current and frequent use of these medications in patients with these disorders, new side effects have been reported. This case report describes the development of panic attacks in a 24-year-old-female patient with depressive and anxiety symptoms, and no previous predisposing history for panic attacks. PMID:19954091

  9. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  10. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  11. The inhibition of kallikrein-bradykinin pathway may be useful in the reduction of allergic reactions during honeybee venom immunotherapy

    Directory of Open Access Journals (Sweden)

    Ervin Ç. Mingomataj

    2009-05-01

    Full Text Available "nVenom immunotherapy (VIT protects patients with hymenoptera venom anaphylaxis from subsequent potentially life-threatening reactions. The most important side effects during VIT are systemic anaphylactic reactions (SAR, which are more prevalent during honeybee VIT. Despite the demonstrated diversity with regard to venom compounds, previous publications did not mention the plausible reason that can justify the difference of SAR frequency between honeybee and wasps. On the other hand, pre-treatment with H1-blocking antihistamines reduces the frequency and intensity of local and mild systemic anaphylactic reactions during VIT, but not appropriately moderate adverse reactions such as abdominal pain or angioedematous reactions, which can occur more prevalently also during honeybee VIT. In contrast to hymenoptera venom (HV anaphylaxis, these symptoms are very common during hereditary angioedema (HAE. In addition, in some patients who repeatedly experienced anaphylactic reactions during hyposensitization with HV are reported significantly lower renin, angiotensinogen I, and angiotensinogen II plasma levels. These facts may indicate that during honeybee VIT could be occurred a defective implication of renin-angiotensin system. This may be possible, because among hymenoptera, only the HV contains the antigen melittin, a potent kallikrein activator. These effects during honeybee VIT are similar to the HAE, because melittin-induced kallikrein activation on the first hand, as well as the implication of complement classical pathway during HAE on the second one, can lead both to increased bradykinin (BK secretion, plasma extravasation, and therefore to the occurrence of angioedema and abdominal symptoms. Consequently, the clinical effectiveness of BK receptor and generator blockers such as icatibant, ecallantide or NPC 18884, shown recently during the treatment of HAE attacks and acetic acid-induced abdominal constrictions in mice, may lead to the hypothesis

  12. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  13. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  14. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  15. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    reflected in the journalistic practices. The described norms form a coherent pattern if safeguarding the existing democracy and the general public is considered to be the main purpose. A coverage based on this pattern of norms can be compared to other forms of crisis management following attacks because...

  16. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  17. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  18. [Polygraphy of a panic attack].

    Science.gov (United States)

    Noffke, H U; Roser, M

    2001-09-01

    We studied a 24-year old female patient with Type 1 diabetes mellitus suffering for 4 weeks from a major depressive episode combined with panic disorder without agoraphobia. A spontaneous panic attack was serendipitously recorded by polygraph while the subject was at rest. Electrocardiogram, finger blood-flow, respiratory rhythm and muscle tone (forearm, forehead) were recorded. A triphasic course consisting of a "dynamic phase" (appr. 80 s) preceded by a discrete "initial phase" (appr. 140 s) and a "declining phase" (appr. 180 s) was observed. The dynamic phase is characterized by an acute increase of fingertip vasoconstriction and heart rate. The patient was not aware of the panic attack before the dynamic phase. The recognisable central regulation confirms previously published findings indicating a sympathetic-norepinephrine activation at the beginning of the panic attack without activating the musculoskeletal system. Furthermore, a paradoxical phenomenon involving heart and respiratory rate was observed before the onset of anxiety, i.e. an increase of the heart rate and a simultaneous decline of the respiratory rate, suggesting a non-antagonistic regulation of the ergotropic-trophotropic system. The autonomic state of the patient points to a lability in homeostasis from which panic attacks as a form of CNS response could develop. PMID:11572106

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  20. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  1. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  2. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  3. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  4. Using Fresh Frozen Plasma for Acute Airway Angioedema to Prevent Intubation in the Emergency Department: A Retrospective Cohort Study

    Directory of Open Access Journals (Sweden)

    Aya Saeb

    2016-01-01

    Full Text Available Background. Angioedema (AE is a common condition which can be complicated by laryngeal edema, having up to 40% mortality. Although sporadic case reports attest to the benefits of fresh frozen plasma (FFP in treating severe acute bouts of AE, little evidence-based support for this practice is available at present. Study Objectives. To compare the frequency, duration of intubation, and length of intensive care unit (ICU stay in patients with acute airway AE, with and without the use of FFP. Methods. A retrospective cohort study was conducted, investigating adults admitted to large community hospital ICU with a diagnosis of AE during the years of 2007–2012. Altogether, 128 charts were reviewed for demographics, comorbidities, hospital courses, and outcomes. A total of 20 patients received FFP (108 did not. Results. Demographics and comorbidities did not differ by treatment group. However, nontreated controls did worse in terms of intubation frequency (60% versus 35%; p=0.05 and ICU stay (3.5 days versus 1.5 days; p<0.001. Group outcomes were otherwise similar. Conclusion. In an emergency department setting, the use of FFP should be considered in managing acute airway nonhereditary AE (refractory to steroid, antihistamine, and epinephrine. Larger prospective, better controlled studies are needed to devise appropriate treatment guidelines.

  5. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  6. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  7. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  8. Fat May Not Hike Heart Attack Risk

    Science.gov (United States)

    ... news/fullstory_160179.html Fat May Not Hike Heart Attack Risk: Study But it does raise diabetes risk, ... that obesity may not increase the risk of heart attack or premature death. Their study of identical twins ...

  9. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  10. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  11. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  12. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  13. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  14. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  15. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  16. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  17. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  18. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  19. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  20. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  1. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  2. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  3. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  4. A case of mimicking angioedema: chin silicone granulomatous reaction spreading all over the face after receiving liquid silicone injection forty years previously

    Institute of Scientific and Technical Information of China (English)

    Yu-cheng Chen; Mei-ling Chen; Ying-ming Chiu

    2011-01-01

    Liquid injectable silicone has been used for soft tissue augmentation for five decades. Many complications following liquid silicone injection have been reported. To diagnose and manage silicone granuloma remains difficult. Silicone granuloma must be diagnosed with the history of liquid silicone injection and the histology of tissue biopsy. We presented a case of granulomatous reaction after the injection of liquid silicone for chin augmentation forty years ago, causing total facial swelling, which mimicking angioedema initially. We administered methylprednisolone to the patient. Initial response to methylprednisolone was favorable.

  5. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  6. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  7. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  8. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  9. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  10. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  11. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  12. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  13. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  14. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  15. Attack Penetration System for SQL Injection

    Directory of Open Access Journals (Sweden)

    Manju Kaushik

    2014-06-01

    Full Text Available The SQL Injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per our study and also prevention methods had been discussed in several research papers. So the main motivation of our paper to penetrate the attack. For this we have proposed an efficient framework from which the central authority can control all the visited IP and restrict those IP. If the IP is in the restricted zone then the contents are restricted by using SQL update command with some status modification states. If the restricted IP wish to access the data from their credentials, it is immediately inform to the admin and the time of attack alert will be stored in the log area of that attack. Finally by comparison we will justify our results which are better in comparison to the previous test and methodology.

  16. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  17. SQL INJECTION ATTACK DETECTION AND PREVENTION

    OpenAIRE

    Dr. SUNITHA ABBURU; PERUMALSAMY RAMASAMY

    2012-01-01

    Nowadays SQL injection attacks (SQLIAs) and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The cont...

  18. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  19. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  20. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  1. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  2. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  3. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  4. 韩国东海天然地奖水天津市场现状研究%The Market Situation of Dong Hae Di Jang Soo, a Bottled Mineral Water from Korea

    Institute of Scientific and Technical Information of China (English)

    罗明薇; 周璇

    2014-01-01

    As the brand of Dong Hae Di Jang Soo is less popular and the bottled mineral water prices high now, it is difficult to increase its market share in Tianjin. In general, the market of high-end water is immature in Tianjin, all brands of the water not selling well. However, the market potential is great with an increasing demand of the water by an impressive amount of high-income target consumers in the city. Given that, brand operators of the water shall seize the opportunity to promote the brand by building brand awareness and reputation and expand its market share while breaking the monopoly of other foreign brands.%目前,韩国东海天然地奖水由于品牌知名度低,产品价格偏高,提升其在天津市场占有率还有一定难度。总体上,天津高端水市场发育尚不成熟,各品牌销售情况不佳,但天津高收入目标消费者数量可观,对高端水的需求不断增长,消费潜力很大,市场前景非常乐观。韩国东海天然地奖水经营者应该认识到天津高端水市场尚未被充分开发的现状,顺应消费趋势,抓住市场上缺少领导品牌的有利时机,强化品牌推广,努力提升品牌知名度、美誉度,打破国外其他品牌的独占和垄断格局,扩大其市场份额。

  5. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  6. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  7. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    R.J.J.H. van Son

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  8. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  9. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  10. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  11. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  12. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  13. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  14. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  15. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  16. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  17. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  18. An Network Attack Modeling Method Based on MLL-AT

    Science.gov (United States)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  19. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  20. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  1. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  2. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  3. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  4. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  5. Attack detection in unattended sensor networks

    Science.gov (United States)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  6. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  7. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  8. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  9. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  10. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  11. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  12. SQL INJECTION ATTACK DETECTION AND PREVENTION

    Directory of Open Access Journals (Sweden)

    Dr. SUNITHA ABBURU

    2012-04-01

    Full Text Available Nowadays SQL injection attacks (SQLIAs and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The contribution is twofold 1. SQL Injection AttackDetection and prevention 2. SQL Injection Reports. These techniques have been implemented in ASP.Net and SQL Server and tested by conducting various experiments and prove that the web applications and database is protected from scripting and SQL injection queries.

  13. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  14. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  15. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  16. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  17. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  18. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  19. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  20. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  1. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  2. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  3. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  4. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  5. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  6. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  7. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  8. Textual Manipulation for SQL Injection Attacks

    OpenAIRE

    Hussein AlNabulsi; Izzat Alsmadi; Mohammad Al-Jarrah

    2013-01-01

    SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNOR...

  9. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  10. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  11. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  12. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  13. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  14. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  15. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  16. Ace Inhibitors and Angioedema

    NARCIS (Netherlands)

    Vleeming W; van Amsterdam JGC; de Wildt DJ; Stricker B; TOX

    1995-01-01

    Dit rapport beschrijft de risico's die verbonden zijn aan het gebruik van angiotensine converting enzym (ACE) remmers. Hierbij staat de bijwerking angio-oedeem centraal. De benodigde literatuur is verzameld aan de hand van een zoekaktie middels MEDLINE. ACE-remmers zijn in gebruik ter behand

  17. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  18. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  19. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  20. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  1. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  2. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  3. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  4. Panic Attack during Elective Gastrointestinal Endoscopy.

    Science.gov (United States)

    Mitsonis, Charalampos; Dimopoulos, Nikolaos; Zavrou, Marianna; Psarra, Vassiliki; Giofkos, Christos; Fiorakis, Christos; Dimitriadis, Athanasios; Valavanis, Dimitrios; Vousoura, Eleni; Zervas, Iannis; Papavassiliou, Efstathios

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y). Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, P < 0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, P < 0.05). Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients. PMID:22007196

  5. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  6. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  7. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  8. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  9. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  10. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  11. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  12. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    , localisation services and many others. These technologies can be classified under the name of ubiquitous systems. The term Ubiquitous System dates back to 1991 when Mark Weiser at Xerox PARC Lab first referred to it in writing. He envisioned a future where computing technologies would have been melted...... in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  13. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  14. Defeating pharming attacks at the client-side

    OpenAIRE

    Gastellier-Prevost, Sophie; LAURENT, Maryline

    2011-01-01

    International audience With the deployment of "always-connected" broadband Internet access, personal networks are a privileged target for attackers and DNS-based corruption. Pharming attacks - an enhanced version of phishing attacks - aim to steal users' credentials by redirecting them to a fraudulent login website, using DNS-based techniques that make the attack imperceptible to the end-user. In this paper, we define an advanced approach to alert the end-user in case of pharming attacks a...

  15. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  16. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-01

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  17. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  18. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  19. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  20. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  1. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  2. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  3. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  4. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  5. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  6. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  7. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  8. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  9. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  10. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  11. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  12. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  13. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  14. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  15. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  16. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  17. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  18. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  19. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  20. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  1. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  2. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  3. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  4. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  5. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  6. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  7. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  8. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_160692.html Heart Attack Before 50 Ups Early Death Risk But healthy ... News) -- The risk of early death after a heart attack has lessened over the past 30 years among ...

  9. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  10. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  11. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  12. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  13. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  14. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  15. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  16. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  17. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  18. Incidence of Fungal attack on Aircraft Fuselage

    Directory of Open Access Journals (Sweden)

    H. M. Dayal

    1968-10-01

    Full Text Available Incidence of fungal attack on the fuselage of a few Vampire aircraft has been observed. The fungus isolated from the infected regions has been tentatively indentified as TorulaSp. Laboratory experiments have revealed that within four weeks this fungus causes about 44 percent loss in the tensile strength of the brich plywood used in the manufacture of the fuselage of the aircraft.

  19. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  20. An Analysis of Various Attacks in MANET

    OpenAIRE

    M.Udhayamoorthi; C. Senthilkumar; Dr S. Karthik; Dr. T.Kalaikumaran

    2014-01-01

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. According to the perspective of our paper, we try to connect the current status of computers era to adhoc networking. As adhoc networks has been unleashing several updated technologies, it is the most growing area in the field of networks in information and communication Engineering has ever seen .we start with area introduction, deeply reviewed about the various attacks es...

  1. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  2. Securing iris recognition systems against masquerade attacks

    Science.gov (United States)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  3. Quantum Key Distribution against Trojan Horse Attacks

    Institute of Scientific and Technical Information of China (English)

    CAI Qing-Yu; LV Hua

    2007-01-01

    Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.

  4. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  5. A Structured Multi-signature Scheme Against Forgery Attack

    Directory of Open Access Journals (Sweden)

    Wenjun Luo

    2011-12-01

    Full Text Available There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

  6. Defending Against LDoS Attacks Using Fair AQM

    Directory of Open Access Journals (Sweden)

    Bianqin Wang

    2011-12-01

    Full Text Available According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect. We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they are able to reduce the impact of the attacks in various degrees. FRED outperforms CHOKe in throttling the attacks, but it is slightly inferior to CHOKe in time performance.

  7. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  8. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  9. A Review of Man-in-the-Middle Attacks

    OpenAIRE

    Gangan, Subodh

    2015-01-01

    This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking.

  10. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  11. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  12. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    . Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...

  13. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  14. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  15. [Biological roles of complement and recent topics in clinical medicine].

    Science.gov (United States)

    Wakamiya, Nobutaka

    2012-08-01

    The complement has been identified as a complementation factor to compensate for the function of an antibody. The complement consists of C1-C9, a complement-related molecule, and its regulating molecules. Three major biological roles of the complement have been classified: First: opsonization following phagocytosis and the elimination of microbes; second: direct destruction of bacteria due to membrane attack complex (MAC); third: complement activation following the induction of anaphylactoid factors and local recruitment and activation of neutrophilic leukocytes. In this review, the basic findings and recent treatments of paroxysmal nocturnal hemoglobinuria (PNH) and hereditary angioedema (HAE) are summarized. Finally, there is a short review of a rare autosomal recessive disorder of 3MC syndrome and new biological functions of complement factors except for that of innate immunity are proposed.

  16. Survey of Protections from Buffer-Overflow Attacks

    OpenAIRE

    Krerk Piromsopa; Richard J Enbody

    2011-01-01

    Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to provide protection from buffer-overflow attacks have been proposed by a number of researchers. They all aim to either prevent or protect against buffer-overflow attacks. As defenses improved, attacks adapted and became more sophisticated. Given the maturity of field and the fact that some solutions now exist that can prevent most buffer-overflow attacks, we believe it is time to survey these sch...

  17. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  18. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  19. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  20. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  1. WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Shree Om

    2011-01-01

    Full Text Available Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS attack. Due to its nature, the attack makes the source node send all the data packets to a Black-hole node that ends up dropping all the packets. The aim of this paper is to reflect light on the severe effects of a Black-hole attack in a Wireless Ad-hoc network and the drawbacks of the security mechanisms being used for the mitigation of this attack.

  2. Attack Graph-Based Risk Assessment and Optimisation Approach

    Directory of Open Access Journals (Sweden)

    Mohammed Alhomidi

    2014-06-01

    Full Text Available Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA. Each attack path is considered as an independent attack scenario from the source of attack to the target. Many such paths form the individuals in the evolutionary GA solution. The population-based strategy of a GA provides a natural way of exploring a large number of possible attack paths to find the paths that are most important. Thus unlike many other optimization solutions a range of solutions can be presented to a user of the methodology.

  3. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  4. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  5. SQL Injection Attacks: Techniques and Protection Mechanisms

    Directory of Open Access Journals (Sweden)

    Santosh Soni

    2011-01-01

    Full Text Available When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.

  6. Toxicological issues after depleted uranium weapons attacked

    International Nuclear Information System (INIS)

    Depleted Uranium (DU) is a byproduct of the uranium enrichment for producing nuclear reactor or nuclear weapon. DU is used in the military as an armor-piercing projectile due to its hardness, strength, and density. A lot of DU weapons were fired in the Gulf War, and bring about critical environmental and internal contamination. Therefore, DU becomes suddenly a hot issue. Some toxicological problems after DU weapons attacked have been reviewed, which include features of internal DU contamination. Hazard of wound contamination and inhalation with insoluble uranium, and other urgent toxicological issues. The healthy effects of implanted with depleted uranium pellets were illustrated in particular

  7. Bobcat attack on a cottontail rabbit

    Science.gov (United States)

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  8. A Method to Defend File-Attacking

    Institute of Scientific and Technical Information of China (English)

    HE Hongjun; LUO Li; CAO Sihua; FENG Tao; PAN Li; ZOU Zhiji

    2006-01-01

    The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.

  9. Cardiogenic embolism producing crescendo transient ischemic attacks.

    Science.gov (United States)

    Geraghty, Patrick J; Oak, Jack; Choi, Eric T

    2005-09-01

    Lateralizing, repetitive transient ischemic attacks are characteristic of symptomatic carotid bifurcation atherosclerotic plaques. We report a case in which a cardiogenic embolus, after lodging at the left carotid bifurcation, produced crescendo episodes of expressive aphasia and mild right upper extremity weakness. Complete neurological recovery was achieved following emergent carotid embolectomy and endarterectomy. This case demonstrates that the laminar nature of internal carotid blood flow may result in the localization of embolic events to a single region of the cerebral vasculature, regardless of the source lesion in the carotid artery. The role of endoluminal techniques in the diagnosis and management of such lesions is discussed.

  10. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Dekimpe, Marnik G.

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  11. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  12. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  13. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  14. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    Science.gov (United States)

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented. PMID:18243647

  15. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  16. Enhancing network robustness for malicious attacks

    CERN Document Server

    Zeng, An

    2012-01-01

    In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. With a greedy algorithm, they found the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement ($R_{n}$), we propose a link-robustness index ($R_{l}$). We show that solely enhancing $R_{n}$ cannot guarantee the improvement of $R_{l}$. Moreover, the structure of $R_{l}$-optimized network is found to be entirely different from that of onion network. In order to design robust networks resistant to more realistic attack condition, we propose a hybrid greedy algorithm which takes both the $R_{n}$ and $R_{l}$ into account. We validate the robustness of our generated networks a...

  17. Stealth-MITM DoS Attacks on Secure Channels

    CERN Document Server

    Herzberg, Amir

    2009-01-01

    We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack on IPsec, when deployed with a `small' anti-replay window, and analysis of `sufficient' window size. First amplifying attack on IPsec, when deployed with `sufficient' window size. This attack (as the previous) is realistic: attacker needs only to duplicate and speed-up few packets. We also suggest a solution designed to prevent the presented attacks, and to provide secure channel immune to degradation and other DoS attacks. Our solution involves changes (only) to the two gateway machines running IPsec. In addition to their practical importance, our results also raise the challenge of formally defining secure channels immune to DoS and degradation attacks, and p...

  18. Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator

    Institute of Scientific and Technical Information of China (English)

    Ya-Fei Yang; Qin-Yuan Feng; Yen(Lindsay)Sun; Ya-Fei Dai

    2009-01-01

    Recently,online rating systems are gaining popularity.Dealing with unfair ratings in such systems has been recognized as an important but challenging problem.Many unfair rating detection approaches have been developed and evaluated against simple attack models.However,the lack of unfair rating data from real human users and realistic attack behavior models has become an obstacle toward developing reliable rating systems.To solve this problem,we design and launch a rating challenge to coHect anfair rating data from real human users.In order to broaden the scope of the data collection,we also develop a comprehensive signal-based unfair rating detection system.Based on the analysis of real attack data,we discover important features in unfair ratings,build attack models,and develop an unfair rating generator.The models and generator developed in this paper can be directly used to test current rating aggregation systems,as well as to assist the design of future rating systems.

  19. An Attack Investigation, Characterization and Simulation of Various Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Pratik Gite

    2015-01-01

    Full Text Available Mobile Ad-hoc Network is one of the most popular network technology in the field of research and development community. Due to their dynamic and ad-hoc nature, the network suffers from the various performance and security issues. The main objective of this paper is to evaluate the performance of Ad-hoc On Demand Distance Vector (AODV routing protocol under normal condition and attacks conditions on the basis of different performance metrics. This paper is also concerned about the different kinds of attacks formation viz. Black Hole, Worm Hole, Gray Hole and Denial of Service attacks on MANET environment. In addition of that different kinds of approaches available for detection and prevention of such attacks are also investigated. Finally using different experimentation and simulations through NS-2, the effort is made to identify the effective network characteristics. After concluding the effects and simulation the need of a new Intrusion Detection System (IDS model is presented for future implementation.

  20. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    Science.gov (United States)

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  1. An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy

    Directory of Open Access Journals (Sweden)

    Narasimha Shashidhar

    2015-07-01

    Full Text Available Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.

  2. The Impact of Black-Hole Attack on ZRP Protocol

    Directory of Open Access Journals (Sweden)

    CHAHIDI Badr

    2016-07-01

    Full Text Available lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to several attacks such as the blackhole attack. In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol. In this attack a malicious node is placed between two or more nodes in order to drop data. The trick of the attack is simple, the malicious node declares to have the most reliable way to the destination so that the wife destination chooses this path. In this study, NS2 is used to assess the impact of the attack on ZRP. Two metrics measure, namely the packet delivered ratio and end to end delay.

  3. Attacks on Web Based Software and Modelling Defence Mechanisms

    Directory of Open Access Journals (Sweden)

    D.R. Ingle

    2012-08-01

    Full Text Available The software life cycle was in use to develop the good software. Now a day’s the software development life cycle should incorporate the security features. Input Validation Attacks are one of the most wide spread forms of vulnerability on the Web application. Our main intention is to focuses on detection and prevention of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow by incorporating security in software development life cycle. We have introduced a novel approach of preclusion and uncovering of Input Validation Attacks. SQL Injection , Cross Site Scripting, A buffer overflow attacks, experimentations are made to do these attacks on various sides and the defense mechanism model is proposed to avoid these attacks on the code.

  4. Simulating Cyber-Attacks for Fun and Profit

    CERN Document Server

    Futoransky, Ariel; Orlicki, Jose; Sarraute, Carlos

    2010-01-01

    We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applications, protocols, users, etc. A novel characteristic of this tool is to simulate vulnerabilities (including 0-days) and exploits, allowing an attacker to compromise machines and use them as pivoting stones to continue the attack. A user can test and modify complex scenarios, with several interconnected networks, where the attacker has no initial connectivity with the objective of the attack. We give a concise description of this new technology, and its possible uses in the security research field, such as pentesting training, study of the impact of 0-days vulnerabilities, evaluation of security countermeasures, and risk...

  5. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  6. Agoraphobic behavior and panic attack: a study of male twins.

    Science.gov (United States)

    Tsuang, Ming; Domschke, Katharina; Jerskey, Beth A; Lyons, Michael J

    2004-01-01

    We used data from 3372 pairs of male twins from the Vietnam Era Twin Registry to examine comorbidity and familial influences on the frequently observed association between agoraphobic behavior and panic. Due to low prevalence of DSM-III-R-defined panic disorder, we also examined subjects who had experienced at least one panic attack during their lives. Agoraphobic behavior among individuals with a history of panic attacks showed familial aggregation (odds ratio = 5.7; P = .018 ). Probands with panic attacks and agoraphobic behavior and their co-twins had higher risk of major depression than probands without agoraphobic avoidance and their co-twins (P = .01). Groups did not differ for alcohol dependence or antisocial personality. Agoraphobic behavior associated with panic attack is familial and associated with comorbid major depression. Agoraphobia following panic attack does not seem to reflect severity as agoraphobic behavior in the proband was unrelated to risk of panic attacks in the co-twin. PMID:15474853

  7. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  8. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  9. Performance Analysis of Manet Before and After Black Hole Attack

    Directory of Open Access Journals (Sweden)

    Ms.Heena Bhalla

    2012-01-01

    Full Text Available A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks is the Black Hole Attack which absorbs all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper we simulated MANETs with and without Black Hole to study the effects of Black hole attack on network performance. Because of Black Hole Attack the average packet drop increased form 0.25% to 90.69% . The throughput of the network decreased 93.56% due to Black Hole effect.

  10. Efficient Detection of Sybil Attack Based on Cryptography in Vanet

    CERN Document Server

    Rahbari, Mina

    2011-01-01

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  11. Detection and Defense Against Packet Drop Attack in MANET

    Directory of Open Access Journals (Sweden)

    Tariq Ahamad

    2016-02-01

    Full Text Available MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks. In this attack the malicious node reflects itself as the shortest path and receives all the packets and drops the selected packets in order to give the user the service that that is not correct. It is a specific kind of attack and protects the network and user from detecting this malicious activity. In this article I have proposed an efficient for step technique that confirms that this attack can be detected and defended with least efforts and resource consumption.

  12. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Honglong Chen

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  13. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  14. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... migraine attack characteristics reported upon enrollment in the trial with those recorded prospectively in the trial. METHODS: Patients with migraine (n = 267) with typical visual aura in more than 30% of their attacks were enrolled from 16 centers for a clinical trial. Upon enrollment, patients provided...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  15. REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

    Directory of Open Access Journals (Sweden)

    Wesam Bhaya

    2014-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

  16. Profiling cyber attackers using case-based reasoning

    OpenAIRE

    Kapetanakis, Stelios; Filippoupolitis, Avgoustinos; Loukas, George; Al Murayziq, Tariq Saad

    2014-01-01

    Computer security would arguably benefit from more information on the characteristics of the particular human attacker behind a security incident. Nevertheless, technical security mechanisms have always focused on the at- tack's characteristics rather than the attacker's. The latter is a challenging prob- lem, as relevant data cannot easily be found. We argue that the cyber traces left by a human attacker during an intrusion attempt can help towards building a profile of the particular person...

  17. Preparedness for mass-casualty attacks on public transportation

    OpenAIRE

    Holgersson, Annelie

    2016-01-01

    Background: Public transportation constitutes a vulnerable sector in modern day society with a high probability of generating mass casualties if attacked. By preparing for mass-casualty attacks (MCAs), response can become more effective and public transportation can become a less rewarding target. However, preparedness for attacks, much like response, implies resource constraints, and this dissertation pinpoints some major dilemmas that inhibit achieving preparedness for MCAs on public transp...

  18. Non-harmful insertion of data mimicking computer network attacks

    Science.gov (United States)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  19. The nocturnal panic attacks: polysomnographic features and comorbidities

    OpenAIRE

    Li, Yan-Lin; CHEN Guo-yan; LEI Ge-sheng; Yang, Ting; Chang-jun SU

    2013-01-01

    Background Panic disorder refers to the repeated or unexpected anxiety or panic attacks. It makes patients feel extreme pain. Although the episodes of most patients with panic disorder happen at daytime, the nocturnal panic attacks (NPA) are quite common. Paients pay more attention to NPA. Insomnia is more serious in patients with NPA than those patients with panic disorder attack at daytime. Many patients may occur anxiety and avoidance behavior after NPA. Patients are often afraid of sleep...

  20. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    OpenAIRE

    Mohammad Abdus Salam; Nayana Halemani

    2016-01-01

    Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and m...

  1. Breakdown of an Inhomogeneous Scale- Free Network Under Intentional Attack

    Institute of Scientific and Technical Information of China (English)

    LIN Guo-Ji; CHENG Xiang; OU-YANG Qi

    2003-01-01

    Using a recently introduced network model with node and connection diversity, we study the breakdown of different scale-free networks under intentional attacks. Our simulation results show that inhomogeneous networks are more sensitive to intentional attack than the homogeneous ones and that the centralization of the networks is an important variable, reflecting the characteristics of the network under intentional attack. Using a recently introduced method we can theoretically develop the critical point of the inhomogeneous networks.

  2. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  3. PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION

    Institute of Scientific and Technical Information of China (English)

    Zhao Shengmei; Li Fei; Zheng Baoyu

    2005-01-01

    A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.

  4. ADTool: Security Analysis with Attack-Defense Trees (Extended Version)

    OpenAIRE

    Kordy, Barbara; Kordy, Piotr; Mauw, Sjouke; Schweitzer, Patrick

    2013-01-01

    The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack-defense trees. The main features of the ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of attack trees, protection trees and defense trees, which are all particular instances of attack-defense trees.

  5. Different Types of Attacks on Integrated MANET-Internet Communication

    OpenAIRE

    Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay

    2010-01-01

    Security is an important issue in the integrated MANET-Internet environment because inthis environment we have to consider the attacks on Internet connectivity and also onthe ad hoc routing protocols. The focus of this work is on different types of attacks onintegrated MANET-Internet communication. We consider most common types of attackson mobile ad hoc networks and on access point through which MANET is connected tothe Internet. Specifically, we study how different attacks affect the perfor...

  6. Trojan Horse attacks on Quantum Key Distribution systems

    OpenAIRE

    Gisin, Nicolas; Fasel, Sylvain; Kraus, Barbara; Zbinden, Hugo; Ribordy, Grégoire

    2005-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob’s system via the quantum channel, are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to th...

  7. HProxy: Client-side detection of SSL stripping attacks

    OpenAIRE

    Nikiforakis, Nick; Younan, Yves; Joosen, Wouter

    2010-01-01

    In today's world wide web hundreds of thousands of companies use SSL to protect their customers' transactions from potential eavesdroppers. Recently,a new attack against the common usage of SSL surfaced, SSL stripping. The attack is based on the fact that users almost never request secure pages explicitly but rather rely on the servers, to redirect them to the appropriate secure version of a particular website. An attacker, after becoming man-in-the-middle can suppress such messages and p...

  8. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  9. Inorganic nanoparticles engineered to attack bacteria.

    Science.gov (United States)

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-01

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  10. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  11. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  12. On the offensive against brain attack

    Energy Technology Data Exchange (ETDEWEB)

    Wheatcraft, D.

    1997-06-01

    The Center for Healthcare Technologies at Lawrence Livermore National Laboratory has undertaken a stroke initiative whose purpose is to provide the medical community with the tools that will allow doctors to diagnose and treat stroke as aggressively as they do heart attack. A multidisciplinary team of stroke-initiative researchers is collaborating with academic medical centers and private companies to move these tools from the research and development stage through clinical trials, regulatory approval, and manufacture so that they can benefit many thousands of people who have strokes each year. Tools the team has developed fall into four categories: microsensors for brain and clot characterization, a catheter-based system using laser energy to break up clots in the blood vessels of the brain, laser-tissue interaction models in support of laser {open_quotes}clot busting,{close_quotes} and microtools for treating the aneurysms that cause hemorrhagic stroke.

  13. [Cerebral infarction and transient ischemic attack].

    Science.gov (United States)

    Sahara, Noriyuki; Kuwashiro, Takahiro; Okada, Yasushi

    2016-04-01

    Japanese Guidelines for the Management of Stroke 2015 was published. Here, we describe several points revised from the 2009 edition about "Cerebral infarction and transient ischemic attack (TIA)". The revision points are as follows; 1. Extension of possible time window of intravenous recombinant tissue-plasminogen activator treatment (from within 3 hours to within 4.5 hours); 2. Antiplatelet therapy in acute stage (dual antiplatelet therapy (DAPT) for non-cardioembolic ischemic stroke or TIA); 3. Endovascular recanalization therapy in acute stage; 4. Antiplatelet therapy in chronic stage (Cilostazol is recommended similar to aspirin or clopidogrel); 5. Non-vitamin K antagonist oral anticoagulants (NOACs) for non-valvular atrial fibrillation (NVAF) stroke or TIA patients; 6. Management of TIA. We explain the revised points of the guideline in the text.

  14. Securing Oracle Database from Search Engines Attack

    Directory of Open Access Journals (Sweden)

    N. M. A. Ayad

    2012-09-01

    Full Text Available Database security has recently become A victim of misused search engines. This can be accomplished simply by searching for a URL containing the name of the vulnerable web page or application. Oracle ships several sample web applications along with its databases. The security holes in these applications allow a web user to exploit SQL Injection to submit arbitrary SQL statements to the database. These applications are enabled by default, listening on port 7777, and known to be vulnerable to SQL Injection. This paper focuses on exploiting search engines to attack oracle database using SQL injection technique from web applications, when a website is vulnerable by SQL injection and this side is connected by oracle database vulnerable by SQL injection.

  15. An attack on hash function HAVAL-128

    Institute of Scientific and Technical Information of China (English)

    WANG Xiaoyun; FENG Dengguo; YU Xiuyuan

    2005-01-01

    In this paper, we give a fast attack against hash function-HAVAL-128.HAVAL was presented by Y. L. Zheng et al. at Auscrypto'92. It can be processed in 3,4 or 5 passes, and produces 128, 160, 192, or 224-bit fingerprint. We break the HAVAL with 128-bit fingerprint. The conclusion is that, given any 1024-bit message m, we just make some modifications about m, and the modified message m can collide with another message m' only with probability 1/27, where m' = m +△m, in which △m is a fixed difference selected in advance. In addition, two collision examples for HAVAL-128 are given in this paper.

  16. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  17. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    CERN Document Server

    Xing, Xinyu; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of these attacks.

  18. A Survey on Detecting Wormhole Attack in Manet

    Directory of Open Access Journals (Sweden)

    Bipin N. Patel

    2014-03-01

    Full Text Available A Mobile Ad Hoc Network (MANET is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack. We have presented several existing techniques to detect wormhole attack in mobile ad hoc networks.

  19. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  20. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  1. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  2. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  3. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore...

  4. An Improved Model of Attack Probability Prediction System

    Institute of Scientific and Technical Information of China (English)

    WANG Hui; LIU Shufen; ZHANG Xinjia

    2006-01-01

    This paper presents a novel probability generation algorithm to predict attacks from an insider who exploits known system vulnerabilities through executing authorized operations. It is different from most intrusion detection systems (IDSs) because these IDSs are inefficient to resolve threat from authorized insiders. To deter cracker activities, this paper introduces an improved structure of augmented attack tree and a notion of "minimal attack tree", and proposes a new generation algorithm of minimal attack tree. We can provide a quantitative approach to help system administrators make sound decision.

  5. Fake BTS Attacks of GSM System on Software Radio Platform

    OpenAIRE

    Yubo Song; Kan Zhou; Xi Chen

    2012-01-01

    The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is...

  6. Fake BTS Attacks of GSM System on Software Radio Platform

    Directory of Open Access Journals (Sweden)

    Yubo Song

    2012-02-01

    Full Text Available The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is IMSI/IMEI catch attack, which can get the mobile phone’s IMSI and IMEI. With this information, attacker can got the track of the man with this phone. The second attack is selective jamming attack. After get the IMSI and IMEI of the mobile phone, the attackers can decide whether the mobile phone is blocked or not. We will analyze the GSM protocol which is relevant to the interception system and later present the performance of such a system by real tests and demonstrate its feasibility.

  7. PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS

    Directory of Open Access Journals (Sweden)

    Ravinuthala Sruthi

    2013-06-01

    Full Text Available DOS ATTACKS ARE ONE OF THE TOP SECURITY PROBLEMS AFFECTING NETWORKS AND DISRUPTING SERVICES TO LEGITIMATE USERS. THE VITAL STEP IN DEALING WITH THIS PROBLEM IS THE NETWORK'S ABILITY TO DETECT SUCH ATTACKS. APPLICATION DDOS ATTACK, WHICH AIMS AT DISRUPTING APPLICATION SERVICE RATHER THAN DEPLETING THE NETWORK RESOURCE. UP TO NOW ALL THE RESEARCHES MADE ON THIS DDOS ATTACKS ONLY CONCENTRATES EITHER ON NETWORK RESOURCES OR ON APPLICATION SERVERS BUT NOT ON BOTH. IN THIS PAPER WE PROPOSED A SOLUTION FOR BOTH THESE PROBLEMS BY AUTHENTICATION METHODS AND GROUP TESTING.

  8. Defending Wormhole Attack in Wireless Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nisha S.Raote

    2011-09-01

    Full Text Available The ad-hoc networks are the temporarily established wireless networks which does not require fixedinfrastructure it is also called as infrastructure less network. Because of some flaws of adhoc networksuch as shared wireless medium and lack of any central coordination makes them more prone to attacksin comparison with the wired network. Among all the attacks wormhole attack is the most severe attack.In this attack an attacker capture the packets at one location in the network and send it two anotherattacker at a distant location through tunnels which is established through different ways like packetencapsulation, using high power transmission or by using direct antennas. This tunnel between twocolluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if theattacker has not comprised any hosts, and all communication provides authenticity and confidentiality.By using the various approaches for finding the solution over wormhole attack, the dynamic informationof the packets could still be modified. So in order to give more robust protection in some special scenariolike battlefields, which requires highly secured information, there is need of developing some securedmechanism for wormhole detection and prevention. Taking into consideration this problem the proposedscheme is developed. This paper discusses proposed works on wormhole attack along with its availablecounter measures in ad-hoc wireless network.

  9. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  10. User Authentication with Provable Security against Online Dictionary Attacks

    Directory of Open Access Journals (Sweden)

    Yongzhong He

    2009-05-01

    Full Text Available Dictionary attacks are the best known threats on the password-based authentication schemes. Based on Reverse Turing Test (RTT, some usable and scalable authentication schemes are proposed to defeat online dictionary attacks mounted by automated programs. However it is found that these authentication schemes are vulnerable to various online dictionary attacks. In this paper, a practical decision function is presented, based on which RTT authentication schemes are constructed and shown to be secure against all the known online dictionary attacks. After formally modeling of the adversary, the static and dynamic security of the authentication schemes are proved formally.

  11. Prevention Of WormholeAttacks In Geographic Routing Protocol

    Directory of Open Access Journals (Sweden)

    E.Poornima,

    2011-01-01

    Full Text Available As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSRprotocol and analysis and simulations are performed in network simulator (NS-2.

  12. Impact Analysis of Recent DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Ketki Arora

    2011-02-01

    Full Text Available In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replacedby cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with the growth of Internet, count of attacks on Internet has also increased incredibly fast. Denial-of-service attack is one of them, which poses immense threat on the availability. Since, the World is highly dependent on the Internet, availability of the Internet is very critical for the socio-economic growth of the society. Denial-of-service attacks occur almost every day,and the frequency and the volume of these attacks are increasing day by day. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputationissues, most of the commercial sites do not even disclose that they were blitzed by such attacks. Details of attacks can guide very well in the formulation of comprehensive defensive solution for such attacks. In this paper, an overview on DDoS problem, major factors causing DDoS attacks are demonstrated, brief detail of most recent DDoS incidents on online organizations is outlined and finally, the need for a comprehensive distributed solution is highlighted.

  13. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  14. Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme

    Directory of Open Access Journals (Sweden)

    Rusha Nandy

    2011-07-01

    Full Text Available An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to open medium, dynamic topology, distributed cooperation, constrained capabilities ad hoc networks are vulnerable to many types of security attacks; one such attack is rushing attack. It is a malicious attack that is directed against on demand routing protocols that uses duplicate suppression at each node.

  15. SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

    Directory of Open Access Journals (Sweden)

    FARAZ AHSAN

    2011-08-01

    Full Text Available Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.

  16. Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks

    OpenAIRE

    Honglong Chen; Wendong Chen; Zhibo Wang; Zhi Wang; Yanjun Li

    2014-01-01

    Wormhole attack is a severe attack that can be easily launched by a pair of external attackers in hostile wireless sensor networks. In the wormhole attack, an attacker sniffs packets at one point in the network, and tunnels them through the wormhole link to the other attacker at another point of the network, which broadcasts them to its neighbors. Such kind of procedure can easily deteriorate the normal functionality of the networks. In this paper, we propose a novel wormhole attackers detect...

  17. Survey of Attacks on Mobile AdhocWireless Networks

    Directory of Open Access Journals (Sweden)

    Vikas Solomon Abel

    2011-02-01

    Full Text Available Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the combined Internet-MANET environment also security is an important issue keeping in view the Internet connectivity and attack on the MANET protocols.

  18. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  19. Is There Anybody There? A Psychodynamic View of Panic Attack.

    Science.gov (United States)

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  20. Induction of panic attack by stimulation of the ventromedial hypothalamus.

    Science.gov (United States)

    Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M

    2010-06-01

    Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies. PMID:19852539