WorldWideScience

Sample records for beauveria bassiana attacking

  1. Production of extracellular proteolytic enzymes by Beauveria bassiana

    OpenAIRE

    Józefa Chrzanowska; Maria Kołaczkowska

    2014-01-01

    The production of proteolytic enzymes by two strains of Beauveria bassiana 278, B. bassiana 446 and one strain of Ascosphera apis 496 was analysed. It was demonstrated that the strain of B. bassiana 278 proved to be the best producer of basic and acid proteases. The influence of different environmental factors such as nitrogen and carbon sources on the production of extracellular hydrolytic enzymes was assessed. In addition the acid protease from B. bassiana was partially characterized.

  2. Production of extracellular proteolytic enzymes by Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Józefa Chrzanowska

    2014-08-01

    Full Text Available The production of proteolytic enzymes by two strains of Beauveria bassiana 278, B. bassiana 446 and one strain of Ascosphera apis 496 was analysed. It was demonstrated that the strain of B. bassiana 278 proved to be the best producer of basic and acid proteases. The influence of different environmental factors such as nitrogen and carbon sources on the production of extracellular hydrolytic enzymes was assessed. In addition the acid protease from B. bassiana was partially characterized.

  3. Beauveria bassiana: quercetinase production and genetic diversity

    Directory of Open Access Journals (Sweden)

    Eula Maria de M. B Costa

    2011-03-01

    Full Text Available Beauveria bassiana genetic diversity and ability to synthesize quercetin 2,3-dioxygenase (quercetinase were analyzed. B. bassiana isolates, obtained from Brazilian soil samples, produced quercetinase after induction using 0.5 g/L quercetin. B. bassiana ATCC 7159 (29.6 nmol/mL/min and isolate IP 11 (27.5 nmol/ml/min showed the best performances and IP 3a (9.5 nmol/mL/min presented the lowest level of quercetinase activity in the culture supernatant. A high level of polymorphism was detected by random amplified polymorphic DNA (RAPD analysis. The use of internal-transcribed-spacer ribosomal region restriction fragment length polymorphism (ITS-RFLP did not reveal characteristic markers to differentiate isolates. However, the ITS1-5.8S-ITS2 region sequence analysis provided more information on polymorphism among the isolates, allowing them to be clustered by relative similarity into three large groups. Correlation was tested according to the Person's correlation. Data of our studies showed, that lower associations among groups, level of quercetinase production, or geographical origin could be observed. This study presents the production of a novel biocatalyst by B. bassiana and suggests the possible industrial application of this fungal species in large-scale biotechnological manufacture of quercetinase.

  4. Beauveria bassiana: endophytic colonization and plant disease control.

    Science.gov (United States)

    Ownley, Bonnie H; Griffin, Mary R; Klingeman, William E; Gwinn, Kimberly D; Moulton, J Kevin; Pereira, Roberto M

    2008-07-01

    Seed application of Beauveria bassiana 11-98 resulted in endophytic colonization of tomato and cotton seedlings and protection against plant pathogenic Rhizoctonia solani and Pythium myriotylum. Both pathogens cause damping off of seedlings and root rot of older plants. The degree of disease control achieved depended upon the population density of B. bassiana conidia on seed. Using standard plating techniques onto selective medium, endophytic 11-98 was recovered from surface-sterilized roots, stems, and leaves of tomato, cotton, and snap bean seedlings grown from seed treated with B. bassiana 11-98. As the rate of conidia applied to seed increased, the proportion of plant tissues from which B. bassiana 11-98 was recovered increased. For rapid detection of B. bassiana 11-98 in cotton tissues, we developed new ITS primers that produce a PCR product for B. bassiana 11-98, but not for cotton. In cotton samples containing DNA from B. bassiana11-98, the fungus was detected at DNA ratios of 1:1000; B. bassiana 11-98 was detected also in seedlings grown from seed treated with B. bassiana 11-98. Using SEM, hyphae of B. bassiana11-98 were observed penetrating epithelial cells of cotton and ramifying through palisade parenchyma and mesophyll leaf tissues. B. bassiana11-98 induced systemic resistance in cotton against Xanthomonas axonopodis pv. malvacearum (bacterial blight). In parasitism assays, hyphae of B. bassiana 11-98 were observed coiling around hyphae of Pythium myriotylum. PMID:18442830

  5. Molecular Genetics of Beauveria bassiana Infection of Insects.

    Science.gov (United States)

    Ortiz-Urquiza, A; Keyhani, N O

    2016-01-01

    Research on the insect pathogenic filamentous fungus, Beauveria bassiana has witnessed significant growth in recent years from mainly physiological studies related to its insect biological control potential, to addressing fundamental questions regarding the underlying molecular mechanisms of fungal development and virulence. This has been in part due to a confluence of robust genetic tools and genomic resources for the fungus, and recognition of expanded ecological interactions with which the fungus engages. Beauveria bassiana is a broad host range insect pathogen that has the ability to form intimate symbiotic relationships with plants. Indeed, there is an increasing realization that the latter may be the predominant environmental interaction in which the fungus participates, and that insect parasitism may be an opportunist lifestyle evolved due to the carbon- and nitrogen-rich resources present in insect bodies. Here, we will review progress on the molecular genetics of B. bassiana, which has largely been directed toward identifying genetic pathways involved in stress response and virulence assumed to have practical applications in improving the insect control potential of the fungus. Important strides have also been made in understanding aspects of B. bassiana development. Finally, although increasingly apparent in a number of studies, there is a need for progressing beyond phenotypic mutant characterization to sufficiently investigate the molecular mechanisms underlying B. bassiana's unique and diverse lifestyles as saprophyte, insect pathogen, and plant mutualist. PMID:27131326

  6. Entomopathogenic fungus \\kur{Beauveria bassiana }- biological characteristics

    OpenAIRE

    PAVLÍČEK, Pavel

    2012-01-01

    This literature compilation focuses on current knowledge in the biological characteristics of the entomopathogenic fungi Beauveria bassiana, with emphasis on the influence of abiotic factors on the development and its effectiveness in selected species of harmful insects. Knowledge of abiotic factors is important for a successful outcome to protect plants against harmful agents this entomopathogen. There are also set out the specifics, benefits and examples of using the aforementioned entomopa...

  7. Spore production of Beauveria bassiana from agro-industrial residues

    OpenAIRE

    Herta Stutz Dalla Santa; Osmar Roberto Dalla Santa; Débora Brand; Luciana Porto de Souza Vandenberghe; Carlos Ricardo Soccol

    2005-01-01

    The purpose of this work was to produce Beauveria bassiana by Solid-State Fermentation using agro-industrial residues and optimizing the cultivation conditions. Refused potatoes, coffee husks and sugar-cane bagasse were tested. The blend of refused potatoes and sugar-cane bagasse (60-40%) with particle size in the range of 0.8-2 mm was used in the fermentation experiments. In Erlenmeyer flasks the best spore production was achieved with the following conditions: incubation temperature 26º C; ...

  8. Genetic diversity among brazilian isolates of beauveria bassiana: comparisons with non-brazilian isolates and other beauveria species

    Science.gov (United States)

    Fernandes, E.K.K.; Moraes, A.M.L.; Pacheco, R.S.; Rangel, D.E.N.; Miller, M.P.; Bittencourt, V.R.E.P.; Roberts, D.W.

    2009-01-01

    Aims: The genetic diversity of Beauveria bassiana was investigated by comparing isolates of this species to each other (49 from different geographical regions of Brazil and 4 from USA) and to other Beauveria spp. Methods and Results: The isolates were examined by multilocus enzyme electrophoresis (MLEE), amplified fragment length polymorphism (AFLP), and rDNA sequencing. MLEE and AFLP revealed considerable genetic variability among B. bassiana isolates. Several isolates from South and Southeast Brazil had high similarity coefficients, providing evidence of at least one population with clonal structure. There were clear genomic differences between most Brazilian and USA B. bassiana isolates. A Mantel test using data generated by AFLP provided evidence that greater geographical distances were associated with higher genetic distances. AFLP and rDNA sequencing demonstrated notable genotypic variation between B. bassiana and other Beauveria spp. Conclusion: Geographical distance between populations apparently is an important factor influencing genotypic variability among B. bassiana populations in Brazil. Significance and Impact of the Study: This study characterized many B. bassiana isolates. The results indicate that certain Brazilian isolates are considerably different from others and possibly should be regarded as separate species from B. bassiana sensu latu. The information on genetic variation among the Brazilian isolates, therefore, will be important to comprehending the population structure of B. bassiana in Brazil. ?? 2009 The Society for Applied Microbiology.

  9. The use of aggregation pheromone to enhance dissemination of Beauveria bassiana for the control of the banana weevil in Uganda

    NARCIS (Netherlands)

    Tinzaara, W.; Gold, C.S.; Dicke, M.; Huis, van A.; Nankinga, C.M.; Kagezi, G.H.; Ragama, P.E.

    2007-01-01

    Candidate strains of Beauveria bassiana were identified for use in integrated pest management of the banana weevil Cosmopolites sordidus. Horizontal field transmission of B. bassiana between banana weevils using different delivery systems, including aggregation pheromones, was investigated. We obser

  10. Cordyceps bassiana and production of stromata in vitro showing Beauveria anamorph in Korea

    Science.gov (United States)

    A Cordyceps species was found with Beauveria anamorph state on larval insect cadavers on Obong Mountsin in Gangwon Pronvince, Republic of Korea. Cultures from discharged ascospores formed an anamorph identifiable as Beauveria bassiana. This teleomorph-anamorph connection was also confirmed by the in...

  11. Safety of Beauveria bassiana (Bals. Vuill. to Gallus domesticus L.

    Directory of Open Access Journals (Sweden)

    Jucelaine Haas-Costa

    2010-04-01

    Full Text Available Beauveria bassiana, an important insect pathogen was used to evaluate its effect on the feeding, behavior, histology of the digestory system and anatomy of Gallus domesticus. The fungus (strain Unioeste 4 was administrated orally treated with chicken food. Chicken feces were collected, and the birds observed for 28 days. Also, were evaluated the weight of the birds, as well as any sign of intoxication or pathological modification. Tissue samples were withdrawn to test lesions with the optic microscope. There was 100% of survival of the birds, and no behavior alteration or external lesion was found. The test group presented the highest weight gain (1383.9±54.4g. Viable conidia were observed in the feces until 24 h after feeding the fungus, indicating that there was no germination inside the digestory system. No tissue lesion was observed, providing overwhelming evidence for the safety of B. bassiana to non-target organism G. domesticus.Beauveria bassiana é um importe entomopatógeno, sendo avaliado seu efeito sobre a alimentação, comportamento e histologia do sistema digestório de Gallus domesticus. O fungo (isolado Unioeste 4 foi administrado oralmente às aves, misturado à ração. Estas foram observadas por 28 dias e as fezes coletadas diariamente para análise. Também foi avaliado o peso das aves, bem como sinais de intoxicação ou modificação patológica. Amostras teciduais foram retiradas para verificar lesões com o microscópico óptico. Houve sobrevivência de 100% das aves avaliadas e nenhuma alteração comportamental ou lesão externa durante o experimento. O grupo teste apresentou o maior ganho de peso (1383,9±54,4g, sendo mais acentuado a partir da segunda semana. Observou-se a presença de conídios viáveis nas fezes somente até 24 horas após a ingestão do fungo, indicando que não houve germinação nas aves. Nenhuma lesão tecidual foi verificada, de forma que B. bassiana mostrou-se seguro para o organismo n

  12. Genes involved in virulence of the entomopathogenic fungus Beauveria bassiana.

    Science.gov (United States)

    Valero-Jiménez, Claudio A; Wiegers, Harm; Zwaan, Bas J; Koenraadt, Constantianus J M; van Kan, Jan A L

    2016-01-01

    Pest insects cause severe damage to global crop production and pose a threat to human health by transmitting diseases. Traditionally, chemical pesticides (insecticides) have been used to control such pests and have proven to be effective only for a limited amount of time because of the rapid spread of genetic insecticide resistance. The basis of this resistance is mostly caused by (co)dominant mutations in single genes, which explains why insecticide use alone is an unsustainable solution. Therefore, robust solutions for insect pest control need to be sought in alternative methods such as biological control agents for which single-gene resistance is less likely to evolve. The entomopathogenic fungus Beauveria bassiana has shown potential as a biological control agent of insects, and insight into the mechanisms of virulence is essential to show the robustness of its use. With the recent availability of the whole genome sequence of B. bassiana, progress in understanding the genetics that constitute virulence toward insects can be made more quickly. In this review we divide the infection process into distinct steps and provide an overview of what is currently known about genes and mechanisms influencing virulence in B. bassiana. We also discuss the need for novel strategies and experimental methods to better understand the infection mechanisms deployed by entomopathogenic fungi. Such knowledge can help improve biocontrol agents, not only by selecting the most virulent genotypes, but also by selecting the genotypes that use combinations of virulence mechanisms for which resistance in the insect host is least likely to develop. PMID:26628209

  13. Spore production of Beauveria bassiana from agro-industrial residues

    Directory of Open Access Journals (Sweden)

    Herta Stutz Dalla Santa

    2005-06-01

    Full Text Available The purpose of this work was to produce Beauveria bassiana by Solid-State Fermentation using agro-industrial residues and optimizing the cultivation conditions. Refused potatoes, coffee husks and sugar-cane bagasse were tested. The blend of refused potatoes and sugar-cane bagasse (60-40% with particle size in the range of 0.8-2 mm was used in the fermentation experiments. In Erlenmeyer flasks the best spore production was achieved with the following conditions: incubation temperature 26º C; initial pH 6.0; inoculum concentration 10(7 spores.g-1.dw and initial moisture 75%. In the column type reactor using forced aeration under the optimized conditions, the maximum production (1.07x10(10spores.g-1.dw was obtained at the 10th day of fermentation. The respirometric analyses of the fermentation showed a strong correlation between fungal growth and spore production.O objetivo deste trabalho foi produzir Beauveria bassiana por fermentação no estado sólido em resíduos agro-industriais e otimizar as condições de cultivo. Batata-refugo, polpa de café e bagaço de cana de açúcar foram testados. A mistura de batata-refugo e de bagaço de cana de açúcar (60:40%, com granulometria de 2 a 0,8 mm foi escolhida como melhor substrato/suporte. Em frascos de Erlenmeyer a produção de esporos foi maior com as seguintes condições: pH 6,0; temperatura de incubação de 26º C; taxa de inóculo de 10(7 esporos.g-1 de matéria seca; e umidade inicial de 75%. Em bioreator do tipo coluna com aeração forçada, as condições otimizadas possibilitaram uma produção máxima de esporos no 10º dia de fermentação, obtendo-se 1,07x10(10 esporos.g-1 de matéria seca. A análise respirométrica desta fermentação permitiu correlacionar o desenvolvimento do fungo com a produção de esporos.

  14. Preservation of Beauveria bassiana (Balsam Vuillemin (moniliales: moniliaceae pathogenicityagainst the coffee borer in different systems

    Directory of Open Access Journals (Sweden)

    T. Bahamón

    2011-12-01

    Full Text Available The objective of this study is to find preservation techniques of Beauveria bassiana pathogenicity in the laboratory. Long term storage of B. bassiana cultures is very important to prepare industrial products. Preservation techniques for pathogenicity would replace the need to pass B. bassiana spores frequently in the target insect. Studies on B. bassiana pathogenicity are almost nonexistent. Viability of B. bassiana was evaluated in comparison with pathogenicity when subjected to different preservation temperatures with various protectors. The most succesful procedures were silica gel and mineral oil in refrigeration; glicerol and dimethilsulfoxide in liquid nitrogen; liophilization with skim milk at 10% and 20% and skim milk with inositol at 5%. The tests were carried our during 24 weeks at 6 weeks intervals. A monosporic B. bassiana culture (Bb. 9620 isolated by Cenicafé research center was used for the study. The mean value for the preservation of pathogenicity was influenced by the protectors used.

  15. Existence of entomopathogen fungi, Beauveria bassiana as an endophyte in cacao seedlings

    Directory of Open Access Journals (Sweden)

    Endang Sulistyowati

    2015-12-01

    Full Text Available Beauveria bassiana is one of the entomopathogen fungi which is known as biological control agent of cocoa pod borer and cocoa mirids (Helopeltis spp.. Because of its effectiveness in the fields is still not consistent, so we conduct a research with the objective to know the possibility of Beauveria bassiana to be established as a endophyte. Various fungal entomopathogens have already been reported as endophytes and the various methods used to inoculate the plants with B. bassiana were partially effective. The research has been conducted in laboratory of Plant Protection, Indonesian Coffee and Cocoa Research Institute by inoculating of cocoa seeds and cocoa nursery with B. bassiana suspension.  The trial was arranged  by randomized complete block design with a factorial arrangement. The factor were spore concentration of B. bassiana (0; 2; and 4 g/ 10 l and cocoa varieties (family of ICS 60, TSH858, and hybrid. The trial were use  four replications. The results showed that the fungal entomopathogen B. bassiana was established as an endophyte in cocoa seedling, both from cocoa seeds and nursery application. Percentage of existence of B. bassiana colonies as endophytes one month after seeds application were ICS 60 amounted to 93.3 % both on concentration treatments, while the families of TSH 858 by 80 % and 86.67 % respectively in 2 g and 4 g per 10 l of B. bassiana spores concentration treament.. The lowest percentage was in hybrids, which amounted to 66.67% and 50%. B. bassiana colonies was exixtence as an endophyte in culture from root, stem and leaves of cocoa seedling up to 5 months post inoculation. While the application on nursery by soil drenshing, leaf spraying, and stem injection , it was known that B. bassiana colonies were found in the tissues of leaves, stems, and roots until two months after application. Colonies of B. bassiana as endophytes still exsist until six weeks after nursery was planted in the field. 

  16. Production of conidia of Beauveria bassiana in solid-state culture: current status and future perspectives.

    Science.gov (United States)

    Lopez-Perez, M; Rodriguez-Gomez, D; Loera, O

    2015-01-01

    Beauveria bassiana is an important entomopathogenic fungus widely commercialized in the world. Recent progress and achievements on conidia production have focused on a yield goal of 10(9) to 10(10) conidia per gram of dry substrate. Due to cost-competitive perspectives, these yields should be associated with better production rates or productivities. This study presents a review of relevant studies of B. bassiana conidia production on solid-state cultures and the parameters that should be taken into account to maintain constant quality in the product to be commercialized. Conditions for maximizing production and infectivity of B. bassiana conidia are also analysed. PMID:24494702

  17. The Existence of Beauveria bassiana in the Third Generation of Corn Seddling

    OpenAIRE

    Diana Daud, Itji; Widiayani, Nuniek

    2015-01-01

    Abstract The fungus Beauveria bassiana can be endophytic in maize. The fungus was recovered in culture from stems, leaves and roots after a month planting. This phenomenon was shown until the third generation of the corn. The result from laboratory shows that B.bassiana appear in F1, F2 and F3 in order 70, 80 and 90% in the roots, 80% in the stems in all generation, 90, 80 and 70% in leaves. In CFU???s ml-1 of B. bassiana in corn seed, show F1 was 8.9 x 106, F2 was 8.1 x 106 a...

  18. Molecular characterization of a novel amalgavirus from the entomopathogenic fungus Beauveria bassiana

    Czech Academy of Sciences Publication Activity Database

    Koloniuk, Igor; Hrabáková, Lenka; Petrzik, Karel

    2015-01-01

    Roč. 160, č. 6 (2015), s. 1585-1588. ISSN 0304-8608 R&D Projects: GA MŠk LH13136; GA MŠk(CZ) EE2.3.30.0032 Institutional support: RVO:60077344 Keywords : Monopartite DsRNA Virus * Beauveria bassiana * amalgaviruses infecting fungi Subject RIV: EE - Microbiology, Virology Impact factor: 2.390, year: 2014

  19. EICOSANOIDS MEDIATE MANDUCA SEXTA CELLULAR RESPONSE TO BEAUVERIA BASSIANA: A ROLE FOR THE LIPOXYGENASE PATHWAY

    Science.gov (United States)

    Many studies have documented the involvement of eicosanoids in insect cellular immune responses to bacteria. The use of Beauveria bassiana as a nodulation elicitor, with inhibition of phospholipase A2 by dexamethasone extends the principal to fungi. This study also provides the first evidence of i...

  20. Comparative impact of artificial selection for fungicide resistance on Beauveria bassiana and Metarhizium brunncum

    Science.gov (United States)

    Hypocreales fungi such as Beauveria bassiana and Metarhizium anisopliae can be negatively affected by fungicides thereby reducing their biocontrol potential. The overall goal of this study was to investigate the impact of artificial selection for fungicide resistance on two commercial entomopathoge...

  1. Improved shelf life of dried Beauveria bassiana blastospores using convective drying and active packaging processes

    Science.gov (United States)

    The yeast form (blastospore) of the dimorphic insect-pathogenic fungus Beauveria bassiana can be rapidly produced using liquid fermentation methods but is generally unable to survive rapid dehydration processes or storage under non-refrigerated conditions. In this study, we evaluated the influence o...

  2. Anopheline and culicine mosquitoes are not repelled by surfaces treated with the entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana

    NARCIS (Netherlands)

    Mnyone, L.L.; Koenraadt, C.J.M.; Lyimo, I.N.; Mpingwa, M.W.; Takken, W.; Russell, T.L.

    2010-01-01

    Background - Entomopathogenic fungi, Metarhizium anisopliae and Beauveria bassiana, are promising bio-pesticides for application against adult malaria mosquito vectors. An understanding of the behavioural responses of mosquitoes towards these fungi is necessary to guide development of fungi beyond t

  3. Evaluation of Metarhizium anisopliae, Beauveria bassiana and Paecilomyces fumosoroseus as entomopathogens of the cactus moth, Cactoblastis cactorum (Lepidoptera:Pyralidae)

    Science.gov (United States)

    The fungal pathogens Metarhizium anisopliae (Metchnikoff) Sorokin (Hypocreales: Clavicipitaceae), Paecilomyces fumosoroseus (Wize) Brown & Smith (Deuteromycotina: Hyphomycetes), and Beauveria bassiana (Bals.-Criv.) Vuill. (Hypocreales: Clavicipitaceae) were evaluated as potential biological control ...

  4. Isolation and Assessment of Stability of Six Formulations of Entomopathogenic Beauveria bassiana.

    Science.gov (United States)

    Mwamburi, Lizzy A

    2016-01-01

    Beauveria bassiana is the most widely studied and exploited entomopathogen. The development of a suitable formulation for B. bassiana is a critical component in aiding the entomopathogen germinate and infect the host. In addition to being economical to produce, having high residual activity, it is also important that the formulation is easy to handle, stable during storage, and convenient to mix and apply and be consistently effective in controlling the target pest.In this chapter we describe preparation of experimental formulations of conidia of B. bassiana. The formulations are prepared with barley, rice, wheat bran, clay, kaolin, and peat. The protocol for assessing the stability of the formulations of B. bassiana is also described. PMID:27565494

  5. Discovery and demonstration of the teleomorph of Beauve-ria bassiana (Bals.) Vuill. , an important entomogenous fun-gus

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A Cordyceps specimen was collected in Anhui, China, a strain of Beauveria bassiana, an important entomopathogenic fungus for biological pest control, was isolated and their relationship was demonstrated by microcycle conidiation. The teleomorph is an undescribed species and is named Cordyceps bassiana.

  6. Screening of liquid media and fermentation of an endophytic Beauveria bassiana strain in a bioreactor

    OpenAIRE

    Lohse, Rieke; Jakobs-Schönwandt, Desiree; Patel, Anant V

    2014-01-01

    A novel approach for biological control of insect pests could be the use of the endophytic entomopathogenic Beauveria bassiana isolate ATP-02. For the utilization of the endophyte as a commercial biocontrol agent, the fungus has to be mass-produced. B. bassiana was raised in shake flask cultures to produce high concentrations of total spores (TS), which include blastospores (BS) and submerged conidiospores (SCS). The highest concentration of 1.33×109 TS/mL and the highest yield of 5.32×1010 T...

  7. PATOGENICIDADE DE BEAUVERIA BASSIANA (BALS.) VUILL. AO ÁCARO Tetranychus urticae KOCH PATHOGENICITY OF BEAUVERIA BASSIANA (BALS.) VUILL. AGAINST Tetranychus urticae KOCH

    OpenAIRE

    Marco Antonio Tamai; Sérgio Batista Alves; Pedro Janeiro Neves

    1999-01-01

    O estudo da patogenicidade de Beauveria bassiana (Bals.) Vuill. ao ácaro Tetranychus urticae Koch foi desenvolvido a 25 ± 2°C, 70 ± 5% UR e 12 horas de fotofase, utilizando-se fêmeas recém-emergidas. Os ácaros foram mantidos durante seis dias em discos de folha de Canavalia ensiformis (L.) DC. inoculadas com B. bassiana, isolado 447, nas concentrações: 5x106, 1x107, 5x107, 1x108, 5x108 e 1x109 conídios/ml. Este isolado mostrou-se patogênico a T. urticae, apresentando aumento nos valores das m...

  8. Use of Beauveria bassiana and Metarhizium anisopliae for fruit fly control: a novel approach

    International Nuclear Information System (INIS)

    The potential of two species of entomopathogenic fungi, Beauveria bassiana (Bals.) and Metarhizium anisopliae (Met.) Sorokin, as practical fruit fly biocontrol agents is studied. These natural inhabitants of soil are found infecting a wide range of insect species that spend at least one stage of their life cycle in the soil. Sterile flies are used as vectors of the infection. A summary of results from different laboratory and field cage experiments is presented. (MAC)

  9. Optimization of Solid-State Fermentation for Improved Conidia Production of Beauveria bassiana as a Mycoinsecticide

    OpenAIRE

    Pham, Tuan Anh; Kim, Jeong Jun; Kim, Keun

    2010-01-01

    The production of conidia of entomopathogenic Beauveria bassiana by solid-state fermentation was studied for the development of a biocontrol agent against aphid Myzus persicae. The optimal conditions for conidia production on polished white rice were 40% moisture content, 25℃ culture temperature, 2-day-old seeding culture grown in 3% corn meal, 2% rice bran, 2% corn steep powder medium, initial conidia concentration of 107 conidia/g in the wet rice, 10% inoculum size, and use of a polyethylen...

  10. Efficacy of Molasses and Beauveria bassiana (Balsamo) Vuill on the Control of Cosmopolites sorditus Germar, 1824

    OpenAIRE

    Flávia Queiroz de Oliveira; José Bruno Malaquias; Luiz Leonardo Ferreira; Thiago de Souza Ribeiro; Alexandre Igor de Azevedo Pereira

    2010-01-01

    This research sought to study the compatibility between the molasses and the entomopathogenic fungi Beauveria bassiana (Balsamo) Vuill on the control of Cosmopolites sorditus Germar, 1824. The study was conducted on the Site Pitiá in a banana plantation of approximately 250 m2, located in the municipality of Areia, state of Paraiba, Brazil. The results showed that the constancy of C. sorditus was significantly higher in traps consisting of molasses+fungi (P

  11. The characteristics of keratomycosis by Beauveria bassiana and its successful treatment with antimycotic agents

    OpenAIRE

    Sonoyama, Hiroko; Araki-Sasaki, Kaoru; Kazama, Shigeyasu; Kawasaki, Tsutomu; Ideta, Hidenao; Sunada, Atsuko; Asari, Seishi; Inoue, Yoshitsugu; Hayashi, Kozaburo

    2008-01-01

    Clinical findings and treatment of keratomycosis caused by Beauveria bassiana, an entomopathogenic filamentous fungus, are described for an 80-year-old woman, who was referred to the hospital for ocular pain and redness on the 9th day after an ocular injury caused by the frame of her glasses. She had a long history of recurrent diabetic iritis and continuously used topical antibiotics and corticosteroids. At her first visit, a slit-lamp examination indicated a corneal ulcer confined within th...

  12. Use of Beauveria bassiana and Metarhizium anisopliae for fruit fly control: a novel approach

    Energy Technology Data Exchange (ETDEWEB)

    Toledo, Jorge; Liedo, Pablo, E-mail: jtoledo@ecosur.m [El Colegio de la Frontera Sur, Chiapas (Mexico). Dept. de Entomologia Tropical; Flores, Salvador; Montoya, Pablo [Secretaria de Agricultura, Ganaderia, Desarrollo Rural, Pesca y Alimentacion (SAGARPA), Chiapas (Mexico). Subdireccion de Desarrollo de Metodos; Campos, Sergio E.; Villasenor, Antonio [Secretaria de Agricultura, Ganaderia, Desarrollo Rural, Pesca y Alimentacion (SAGARPA), Chiapas (Mexico). Programa Moscamed. Direccion de Operaciones de Campo

    2006-07-01

    The potential of two species of entomopathogenic fungi, Beauveria bassiana (Bals.) and Metarhizium anisopliae (Met.) Sorokin, as practical fruit fly biocontrol agents is studied. These natural inhabitants of soil are found infecting a wide range of insect species that spend at least one stage of their life cycle in the soil. Sterile flies are used as vectors of the infection. A summary of results from different laboratory and field cage experiments is presented. (MAC)

  13. Field applications of Beauveria bassiana to control the European cherry fruit fly Rhagoletis cerasi

    OpenAIRE

    Daniel, Claudia; Wyss, Eric

    2010-01-01

    Field experiments with foliar applications of Beauveria bassiana ATCC 74040 (product Naturalis-L) were conducted to control the European cherry fruit fly Rhagoletis cerasi Loew (Diptera: Tephritidae), a major pest of cherries in Europe. Naturalis-L was applied at concentrations of 250 ml per 100 l in 7-day intervals during the flight period of R. cerasi. Flight activity monitored by yellow sticky traps was only slightly affected by treatments. Infection and mycosis of adult cherry fruit fl...

  14. Selection of Beauveria bassiana and Metarhizium anisopliae Isolates to Control Triatoma infestans

    Directory of Open Access Journals (Sweden)

    Luz Christian

    1998-01-01

    Full Text Available Twenty three isolates of Beauveria bassiana and 13 isolates of Metarhizium anisopliae were tested on third instar nymphs of Triatoma infestans, a serious vector of Chagas disease. Pathogenicity tests at saturated humidity showed that this insect is very susceptible to fungal infection. At lower relative humidity (50%, conditions expected in the vector microhabitat, virulence was significantly different among isolates. Cumulative mortality 15 days after treatment varied from 17.5 to 97.5%, and estimates of 50% survival time varied from 6 to 11 days. Maintaining lower relative humidity, four B. bassiana and two M. anisopliae isolates were selected for analysis of virulence at different conidial concentrations and temperatures. Lethal concentrations sufficient to kill 50% of insects (LC50 varied from 7.1x105 to 4.3x106 conidia/ml, for a B. bassiana isolate (CG 14 and a M. anisopliae isolate (CG 491 respectively. Most isolates, particularly B. bassiana isolates CG 24 and CG 306, proved to be more virulent at 25 and 30°C, compared to 15 and 20°C. The differential virulence at 50% humidity observed among some B. bassiana isolates was not correlated to phenetic groups in cluster analysis of RAPD markers. In fact, the B. bassiana isolates analyzed presented a high homogeneity (> 73% similarity.

  15. Plant extracts on Hypothenemus hampei (Coleoptera: Curculionidae and Beauveria bassianaExtratos vegetais sobre Hypothenemus hampei (Coleoptera: Curculionidae e Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Janaina Zorzetti

    2012-12-01

    Full Text Available Looking for alternatives to pesticides for Hypothenemus hampei control, the objective of this study was to evaluate the potential of aqueous and ethanolic plant extracts of Moringa oleifera (Moringa and Tephrosia purpurea (tephrosia (seeds, leaves and roots and Melia azedarach (cinnamon, Nerium oleander (oleander and Azadirachta indica (neem (leaves only, on mortality and repellency of H. hampei and its compatibility with Beauveria bassiana, an important natural enemy of this pest. To assess the mortality, coffee leaves (Coffea arabica L were treated by immersion in a solution of endosulfan and plant extracts at a concentration of 10% and then offered to adults of H. hampei. The repellency was evaluated in multiple-choice tests and in no-choice tests among coffee fruit treated and untreated The compatibility between extracts and Beauveria bassiana (CG 452 was analyzed by quantifying germination, colony forming units, growth and yield / productivity of conidia. The highest mortalities were observed when leaves were treated with ethanolic extract of T. purpurea (leaves which did not differ from endosulfan, and aqueous and ethanolic extracts from M. oleifera seeds . In free-choice tests, all the ethanolic extracts showed repellent action, being higher for M. oleifera (root and T. purpurea (seed. The aqueous extracts of M. oleifera (leaves and seeds and N. oleander (leaves showed the highest repellency. In no-choice tests the highest repellency level was for coffee fruits treated with A. indica (leaves. The ethanolic extract of M. oleifera leaves negatively affected B. bassiana germination. These studies showed the potential of these plant extracts for use in the field as an alternative to chemical control, once they are also selective for B. bassiana. Visando alternativas ao uso de agrotóxicos no controle de Hypothenemus hampei, o objetivo deste trabalho foi avaliar o potencial de extratos vegetais aquosos e etanólicos de Moringa oleifera

  16. Metabolic responses of Beauveria bassiana to hydrogen peroxide-induced oxidative stress using an LC-MS-based metabolomics approach.

    Science.gov (United States)

    Zhang, Chen; Wang, Wei; Lu, Ruili; Jin, Song; Chen, Yihui; Fan, Meizhen; Huang, Bo; Li, Zengzhi; Hu, Fenglin

    2016-06-01

    The entomopathogenic fungus, Beauveria bassiana, is commonly used as a biological agent for pest control. Environmental and biological factors expose the fungus to oxidative stress; as a result, B. bassiana has adopted a number of anti-oxidant mechanisms. In this study, we investigated metabolites of B. bassiana that are formed in response to oxidative stress from hydrogen peroxide (H2O2) by using a liquid chromatography mass spectrometry (LC-MS) approach. Partial least-squares discriminant analysis (PLS-DA) revealed differences between the control and the H2O2-treated groups. Hierarchical cluster analysis (HCA) showed 18 up-regulated metabolites and 25 down-regulated metabolites in the H2O2-treated fungus. Pathway analysis indicated that B. bassiana may be able to alleviate oxidative stress by enhancing lipid catabolism and glycometabolism, thus decreasing membrane polarity and preventing polar H2O2 or ROS from permeating into fungal cells and protecting cells against oxidative injury. Meanwhile, most of the unsaturated fatty acids that are derived from glycerophospholipids hydrolysis can convert into oxylipins through autoxidation, which can prevent the reactive oxygen of H2O2 from attacking important macromolecules of the fungus. Results showed also that H2O2 treatment can enhance mycotoxins production which implies that oxidative stress may be able to increase the virulence of the fungus. In comparison to the control group, citric acid and UDP-N-acetylglucosamine were down-regulated, which suggested that metabolic flux was occurring to the TCA cycle and enhancing carbohydrate metabolism. The findings from this study will contribute to the understanding of how the molecular mechanisms of fungus respond to environmental and biological stress factors as well as how the manipulation of such metabolisms may lead to selection of more effective fungal strains for pest control. PMID:27116916

  17. Selectivity of Beauveria bassiana and Metarrhizium anisopliae to Trichogramma pretiosum Riley (Hymenoptera: Trichogrammatidae); Seletividade de Beauveria bassiana e Metarhizium anisopliae a Trichogramma pretiosum Riley (Hymenoptera: Trichogrammatidae)

    Energy Technology Data Exchange (ETDEWEB)

    Potrich, Michele; Silva, Everton L. da; Neves, Pedro M.O.J. [Universidade Estadual de Londrina (UEL), PR (Brazil). Centro de Ciencias Agrarias], e-mail: profmichele@gmail.com, e-mail: evertonloz@gmail.com, e-mail: pedroneves@uel.br; Alves, Luis F.A.; Daros, Alaxsandra [Universidade do Oeste do Parana (UNIOESTE), Cascavel, PR (Brazil). Centro de Ciencias Biologicas e da Saude. Lab. de Zoologia de Invertebrados], e-mail: lfaalves@unioeste.br; Haas, Jucelaine; Pietrowski, Vanda [Universidade do Oeste do Parana (UNIOESTE), Marechal Candido Rondon, PR (Brazil). Centro de Ciencias Agrarias], e-mail: jubarth@gmail.com, e-mail: vandapietrowski@gmail.com

    2009-07-01

    Trichogramma pretiosum Riley and the entomopathogenic fungi Beauveria bassiana and Metarhizium anisopliae are efficient biological control agents and are thought to be used jointly. In here, we investigated if these entomopathogens could have any side-effects on T. pretiosum. Therefore, 1 x 8 cards containing sterilized eggs of Anagasta kuehniella (Zeller) that were sprayed with 0.2 ml of B. bassiana or M. anisopliae (1.0 X 10{sup 9} conidia/ml) were offered to a T. pretiosum female for 24h (30 cards/fungus = 30 replicates). Afterwards, females were isolated in glass tubes. The control group was sprayed with sterile distillated water + Tween 80 (0.01%). In addition, 60 cards with sterilized eggs of A. kuehniella were submitted to parasitism by females of T. pretiosum for 24h. Of these cards, 30 were sprayed with B. bassiana or M. anisopliae and 30 with distillated water + Tween 80 (0.01%), and observed daily until parasitoid emergence. Metarhizium anisopliae decreased parasitoid emergence and caused confirmed mortality. Therefore, field and semi-field experiments should be conducted for a final assessment of the side-effects of these entomopathogens on Trichogramma as a ways to develop a control strategy in which both can be used. (author)

  18. Evaluation of kinetic parameters of chitinases produced by Beauveria bassiana (Bals.) Vuill. /
    Avaliação de parâmetros cinéticos de quitinases produzidas por Beauveria bassiana (Bals.) Vuill.

    OpenAIRE

    Cristiane Mita; Vanessa Hitomi Sugahara; Jo I Wu; Pedro Manoel Oliveira Janeiro Neves; Dalva Tomoe Miyagui; Geni Varéa-Pereira; Danieli Cristina Sassá; Evelyn Kamogawa

    2008-01-01

    Entomopathogenic fungus Beauveria bassiana is currently used as a biocontrol agent for agricultural pests. The infection process involves extracellular enzymes such as proteases and chitinases that degrade the cuticle of the insects. The objective of this work was to evaluate kinetic parameters of pH, temperature, ionic concentration and time of reaction on chitinases activity. The fungus B. bassiana CG432 was cultivated on coffee berry borer Hypothenemus hampei (Ferrari) and the conidia grow...

  19. The characteristics of keratomycosis by Beauveria bassiana and its successful treatment with antimycotic agents

    Directory of Open Access Journals (Sweden)

    Hiroko Sonoyama

    2008-10-01

    Full Text Available Hiroko Sonoyama1, Kaoru Araki-Sasaki1, Shigeyasu Kazama1, Tsutomu Kawasaki1, Hidenao Ideta1, Atsuko Sunada2, Seishi Asari2, Yoshitsugu Inoue3, Kozaburo Hayashi41Ideta Eye Hospital, Kumamoto, Kumamoto, Japan; 2Department of Laboratory for Clinical Investigation, Osaka University Hospital, Suita, Osaka, Japan; 3Division of Ophthalmology and Visual Science, Department of Medicine of Sensory and Motor Organ, Tottori University, Yonago, Tottori, Japan; 4Immunology and Virology Section Lab, Immunology, NEI, NIH, Bethesda, MD, USAAbstract: Clinical findings and treatment of keratomycosis caused by Beauveria bassiana, an entomopathogenic filamentous fungus, are described for an 80-year-old woman, who was referred to the hospital for ocular pain and redness on the 9th day after an ocular injury caused by the frame of her glasses. She had a long history of recurrent diabetic iritis and continuously used topical antibiotics and corticosteroids. At her first visit, a slit-lamp examination indicated a corneal ulcer confined within the superficial stromal layer, along with a slight infiltration and edema. Only a very few inflammatory cells were seen in the anterior chamber. Direct microscopic examination of corneal scrapings revealed septate fungal hyphae with zig-zag rachis and budding that was subsequently identified as B. bassiana by slide culture. Topical voriconazole with miconazole, pimaricin and oral itraconazole were effective and the lesion disappeared leaving only a mild scar at 2 months. The sensitivity of B. bassiana to various antimycotic agents was confirmed by broth microdilution, agar dilution with the Clinical Laboratory Standard Institute standard, and a disk method using topically applied concentrations. B. bassiana, which exhibits a characteristic appearance in smears and causes superficial keratomycosis, is sensitive to voriconazole with miconazole, pimaricin, and itraconazole.Keywords: Beauveria bassiana, keratomycosis, filamentous

  20. Lethal effects of a Mexican Beauveria bassiana (Balsamo) strain against Meccus pallidipennis (Stal)

    Science.gov (United States)

    Lino, Zumaquero Rios José; Juventino, López-Tlacomulco José; Raúl, Rojas García; Estibaliz, Sansinenea

    2014-01-01

    The entomopathogenic fungus Beauveria bassiana (Balsamo 1835) Vuillemin is an effective alternative control agent against some agricultural pests and biological vectors of important diseases such as Chagas disease. In this work we studied an isolate of Beauveria bassiana from of the town of San Antonio Rayón, Puebla, Mexico and its entomopathogenic effects on Meccus pallidipennis (Stal 1872). Phylogenetic analysis using molecular comparison of the ITS and EF1α genes, showed that the resulting cladogram places the BUAP 04 strain with a relationship closer to the AFAO 9-6 strain, within the diversity of the B. bassiana sensu lato group. Although there was the possibility that BUAP 04 strain was a direct descendant of strains used in campaigns of biologic control, molecular study allowed us to recognize that it was a different fungus due to numerous inserts. A strain isolated from a T. dimiata was evaluated for pathogenicity against another triatoma (Meccus pallidipennis) species obtaining an LC50 of 4.16 × 106 spores/mL, confirming that the BUAP 04 strain is virulent for M. pallidipennis and could be a good prospect for formulations to control M. pallidipennis. PMID:25242941

  1. Protection of metal artifacts with the formation of metal–oxalates complexes by Beauveria bassiana

    OpenAIRE

    Joseph, Edith; Cario, Sylvie; Simon, Anaële; Wörle, Marie; Mazzeo, Rocco; Junier, Pilar; Job, Daniel

    2013-01-01

    Several fungi present high tolerance to toxic metals and some are able to transform metals into metal-oxalate complexes. In this study, the ability of Beauveria bassiana to produce copper oxalates was evaluated. Growth performance was tested on various copper-containing media. B. bassiana proved highly resistant to copper, tolerating concentrations of up to 20 g L-1, and precipitating copper oxalates on all media tested. Chromatographic analyses showed that this species produced oxalic acid a...

  2. RAPD e ITS Detectan Variación Molecular en Poblaciones Chilenea de Beauveria bassiana RAPD and ITS Reveal Molecular Variation of Chilean Populations of Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Viviana Becerra V

    2007-06-01

    Full Text Available Los hongos entomopatógenos son una alternativa atractiva para el control biológico de insectos plagas. En Chile, el Instituto de Investigaciones Agropecuarias (INIA, Centro Regional de Investigación Quilamapu mantiene aproximadamente 400 aislamientos de Beauveria, colectados a través del país. Esta colección ha sido parcialmente clasificada en base a su morfología y a su eficacia como controlador biológico. Sin embargo, es necesario complementar estos estudios con una caracterización a nivel genético-molecular, para determinar el nivel de diversidad genética de Beauveria bassiana e identificar posibles patrones de bandas que permitan dicriminar entre aislamientos. En este estudio, se analizaron 36 aislamientos de B. bassiana provenientes de diversas regiones geográficas del país. El análisis genético se realizó mediante el ADN Polimórfico Amplificado al Azar (RAPD y la Reacción en Cadena de la Polimerasa-Fragmentos de Restricción Polimórficos (PCR-RFLP de los espaciadores internos transcritos (ITS de las secuencias ribosomales del ADN (ITS-rDNA. El análisis de RAPD indicó una alta diversidad genética entre los aislamientos, con un promedio de 43% de similitud. Por otro lado, el análisis de los ITS determinó una menor diversidad, con un 83% de similitud entre aislamientos. La región ITS 1 mostró un mayor número de sitios de restricción que la región ITS 2. Los RAPD fueron más eficientes para discriminar (o identificar entre cepas debido al bajo número de haplotipos detectados con los ITS. Para los dos marcadores utilizados en este estudio, la diversidad genética no estuvo asociada con el origen geográfico de los aislamientos.Entomopathogenic fungi are an attractive alternative for the biological control of insects. In Chile, the Quilamapu Regional Research Center of the National Agricultural Research Institute (INIA has collected about 400 isolates of the genus Beauveria along the country. A partial

  3. Laboratory evaluation of Beauveria bassiana and Metarhizium anisopliae in the control of Haemaphysalis qinghaiensis in China.

    Science.gov (United States)

    Ren, Qiaoyun; Chen, Ze; Luo, Jin; Liu, Guangyuan; Guan, Guiquan; Liu, Zhijie; Liu, Aihong; Li, Youquan; Niu, Qingli; Liu, Junlong; Yang, Jifei; Han, Xueqing; Yin, Hong; Luo, Jianxun

    2016-06-01

    Haemaphysalis qinghaiensis, a prevalent tick species in China, is an ectoparasite that preferentially infests small ruminants and can transmit Theileria sp. and Babesia sp. In this study, we evaluated the pathogenicity of individual and mixed infections of the fungi Beauveria bassiana and Metarhizium anisopliae to H. qinghaiensis nymphs. The estimated LC50 for ticks immersed in solutions of B. bassiana, M. anisopliae and a mixture thereof were: 5.88056 × 10(4), 2.65 × 10(4), and 2.85 × 10(4) conidia mL(-1) respectively, and the nymphal mortality ranged from 52 to 100 %. Thus, these results suggest a potential approach for the biocontrol of H. qinghaiensis. PMID:27071674

  4. PATOGENICIDADE DE BEAUVERIA BASSIANA (BALS.) VUILL. AO ÁCARO Tetranychus urticae KOCH

    OpenAIRE

    Tamai Marco Antonio; Alves Sérgio Batista; Neves Pedro Janeiro

    1999-01-01

    O estudo da patogenicidade de Beauveria bassiana (Bals.) Vuill. ao ácaro Tetranychus urticae Koch foi desenvolvido a 25 ± 2°C, 70 ± 5% UR e 12 horas de fotofase, utilizando-se fêmeas recém-emergidas. Os ácaros foram mantidos durante seis dias em discos de folha de Canavalia ensiformis (L.) DC. inoculadas com B. bassiana, isolado 447, nas concentrações: 5x106, 1x107, 5x107, 1x108, 5x108 e 1x109 conídios/ml. Este isolado mostrou-se patogênico a T. urticae, apresentando aumento nos valores das m...

  5. THE EFFECT OF SELECTED PESTICIDES ON THE GROWTH OF ENTOMOPATHOGENIC FUNGI HIRSUTELLA NODULOSA AND BEAUVERIA BASSIANA

    Directory of Open Access Journals (Sweden)

    Cezary Tkaczuk

    2015-06-01

    Full Text Available The effect of three pesticides used in corn protection: Targa Super 05 (chizalofop-P-ethyl, Roundup 360SL (glyphosate and Karate Zeon 050CS (lambda-cyhalothrin, on the growth of entomopathogenic fungi Hirsutella nodulosa Petch and Beauveria bassiana (Bals. Vuill. was evaluated under laboratory conditions. Fungi isolates were cultured on Sabouraud’s medium with addition of pesticides at three different concentrations. H. nodulosa was more susceptible to pesticides than B. bassiana. The most inhibitory effect on tested entomopathogenic fungi showed chizalofop-P-ethyl herbicide. Lambda-cyhalothrin at the recommended field dose showed minor toxic effect on entomopathogenic fungi, which suggests the possibility of compatible use of this insecticide with biopesticides based on the tested species.

  6. Effect of Leaf Litters and Soils on Viability of Entomopathogenic Fungi Beauveria bassiana (Bals. Vuill

    Directory of Open Access Journals (Sweden)

    LISDAR IDWAN SUDIRMAN

    2008-09-01

    Full Text Available Viability of Beauveria bassiana is extremely low due to toxic compounds in soils. This research was aimed to study the effect of four groups of media on viability of B. bassiana Bb-Pb2. The first group was leaf litters of onion, flowering white cabbage, cabbage, and chinese mustard, respectively; the second group was the soils containing decomposed residues of each plant of the first group; the third group was the mixtures of each media of both groups above (1:1, and the fourth group was natural top soil as a control. Each plastic bag filled with one kg of each medium was inoculated with ten ml of B. bassiana conidia (106/ml of concentration and incubated in open area for 8 weeks. The results showed that all leaf litters of those plants and their compost soils affected the fungal viability. The highest decreasing number of colony was found on onion’s leaf litters, soil containing of decomposed onion, and the mixtures of both media. The treated B. bassiana showed significant reducing abilities of growth, conidia production and conidia germination on PDA media, except the one of control. It is suggested that the Bb-Pb2 isolate might not be effective as bioinsecticide in the soils containing either those leaf litters or composts.

  7. Efficacy of Molasses and Beauveria bassiana (Balsamo Vuill on the Control of Cosmopolites sorditus Germar, 1824

    Directory of Open Access Journals (Sweden)

    Flávia Queiroz de Oliveira

    2010-06-01

    Full Text Available This research sought to study the compatibility between the molasses and the entomopathogenic fungi Beauveria bassiana (Balsamo Vuill on the control of Cosmopolites sorditus Germar, 1824. The study was conducted on the Site Pitiá in a banana plantation of approximately 250 m2, located in the municipality of Areia, state of Paraiba, Brazil. The results showed that the constancy of C. sorditus was significantly higher in traps consisting of molasses+fungi (P <0.01. And significantly lower in traps without yeast and molasses. The frequency of C. sorditus was classified as accidental in traps with only B. bassiana (23.44% and in traps without the addition of B. bassiana and molasses (10.71%, and being accessory in traps consisting of molasses (28.43% and in traps with molasses+fungi (37.27%. Therefore the food bait molasses along with the fungi B. bassiana, may be used in an integrated control of C. sorditus in banana plantations.

  8. Development of Metarhizium anisopliae and Beauveria bassiana formulations for control of malaria mosquito larvae

    Directory of Open Access Journals (Sweden)

    Takken Willem

    2011-02-01

    Full Text Available Abstract Background The entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana have demonstrated effectiveness against anopheline larvae in the laboratory. However, utilising these fungi for the control of anopheline larvae under field conditions, relies on development of effective means of application as well as reducing their sensitivity to UV radiation, high temperatures and the inevitable contact with water. This study was conducted to develop formulations that facilitate the application of Metarhizium anisopliae and Beauveria bassiana spores for the control of anopheline larvae, and also improve their persistence under field conditions. Methods Laboratory bioassays were conducted to test the ability of aqueous (0.1% Tween 80, dry (organic and inorganic and oil (mineral and synthetic formulations to facilitate the spread of fungal spores over the water surface and improve the efficacy of formulated spores against anopheline larvae as well as improve spore survival after application. Field bioassays were then carried out to test the efficacy of the most promising formulation under field conditions in western Kenya. Results When formulated in a synthetic oil (ShellSol T, fungal spores of both Metarhizium anisopliae and Beauveria bassiana were easy to mix and apply to the water surface. This formulation was more effective against anopheline larvae than 0.1% Tween 80, dry powders or mineral oil formulations. ShellSol T also improved the persistence of fungal spores after application to the water. Under field conditions in Kenya, the percentage pupation of An. gambiae was significantly reduced by 39 - 50% by the ShellSol T-formulated Metarhizium anisopliae and Beauveria bassiana spores as compared to the effects of the application of unformulated spores. Conclusions ShellSol T is an effective carrier for fungal spores when targeting anopheline larvae under both laboratory and field conditions. Entomopathogenic fungi formulated with

  9. Field evaluation of the efficacy of neem oil (Azadirachta indica A. Juss) and Beauveria bassiana (Bals.) Vuill. in cotton production

    NARCIS (Netherlands)

    Togbe, C.E.; Haagsma, R.; Zannou, E.; Gbehounou, G.; Déguénon, J.M.; Vodouhe, S.; Kossou, D.; Huis, van A.

    2015-01-01

    Neem oil (Azadirachta indica A. Juss) alone and combined with the entomopathogenic fungus Beauveria bassiana (Balsamo) Vuillemin (isolate Bb11) was applied to control cotton pests. The efficacy of these treatments was compared with that of synthetic insecticides applied either in a calendar-based ap

  10. Cellular Immune Reactions of the Sunn Pest, Eurygaster integriceps, to the Entomopathogenic Fungus, Beauveria bassiana and Its Secondary Metabolites

    OpenAIRE

    Zibaee, Arash; Bandani, Ali Reza; Talaei-Hassanlouei, Reza; Malagoli, Davide

    2011-01-01

    In this study, five morphological types of circulating hemocytes were recognized in the hemolymph of the adult sunn pest, Eurygaster integriceps Puton (Hemiptera: Scutelleridae), namely prohemocytes, plasmatocytes, granulocytes, adipohemocytes, and oenocytoids. The effects of the secondary metabolites of the entomopathogenic fungus Beauveria bassiana on cellular immune defenses of Eurygaster integriceps were investigated. The results showed that the fungal secondary metabolites inhibited phag...

  11. Host range findings on Beauveria bassiana and Metarhizium anisopliae (Ascomycota: Hypocreales in Argentina Espectro de hospedadores hallado en Beauveria bassiana y Metarhizium anisopliae (Ascomycota: Hypocreales en Argentina

    Directory of Open Access Journals (Sweden)

    A. V. Toledo

    2008-12-01

    Full Text Available The natural insect host range of the entomopathogenic fungi (EPF Beauveria bassiana (Bb and Metarhizium anisopliae (Ma was investigated in Argentina during the winter of 2003 through spring of 2004. Fungi- infected insect samples (153 were collected from cornfields and the surrounding uncultivated areas in different localities of Buenos Aires (7, Tucumán (2, and Corrientes (3 provinces. The rates of Bb-infected host range varied among the Coleoptera (37%, Hemiptera (27% and Dermaptera (1.3%. While the rates of Ma-infected host range varied between the Coleoptera (0.7% and Hemiptera (34%. The greater host range resulted with B. bassiana found from eight species of Coleoptera (four families, one species of Dermaptera and four species of Hemiptera (three families, than the host range of M. anisopliae found infecting one species of Coleoptera and three species of Hemiptera (two families. We obtained 75 pure fungal isolates (48 Bb-isolates and 27 to Ma-isolates, and 56 of them (33 Bb-isolates and 23 Ma-isolates were morphologically characterized.El espectro natural de hospedadores de los hongos entomopatógenos (HEP Beauveria bassiana (Bb y Metarhizium anisopliae (Ma fue investigado en Argentina desde el invierno de 2003 hasta la primavera de 2004. Las muestras de insectos con infecciones fúngicas (153 fueron recolectadas a partir de campos de maíz y las áreas no cultivadas circundantes a los mismos, en diferentes localidades de las provincias de Buenos Aires (7, Tucumán (2 y Corrientes (3. El espectro de hospedadores infectados con Bb varió entre los Coleoptera (37%, Hemiptera (27% y Dermaptera (1,3%. Mientras que el espectro de hospedadores infectados con Ma varió entre los Coleoptera (0,7% y los Hemiptera (34%. El mayor espectro lo presentó Bb, encontrado en ocho especies de Coleoptera (cuatro familias, una especie de Dermaptera y cuatro especies de Hemiptera (tres familias, mientras que Ma fue encontrado infectando una especie de

  12. Compatibility of Beauveria bassiana with Neoseiulus barkeri for Control of Frankliniella occidentalis

    Institute of Scientific and Technical Information of China (English)

    WU Sheng-yong; GAO Yu-lin; XU Xue-nong; Mark S Goettel; LEI Zhong-ren

    2015-01-01

    The entomopathogenic fungusBeauveriabassiana (Balsamo) Vuilemin and predatory miteNeoseiulusbarkeri Hughes are effective biological control agents ofFranklinielaoccidentalis Pergande (Thysanoptera: Thripidae), one of the most important pests of ornamentals and vegetables world-wide. Combined application of both may enhance control efifciency. The functional response forN.barkeri on the ifrst instar larvae of western lfower thrips which were infected byB.bassiana for 12 and 24 h in the laboratory ((25±1)°C, (70±5)% RH, L:D=16 h:8 h) was determined. The virulence ofB.bassiana against the second instar and pupae of the thrips attacked byN.barkeri were also tested. The results showed that N.barkeri exhibited a Holing type II functional response on treated thrips. After having been treated with the fungus for 12 h and then offered to the predator, thrips were more vulnerable to be kiled byN.barkeri. The second instar larvae and pupae of the thrips which had been attacked by predatory mites were markedly more susceptible toB.bassiana infection than normal thrips; the cumulative corrected mortality ofB.bassiana of the second instar and pupae which were attacked byN.barkeri were 57 and 94%, respectively, compared to 35 and 80% in controls on the day 8. These ifndings highlight the potential use ofB.bassiana in combination withN.barkeri to controlF. occidentalis.

  13. Susceptibility of Tetranychus urticae Koch. (Acari: Tetranychidae to Isolates of Entomopathogenic Fungus Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Slavimira A. Draganova

    2010-01-01

    Full Text Available Bioassays with five isolates of the entomopathogenic fungus Beauveria bassiana (Bals.- Criv. Vuillemin were conducted under laboratory conditions with a goal to estimate their virulence to the two-spotted spider mite Tetranychus urticae Koch. (Acari: Tetranychidae. Common bean plants with mites were treated by spraying conidial suspensions of isolates at concentrations of 106, 107 and 108 conidia/ml. Lethal effects of the fungal isolates wereevaluated as percentages of cumulative daily mortality due to mycoses, corrected for mortality in the control variant. Virulence of the isolates was estimated based on values of the median lethal time (LT50 calculated by probit analysis for the variants treated with conidial suspensions at the concentration of 106 conidia/ml.The two-spotted spider mite was found susceptible to the examined isolates of the entomopathogenic fungus B. bassiana. Mycosis caused to T. urticae by the B. bassiana isolates 444 Bb and 445 Bb had fast lethal effect after treatment with conidial suspensions even at the concentration of 106 conidia/ml. The mean mortality values of host individuals were 83.78 ± 3.62% and 68.49 ± 4.28% on the first day, respectively, and up to 100% in both variants on the fourth day.The isolates 426 Bb, 444 Bb and 445 Bb of B. bassiana were highly virulent to two-spotted spider mites with values of the median lethal time varied within overlapped narrow confidence intervals from 0.122 to 1.084 days (average value 0.162 days, from 0.117 to 1.398 days (average value 0.146 days and from 0.106 to 1.162 days (average value 0.131 days,respectively. Significant differences regarding virulence of the three isolates at p-level < 0.05 could not been proved. The other two examined isolates were distinctly less virulent to T. urticae than these three B. bassiana isolates.

  14. Evaluation of Beauveria bassiana (Hyphomycetes) isolates as potential agents for control of Dendroctonus valens

    Institute of Scientific and Technical Information of China (English)

    Long-Wa Zhang; Yu-Jun Liu; Jian Yao; Bin Wang; Bo Huang; Zeng-Zhi Li; Mei-Zhen Fan; Jiang-Hua Sun

    2011-01-01

    The red turpentine beetle (RTB), Dendroctonus valens LeConte, as a destructive invasive pest, has become one of the most economically important forest pest in China. Effective control measures are desperately needed. Entomopathogenic fungi, such as Beauveria bassiana, have shown great potential for the management of some bark beetle species. In this study, 12 isolates of B. bassiana from bark beetle were examined for biological characteristics and virulence, to assess their potential as biocontrol agents for RTB. There were significant differences (at P = 0.05) in colony growth rate, conidial yield, conidial germination, tolerance to UV light and extracellular proteases activity among the tested B. bassiana isolates. Isolates, including Bbl801, Bbl906, Bb789 and Bb773, exhibited the best characteristics, because they have faster hyphal growth rate, higher spore production and faster spore germination, higher UV tolerance and protease (Prl) production. The results of a pathogenicity test of B. bassiana on RTB larvae showed that most isolates of B. bassiana have demonstrated high efficacy and the highest virulent isolate was Bbl801, which killed 100% of the treated insects and had a median lethal time (LT50) of 4.60 days at a concentration of 1× 107 conidia/mL. Therefore, isolate Bb 1801 has a great potential for sustainable control of RTB in the forest. The correlation between biological characteristics and virulence of the fungal isolates is discussed and the possibility of combination of entomopathogenic fungi with semiochemicals, as one of the promising strategy for RTB control, is considered.

  15. Sensitivity of Beauveria bassiana conidia to abiotic factors after successive in vitro subcultures

    Directory of Open Access Journals (Sweden)

    Janaina Zorzetti

    2014-09-01

    Full Text Available The aim of this study was to evaluate the effect of in vitro successive subcultures of Beauveria bassiana isolates in different nutritional conditions on conidia heat and UV radiation tolerance and on sensitivity to azoxystrobin fungicide. The fungus was initially inoculated in Alphitobius diaperinus (Coleoptera: Tenebrionidae adults and after its development, the conidia were cultivated in PDA (potato dextrose agar and MPE (medium to produce Beauveria spp. conidia originating the first subculture 1st (A conidia, which were successively multiplied in their media until the 20th cultivation. Conidia taken from the 20th subculture were again inoculated in the insect and after sporulation they were once more multiplied in the media, producing the 1st (B conidia. For the tests, 1st (A, 10th, 20th and 1st (B conidia from the CG 152 and Unioeste 40 isolates were used. Successive subcultures and the medium nutritional conditions interfered on the fungus physiology, and the isolates showed different behaviors. The subcultures on PDA showed higher thermotolerance to Unioeste 40 in all subcultures and to CG 152 just after inoculation in the host. B. bassiana was susceptible to UV radiation, and this characteristic was influenced by the subcultures in different media. Both isolates were more tolerant to UV radiation when subcultivated on MPE, while just for the 40 Unioeste this tolerance increased after host inoculation. The B. bassiana sensitivity to azoxystrobin fungicide was affected after successive subcultures in both medium. Conidia originated in MPE were more resistant to fungicide and the host inoculation increased this tolerance. These results show that it is possible to enhance the fungi efficiency to control pests, through the selection of a virulent isolate, and handling their nutritional conditions during cultivation and host inoculation.

  16. Selectivity of Beauveria bassiana and Metarrhizium anisopliae to Trichogramma pretiosum Riley (Hymenoptera: Trichogrammatidae)

    International Nuclear Information System (INIS)

    Trichogramma pretiosum Riley and the entomopathogenic fungi Beauveria bassiana and Metarhizium anisopliae are efficient biological control agents and are thought to be used jointly. In here, we investigated if these entomopathogens could have any side-effects on T. pretiosum. Therefore, 1 x 8 cards containing sterilized eggs of Anagasta kuehniella (Zeller) that were sprayed with 0.2 ml of B. bassiana or M. anisopliae (1.0 X 109 conidia/ml) were offered to a T. pretiosum female for 24h (30 cards/fungus = 30 replicates). Afterwards, females were isolated in glass tubes. The control group was sprayed with sterile distillated water + Tween 80 (0.01%). In addition, 60 cards with sterilized eggs of A. kuehniella were submitted to parasitism by females of T. pretiosum for 24h. Of these cards, 30 were sprayed with B. bassiana or M. anisopliae and 30 with distillated water + Tween 80 (0.01%), and observed daily until parasitoid emergence. Metarhizium anisopliae decreased parasitoid emergence and caused confirmed mortality. Therefore, field and semi-field experiments should be conducted for a final assessment of the side-effects of these entomopathogens on Trichogramma as a ways to develop a control strategy in which both can be used. (author)

  17. Protection of metal artefacts with the formation of metal-oxalates complexes by Beauveria bassiana.

    Directory of Open Access Journals (Sweden)

    Edith eJoseph

    2012-01-01

    Full Text Available Several fungi present high tolerance to toxic metals and some are able to transform metals into metal-oxalate complexes. In this study, the ability of Beauveria bassiana to produce copper oxalates was evaluated in vitro. Growth performance was tested on various copper-containing media. B. bassiana proved highly resistant to copper, tolerating concentrations of up to 20 g.L-1, and precipitating copper oxalates on all media tested. Chromatographic analyses showed that this species produced oxalic acid as sole metal chelator. The production of metal-oxalates can be used in the restoration and conservation of archaeological and modern metal artefacts. The production of copper-oxalates was confirmed directly using metallic pieces (both archaeological and modern. The conversion of corrosion products into copper oxalates was demonstrated as well. In order to assess whether the capability of B. bassiana to produce metal-oxalates could be applied to other metals, iron and silver were tested as well. Iron appears to be directly sequestered in the wall of the fungal hyphae forming oxalates and probably goethite. However, the formation of a homogeneous layer on the object is not yet optimal. Silver nitrate was extracellularly reduced into nanoparticles of elemental silver by an unknown mechanism. The production of copper oxalates is immediately applicable for the conservation of copper-based artefacts. For iron and silver this is not yet the case. However, the vast ability of B. bassiana to transform toxic metals using different immobilization mechanisms seems to offer considerable possibilities for industrial applications, such as the bioremediation of contaminated soils or the green synthesis of chemicals.

  18. Relationship between Biological Characteristics of Beauveria bassiana (Bals.) Vuill and Pathogenicity to Bombyx mori L.%Relationship between Biological Characteristics of Beauveria bassiana (Bals.) Vuill and Pathogenicity to Bombyx mori L.

    Institute of Scientific and Technical Information of China (English)

    Haiyu LUO; Yecheng DENG; Yongmei LIAO; Ruiyu LI

    2012-01-01

    [Objective] This study was to investigate the relationship between biological characteristics of Beauveria bassiana (Bals.) Vuill and pathogenicity to Bombyx rnori L, with the aim to provide scientific basis for the control of white muscardine in Bombyx mori L. [Method] The strains isolated and purified from the 6 Beauveria bassiana biocontrol agents from all over the country and the 3 white muscardine silkworms collected from Guangxi provincial silkworm rearing areas were identified by the morphological observation and molecular biology technology. The pathogenicity of B. bassaina to silkworms was determined, and the biological characteristics such as growth diameter, sporulation and the extracellular protease activity of the different B. bassiana strains were compared. [Result] The isolated 9 strains were all B. bassaina (Bals.) Vuillemin, and all strains had high pathogenicity to silkworm, but with different pathogenicities. The growth diameter, sporulation and extracellular protease activity of different B. bassiana strains were also different, and showed correlation with the patheogenicity to silkworms. [Conclusion] B. bassiana spores production amount and exocellular protease activity had significant positive correlation with their pathogenicity to silkworm.

  19. Field evaluation of the synergistic effects of neem oil with Beauveria bassiana (Hypocreales: Clavicipitaceae) and Bacillus thuringiensis var. kurstaki (Bacillales: Bacillaceae)

    NARCIS (Netherlands)

    Togbe, C.E.; Zannou, E.; Gbehounou, G.; Kossou, D.; Huis, van A.

    2014-01-01

    In the present study, the synergistic effects of Beauveria bassiana (Bals.-Criv. Vuill.) (isolate Bb11) and Bacillus thuringiensis var. kurstaki (Berliner) with neem oil were evaluated in three agroecological zones in Be´nin. Four bioinsecticide treatments (neem oil, neem oil and B. bassiana used se

  20. Evaluation of the efficacy of beauveria bassiana for the control of the invasive fruit fly bactrocera invadens (Diptera: Tephritidae)

    International Nuclear Information System (INIS)

    Mango production plays an important role in Africa’s economy. However, the African invader fly, Bactrocera invadens is causing high yield losses as an important quarantine pest. Suppression of fruit flies for increased mango production will increasingly rely on management methods which exert low negative environmental impact. Beauveria bassiana is an insect pathogenic fungus used as microbial insecticide because it leaves produce to their fresh state, flavor, colour and texture with no change in the chemical composition of the product and is environmentally friendly. Evaluation of the efficacy of Beauveria bassiana for the control of the invasive Fruit Fly, Bactrocera invadens (Diptera: Tephriitidae) was carried out. The fungus B. bassiana (Botanigard® ES) containing 11.3% Beauveria bassiana GHA strain was applied at concentrations of 106, 53.0, 26.5, 13.3 and 6.65(x 106 spores/ml). When three developmental stages of the fruit fly (larvae, puparia and adults) were treated with Beauveria bassiana, the severity of the damage caused by the fungus increased with increasing fungal concentration. The results show lethal time (LT50) that ranged from 2.8 to 3.6 days for a dose of 106 x 106 spores/ml. Comparing methods of fungal application in the field, the result indicated that applying the fungus in fruit fly traps in mango canopies is the better method for fruit flies control in the field as compared to the soil surface spray method. However, both methods could be employed for better results The study of gamma radiation on the virulence of the fungus showed that the combined effect of the fungus and gamma irradiation gave better result by increasing adult mortality to 100 % within three days at 106 x106 spores/ml irradiated at 150 Gy than applying fungal treatment only. (author)

  1. Susceptibility of Agrilus planipennis (Coleoptera: Buprestidae) to Beauveria bassiana and Metarhizium anisopliae.

    Science.gov (United States)

    Liu, Houping; Bauer, Leah S

    2006-08-01

    The susceptibility of Agrilus planipennis Fairmaire (Coleoptera: Buprestidae) to selected strains of the entomopathogenic fungi Beauveria bassiana (Balsamo) Vuillemin and Metarhizium anisopliae (Metschnikoff) Sorokin was evaluated through bioassays with direct immersion or foliar exposure under laboratory conditions. Results showed that A. planipennis adults were susceptible to B. bassiana and M. anisoplae. Significant time-mortality response was found for each isolates. Isolate B. bassiana GHA killed A. planipennis adults at a faster rate compared with other isolates tested, with the lowest average time-to-death values. The LC50 values estimated under direct immersion method ranged from 1.7 x 10(5) to 1.9 x 10(7), 3.5 x 10(4) to 5.3 x 10(5), and 4.1 x 10(3) to 2.9 x 10(5) conidia/ml for B. basissiana and from 3.2 x 10(6) to 1.1 x 10(7), 4.5 x 10(3) to 4.5 x 10(5), and 1.4 x 10(2) to 1.2 x 10(5) conidia/ml for M. anisopliae at 4, 5, and 6 d after treatment, respectively. By days 5 and 6, B. bassiana GHA outperformed all other isolates tested except ARSEF 7234, followed by ARSEF 7152, 6393, and 7180. Significant concentration-mortality response was also observed for two B. bassiana GHA formulations, BotaniGard ES and Mycotrol O, and M. anisopliae F52 when insects were treated through foliar exposure. The LC50 values ranged from 114.5 to 309.6, 18.4 to 797.3, and 345.3 to 362.0 conidia/cm2 for BotaniGard, Mycotrol, and M. anisopliae F52, respectively. Based on the results of these bioassays, the efficacy of both B. bassiana GHA formulations and M. anisopliae F52 were similar against adult A. planipennis. The potential use of entomopathogenic fungi for management of A. planipennis in North America is discussed. PMID:16937660

  2. Effect of moisture content and inoculum on the growth and conidia production by Beauveria bassiana on wheat bran

    OpenAIRE

    Oscar Nuñez-Gaona; Gerardo Saucedo-Castañeda; Raquel Alatorre-Rosas; Octavio Loera

    2010-01-01

    The aim of the present work was to study the effect of moisture content and inoculum on the growth and conidia production by Beauveria bassiana on wheat bran (WB).The highest growth rate of B. bassiana 885.2 on WB media was obtained at a w=1.0, with no detected growth at a w < 0.97. Solid-state fermentation (SSF) using WB (66% moisture; a w=1.0) achieved a maximal yield of 1.18x10 10 conidia per gram of dry substrate (gds). This yield decreased one order of magnitude with higher moisture cont...

  3. Optimization of Solid-State Fermentation for Improved Conidia Production of Beauveria bassiana as a Mycoinsecticide.

    Science.gov (United States)

    Pham, Tuan Anh; Kim, Jeong Jun; Kim, Keun

    2010-06-01

    The production of conidia of entomopathogenic Beauveria bassiana by solid-state fermentation was studied for the development of a biocontrol agent against aphid Myzus persicae. The optimal conditions for conidia production on polished white rice were 40% moisture content, 25℃ culture temperature, 2-day-old seeding culture grown in 3% corn meal, 2% rice bran, 2% corn steep powder medium, initial conidia concentration of 10(7) conidia/g in the wet rice, 10% inoculum size, and use of a polyethylene bag as a container. The polyethylene bag containing inoculated rice was hand-shaken every 12 hr during fermentation. Using optimal conditions, the maximum conidia production obtained was 4.05 g conidia/100 g dry rice after 14 days of cultivation, a rate 2.83 times higher than conidia yield of pre-optimization. PMID:23956642

  4. Biological Control of Aphid Using Fungal Culture and Culture Filtrates of Beauveria bassiana.

    Science.gov (United States)

    Kim, Jeong Jun; Jeong, Gayoung; Han, Ji Hee; Lee, Sangyeob

    2013-12-01

    Aphids are one of the most destructive pests in crop production such as pepper, cucumber, and eggplants. The importance of entomopathogenic fungi as alternative pest control agents is increasing. Conidia of entomopathogenic fungi are influenced by environmental conditions, such as temperature and relative humidity, and cause slow and fluctuating mortality. These factors have prevented wider application and use of biocontrol agents. For investigation of means of mitigation of such problems, we conducted bioassays with 47 fungal culture filtrates in order to evaluate the potential of secondary metabolites produced by entomopathogenic fungi for use in aphid control. Among 47 culture filtrates cultured potato dextrose broth, filtrate of Beauveria bassiana Bb08 showed the highest mortality (78%) against green peach aphid three days after treatments. Filtrate of Bb08 cultured in Adamek's medium showed higher toxicity as 100% to third instar nymphs of the aphid compared with seven other filtrates cultured in different broths amended with colloidal chitin or oil. The culture filtrates and fungal cultures from media amended with colloidal chitin or oil had lower control efficacies than filtrates without these additives in three different media. These results indicate that the fungal culture fluid or culture filtrate of B. bassiana Bb08 cultured in Adamek's medium has potential for development as a mycopesticide for aphid control. PMID:24493943

  5. Sterile Males of Ceratitis Capitata (Diptera: Tephritidae) as Disseminators of Beauveria Bassiana Conidia for IPM Strategies

    International Nuclear Information System (INIS)

    Full text: Sterile Mediterranean fruit fly, Ceratitis capitata (Wied.), males were evaluated as vectors to spread Beauveria bassiana (Bals) conidia to wild C. capitata populations under field conditions. The inoculated sterile males were released by air, using the chilled adult technique over 7000 ha of coffee growing in Chimaltenango, Guatemala, Central America. The impact of releases was determined using dry traps baited with a food attractant. The effects of these releases on Apis mellifera, Linnaeus (honey bee), Hypothenemus hampei, Ferrari (coffee berry borer) and the parasitic mite Varroa destructor (Oudeman) were also evaluated. Inoculated sterile males were able to transmit fungal spores to 44% of the wild C. capitata flies captured in traps, which likely were infected through intra- and intersexual interactions during leks, mating or mating attempts. There was no transmission of the fungal spores to non- target insect species such as coffee berry borer, honey bees or varroa. We conclude that sterile males of Mediterranean fruit fly inoculated with B. bassiana can act as effective vectors of conidia to wild populations, constituting a safe, environmentally friendly and selective alternative for suppressing the medfly under a Sterile Insect Technique-based IPM approach. (author)

  6. Beauveria bassiana Lipase A expressed in Komagataella (Pichia pastoris with potential for biodiesel catalysis

    Directory of Open Access Journals (Sweden)

    Ana Claudia Vici

    2015-10-01

    Full Text Available Lipases (EC 3.1.1.3 comprise a biotechnologically important group of enzymes because they are able to catalyze both hydrolysis and synthesis reactions, depending on the amount of water in the system. One of the most interesting application of lipase is in the biofuel industry for biodiesel production by oil and ethanol (or methanol transesterification. Entomopathogenic fungi, which are potential source of lipases, are still poorly explored in biotechnological processes. The present work reports the heterologous expression and biochemical characterization of a novel Beauveria bassiana lipase with potential for biodiesel production. The His-tagged B. bassiana lipase A (BbLA was produced in Komagataella pastoris in Buffered Methanol Medium (BMM induced with 1% methanol at 30 °C. Purified BbLA was activated with 0.05% Triton X-100 and presented optimum activity at pH 6.0 and 50°C. N-glycosylation of the recombinant BbLA accounts for 31.5% of its molecular weight. Circular dichroism and molecular modeling confirmed a structure composed of α-helix and β-sheet, similar to α/β hydrolases. Immobilized BbLA was able to promote transesterification reactions in fish oil, demonstrating potential for biodiesel production. BbLA was successfully produced in Komagataella pastoris and shows potential use for biodiesel production by the ethanolysis reaction.

  7. Beauveria bassiana Lipase A expressed in Komagataella (Pichia) pastoris with potential for biodiesel catalysis

    Science.gov (United States)

    Vici, Ana C.; da Cruz, Andrezza F.; Facchini, Fernanda D. A.; de Carvalho, Caio C.; Pereira, Marita G.; Fonseca-Maldonado, Raquel; Ward, Richard J.; Pessela, Benevides C.; Fernandez-Lorente, Gloria; Torres, Fernando A. G.; Jorge, João A.; Polizeli, Maria L. T. M.

    2015-01-01

    Lipases (EC 3.1.1.3) comprise a biotechnologically important group of enzymes because they are able to catalyze both hydrolysis and synthesis reactions, depending on the amount of water in the system. One of the most interesting applications of lipase is in the biofuel industry for biodiesel production by oil and ethanol (or methanol) transesterification. Entomopathogenic fungi, which are potential source of lipases, are still poorly explored in biotechnological processes. The present work reports the heterologous expression and biochemical characterization of a novel Beauveria bassiana lipase with potential for biodiesel production. The His-tagged B. bassiana lipase A (BbLA) was produced in Komagataella pastoris in buffered methanol medium (BMM) induced with 1% methanol at 30°C. Purified BbLA was activated with 0.05% Triton X-100 and presented optimum activity at pH 6.0 and 50°C. N-glycosylation of the recombinant BbLA accounts for 31.5% of its molecular weight. Circular dichroism and molecular modeling confirmed a structure composed of α-helix and β-sheet, similar to α/β hydrolases. Immobilized BbLA was able to promote transesterification reactions in fish oil, demonstrating potential for biodiesel production. BbLA was successfully produced in K. pastoris and shows potential use for biodiesel production by the ethanolysis reaction. PMID:26500628

  8. Proteins in the Cocoon of Silkworm Inhibit the Growth of Beauveria bassiana.

    Science.gov (United States)

    Guo, Xiaomeng; Dong, Zhaoming; Zhang, Yan; Li, Youshan; Liu, Huawei; Xia, Qingyou; Zhao, Ping

    2016-01-01

    Silk cocoons are composed of fiber proteins (fibroins) and adhesive glue proteins (sericins), which provide a physical barrier to protect the inside pupa. Moreover, other proteins were identified in the cocoon silk, many of which are immune related proteins. In this study, we extracted proteins from the silkworm cocoon by Tris-HCl buffer (pH7.5), and found that they had a strong inhibitory activity against fungal proteases and they had higher abundance in the outer cocoon layers than in the inner cocoon layers. Moreover, we found that extracted cocoon proteins can inhibit the germination of Beauveria bassiana spores. Consistent with the distribution of protease inhibitors, we found that proteins from the outer cocoon layers showed better inhibitory effects against B. bassiana spores than proteins from the inner layers. Liquid chromatography-tandem mass spectrometry was used to reveal the extracted components in the scaffold silk, the outermost cocoon layer. A total of 129 proteins were identified, 30 of which were annotated as protease inhibitors. Protease inhibitors accounted for 89.1% in abundance among extracted proteins. These protease inhibitors have many intramolecular disulfide bonds to maintain their stable structure, and remained active after being boiled. This study added a new understanding to the antimicrobial function of the cocoon. PMID:27032085

  9. Effect of biofertilizers and neem oil on the entomopathogenic fungi beauveria bassiana (Bals.) vuill. and metarhizium anisopliae (Metsch.) sorok.

    OpenAIRE

    Hirose Edson; Neves Pedro M. O. J.; Zequi João A. C.; Martins Luís H.; Peralta Cristiane H.; Moino Jr. Alcides

    2001-01-01

    The in vitro fungitoxic effect of three biofertilizers, E.M.-4, Multibion Ô and Supermagro used in organic agriculture and the neem oil (Azadirachta indica A. Juss) on the entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana was studied. These products were mixed in a medium where the two fungi were inoculated, and germination, vegetative growth and conidiogenesis were assessed. The biofertilizers Supermagro and E.M.- 4 showed to be less toxic for the two fungi whereas Multibi...

  10. Diversity of Fungi Associated with Atta bisphaerica (Hymenoptera: Formicidae): The Activity of Aspergillus ochraceus and Beauveria bassiana

    OpenAIRE

    Ribeiro, Myriam M. R.; Karina D. Amaral; Vanessa E. Seide; Souza, Bressane M. R.; Della Lucia, Terezinha M. C.; Maria Catarina M. Kasuya; Danival J. de Souza

    2012-01-01

    The grass-cutting ant Atta bisphaerica is one of the most serious pests in several pastures and crops in Brazil. Fungal diseases are a constant threat to these large societies composed of millions of closely related individuals. We investigated the occurrence of filamentous fungi associated with the ant A. bisphaerica in a pasture area of Viçosa, Minas Gerais State, Brazil. Several fungi species were isolated from forager ants, and two of them, known as entomopathogenic, Beauveria bassiana an...

  11. Screening of liquid media and fermentation of an endophytic Beauveria bassiana strain in a bioreactor.

    Science.gov (United States)

    Lohse, Rieke; Jakobs-Schönwandt, Desiree; Patel, Anant V

    2014-01-01

    A novel approach for biological control of insect pests could be the use of the endophytic entomopathogenic Beauveria bassiana isolate ATP-02. For the utilization of the endophyte as a commercial biocontrol agent, the fungus has to be mass-produced. B. bassiana was raised in shake flask cultures to produce high concentrations of total spores (TS), which include blastospores (BS) and submerged conidiospores (SCS). The highest concentration of 1.33×10(9) TS/mL and the highest yield of 5.32×10(10) TS/g sucrose was obtained in the TKI broth with 5% sugar beet molasses which consists of 50% sucrose as a carbon source. In spite of the lower sugar concentration (2.5%) the amount of TS could be increased up to 11-times in contrast to the cultivation with 5% sucrose. The scale-up to a 2 L stirred tank reactor was carried out at 25°C, 200-600 rpm and 1 vvm at pH 5.5. A TS yield of 5.2×10(10) TS/g sucrose corresponding to a SCS yield of 0.2×10(10) SCS/g sucrose was obtained after 216 h. With regards to the culture medium the cost of 10(12) TS amounts to 0.24 €. Plutella xylostella larvae, which were fed with oilseed rape leaves treated with spores from fermentation resulted in 77 ± 5% mortality. Moreover, spores from submerged cultivation were able to colonize oilseed rape leaves via leaf application. This is the first report of fermentation of an endophytic B. bassiana strain in a low-cost culture medium to very high yields of TS. PMID:24949278

  12. Genetic analyses place most Spanish isolates of Beauveria bassiana in a molecular group with word-wide distribution

    Directory of Open Access Journals (Sweden)

    Quesada-Moraga Enrique

    2011-04-01

    Full Text Available Abstract Background The entomopathogenic anamorphic fungus Beauveria bassiana is currently used as a biocontrol agent (BCA of insects. Fifty-seven Beauveria bassiana isolates -53 from Spain- were characterized, integrating group I intron insertion patterns at the 3'-end of the nuclear large subunit ribosomal gene (LSU rDNA and elongation factor 1-alpha (EF1-α phylogenetic information, in order to assess the genetic structure and diversity of this Spanish collection of B. bassiana. Results Group I intron genotype analysis was based on the four highly conserved insertion sites of the LSU (Ec2653, Ec2449, Ec2066, Ec1921. Of the 16 possible combinations/genotypes, only four were detected, two of which were predominant, containing 44 and 9 members out of 57 isolates, respectively. Interestingly, the members of the latter two genotypes showed unique differences in their growth temperatures. In follow, EF1-α phylogeny served to classify most of the strains in the B. bassiana s.s. (sensu stricto group and separate them into 5 molecular subgroups, all of which contained a group I intron belonging to the IC1 subtype at the Ec1921 position. A number of parameters such as thermal growth or origin (host, geographic location and climatic conditions were also examined but in general no association could be found. Conclusion Most Spanish B. bassiana isolates (77.2% are grouped into a major phylogenetic subgroup with word-wide distribution. However, high phylogenetic diversity was also detected among Spanish isolates from close geographic zones with low climatic variation. In general, no correlation was observed between the molecular distribution and geographic origin or climatic characteristics where the Spanish B. bassiana isolates were sampled.

  13. Improving Efficacy of Beauveria bassiana against Stored Grain Beetles with a Synergistic Co-Formulant.

    Science.gov (United States)

    Storm, Clare; Scoates, Freya; Nunn, Adam; Potin, Olivier; Dillon, Aoife

    2016-01-01

    The potential of a dry powder co-formulant, kaolin, to improve the control of storage beetles by the entomopathogenic fungus Beauveria bassiana, isolate IMI389521, was investigated. The response of Oryzaephilus surinamensis adults to the fungus when applied to wheat at 1 × 10(10) conidia per kg with and without kaolin at 1.74 g per kg wheat was assessed. Addition of kaolin increased control from 46% to 88% at day 7 and from 81% to 99% at day 14 post-treatment. Following this the dose response of O. surinamensis and Tribolium confusum to both kaolin and the fungus was investigated. Synergistic effects were evident against O. surinamensis at ≥0.96 g of kaolin per kg of wheat when combined with the fungus at all concentrations tested. For T. confusum, adult mortality did not exceed 55%, however, the larvae were extremely susceptible with almost complete suppression of adult emergence at the lowest fungal rate tested even without the addition of kaolin. Finally, the dose response of Sitophilus granarius to the fungus at 15 and 25 °C, with and without kaolin at 1 g per kg of wheat, was examined. Improvements in efficacy were achieved by including kaolin at every fungal rate tested and by increasing the temperature. Kaolin by itself was not effective, only when combined with the fungus was an effect observed, indicating that kaolin was having a synergistic effect on the fungus. PMID:27571107

  14. Susceptibility of the Parasitoid Phymastichus coffea LaSalle (Hymenoptera: Eulophidae) to Beauveria bassiana under laboratory conditions; Susceptibilidad del parasitoide Phymastichus coffea LaSalle (Hymenoptera:Eulophidae) a Beauveria bassiana en condiciones de laboratorio

    Energy Technology Data Exchange (ETDEWEB)

    Castillo, Alfredo; Gomez, Jaime; Infante, Francisco [El Colegio de la Frontera Sur (ECOSUR), Chiapas (Mexico). Dept. de Entomologia Tropical], e-mail: acastill@ecosur.mx, e-mail: jgomez@ecosur.mx, e-mail: finfante@ecosur.mx; Vega, Fernando E. [United States Department of Agriculture (USDA), Beltsville, MD (United States). Agricultural Research Service. Sustainable Perennial Crops Lab.], e-mail: fernando.vega@ars.usda.gov

    2009-09-15

    The coffee berry borer, Hypothenemus hampei (Ferrari) (Coleoptera: Curculionidae), is the most important coffee pest worldwide. Beauveria bassiana is a generalist entomopathogenic fungus widely used by coffee farmers to control this pest and Phymastichus coffea LaSalle (Hymenoptera: Eulophidae) is an African endo parasitoid of H. hampei adults, recently imported to several Latin American and Caribbean countries to aid in the coffee berry borer control. The objective of this study was to determine if B. bassiana is detrimental to P. coffea. The susceptibility of the parasitoid was evaluated in terms of adult survivorship, mean lethal concentration (LC{sub 50}), mean lethal time (LT{sub 50}), reproduction and immature mortality. The main effect of the fungus resulted in reduction of adult longevity and mortality of 100% for immature stages of this parasitoid. The LC{sub 50} for adults was 0.11% equivalent to 9.53 x 10{sup 7} conidia/ml of B. bassiana and a LT{sub 50} of 29.4 h, equivalent to reduction of 22% of its normal longevity as an adult. P. coffea was capable of disseminating spores of B. bassiana to non-infected H. hampei adults, which could indirectly cause the death of its own progeny. These results could be valuable when considering the use of both organisms in the field, especially in an integrated pest management program. (author)

  15. Effect of Biofertilizers and Neem Oil on the Entomopathogenic Fungi Beauveria bassiana (Bals. Vuill. and Metarhizium anisopliae (Metsch. Sorok

    Directory of Open Access Journals (Sweden)

    Hirose Edson

    2001-01-01

    Full Text Available The in vitro fungitoxic effect of three biofertilizers, E.M.-4, Multibion Ô and Supermagro used in organic agriculture and the neem oil (Azadirachta indica A. Juss on the entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana was studied. These products were mixed in a medium where the two fungi were inoculated, and germination, vegetative growth and conidiogenesis were assessed. The biofertilizers Supermagro and E.M.- 4 showed to be less toxic for the two fungi whereas MultibionÔ caused major inhibition on M. anisopliae, with reductions in germination (-37.74%, colony diameter (-30.26% and conidiogenesis (-42.62%. Neem oil promoted a larger negative effect on B. bassiana, inhibiting germination (-45.27%, colony diameter (-36.62% and conidiogenesis (-84.93%.

  16. Susceptibility of the Parasitoid Phymastichus coffea LaSalle (Hymenoptera: Eulophidae) to Beauveria bassiana under laboratory conditions

    International Nuclear Information System (INIS)

    The coffee berry borer, Hypothenemus hampei (Ferrari) (Coleoptera: Curculionidae), is the most important coffee pest worldwide. Beauveria bassiana is a generalist entomopathogenic fungus widely used by coffee farmers to control this pest and Phymastichus coffea LaSalle (Hymenoptera: Eulophidae) is an African endo parasitoid of H. hampei adults, recently imported to several Latin American and Caribbean countries to aid in the coffee berry borer control. The objective of this study was to determine if B. bassiana is detrimental to P. coffea. The susceptibility of the parasitoid was evaluated in terms of adult survivorship, mean lethal concentration (LC50), mean lethal time (LT50), reproduction and immature mortality. The main effect of the fungus resulted in reduction of adult longevity and mortality of 100% for immature stages of this parasitoid. The LC50 for adults was 0.11% equivalent to 9.53 x 107 conidia/ml of B. bassiana and a LT50 of 29.4 h, equivalent to reduction of 22% of its normal longevity as an adult. P. coffea was capable of disseminating spores of B. bassiana to non-infected H. hampei adults, which could indirectly cause the death of its own progeny. These results could be valuable when considering the use of both organisms in the field, especially in an integrated pest management program. (author)

  17. Establishment of fungal entomopathogens Beauveria bassiana and Bionectria ochroleuca (Ascomycota: Hypocreales) as endophytes on artichoke Cynara scolymus.

    Science.gov (United States)

    Guesmi-Jouini, J; Garrido-Jurado, I; López-Díaz, C; Ben Halima-Kamel, M; Quesada-Moraga, E

    2014-06-01

    Entomopathogenic fungi (EPF) are commonly found in diverse habitats and are known to cause mycoses in many different taxa of arthropods. Various unexpected roles have been recently reported for fungal entomopathogens, including their presence as fungal endophytes, plant disease antagonists, rhizosphere colonizers and plant growth promoting fungi. In Tunisia, a wide range of indigenous EPF isolates from different species, such as Beauveria bassiana and Bionectria ochroleuca, were found to occur in the soil, and to be pathogenic against the artichoke aphid Capitophorus elaeagni (Hemiptera: Aphididae). Since endophytic fungi are recently regarded as plant-defending mutualists and their presence in internal plant tissue has been discussed as an adaptive protection against insects, we were interested on elucidating the possible endophytic behavior of B. bassiana and B. ochroleuca on artichoke, Cynara scolymus, after foliar spraying tehcnique. The leaf spray inoculation method was effective in introducing the inoculated fungi into the plant tissues and showed, then, an endophytic activity on artichoke even 10 days later. According S-N-K test, there was significant differences between the two fungal treatments, B. ochroleuca (84% a) and B. bassiana (78% a), and controls (0% b). Likewise, the inoculated entomopathogenic fungi were also isolated from new leaves even though with significant differences respectively between controls (0% c), B. bassiana (56% b) and B. ochroleuca (78% a). These results reveals significant new data on the interaction of inoculated fungi with artichoke plant as ecological roles that can be exploited for the protection of plants. PMID:24681358

  18. [Susceptibility of the parasitoid Phymastichus coffea LaSalle (Hymenoptera: Eulophidae) to Beauveria bassiana under laboratory conditions].

    Science.gov (United States)

    Castillo, Alfredo; Gómez, Jaime; Infante, Francisco; Vega, Fernando E

    2009-01-01

    The coffee berry borer, Hypothenemus hampei (Ferrari) (Coleoptera: Curculionidae), is the most important coffee pest worldwide. Beauveria bassiana is a generalist entomopathogenic fungus widely used by coffee farmers to control this pest and Phymastichus coffea LaSalle (Hymenoptera: Eulophidae) is an African endoparasitoid of H. hampei adults, recently imported to several Latin American and Caribbean countries to aid in the coffee berry borer control. The objective of this study was to determine if B. bassiana is detrimental to P. coffea. The susceptibility of the parasitoid was evaluated in terms of adult survivorship, mean lethal concentration (LC50), mean lethal time (LT50), reproduction and immature mortality. The main effect of the fungus resulted in reduction of adult longevity and mortality of 100% for immature stages of this parasitoid. The LC50 for adults was 0.11% equivalent to 9.53 x 10(7) conidia/ml of B. bassiana and a LT50 of 29.4h, equivalent to reduction of 22% of its normal longevity as an adult. P. coffea was capable of disseminating spores of B. bassiana to non-infected H. hampei adults, which could indirectly cause the death of its own progeny. These results could be valuable when considering the use of both organisms in the field, especially in an integrated pest management program. PMID:19943017

  19. Potential of Metarrhizium anisopliae and Beauveria bassiana isolates and Neem oil to control the aphid Lipaphis erysimi (Kalt.) (Hemiptera: Aphididae)

    International Nuclear Information System (INIS)

    This work aimed to determine the efficiency of the entomopathogenic fungi Metarrhizium anisopliae and Beauveria bassiana to control the aphid Lipaphis erysimi (Kalt.) (Hemiptera:Aphididae) in kale Brassica oleracea var acephala D.C., as well as their compatibility with a neem oil formulation (NeemsetoR). Ten isolates of both fungi were tested and the most pathogenic ones were B. bassiana CG001 and M. anisopliae CG30 with 90% and 4.4 days, and 64% and 3.8 days of mortality and median lethal time, respectively. Bioassays with neem at concentrations of 0.5, 1.0 and 2.0% were done either by leaf discs dipping or spraying the aphids on the leaf discs. The neem spraying treatment at 2.0% provided 90% mortality. The use of B. bassiana isolate CG001 or M. anisopliae isolate CG30 with neem at 0.125, 0.25, and 0.5%, demonstrated that these isolates could have their spore viability or colony growth affected when exposed to neem concentrations higher than 0.25%. In absolute values, the isolates B. bassiana CG001 and M. anisopliae CG30 are the most virulent to L. erysimi, and could be utilized in the management of this pest. (author)

  20. EFEITO ANTAGÔNICO DE Trichoderma sp. NO DESENVOLVIMENTO DE Beauveria bassiana (Bals. Vuill. e Metarhizium anisopliae (Metsch. Sorok ANTAGONISTIC EFFECT OF Trichoderma sp. ON THE DEVELOPMENT OF Beauveria bassiana (Bals. Vuill. AND Metarhizium anisopliae (Metsch. SOROK

    Directory of Open Access Journals (Sweden)

    Alcides Moino Jr.

    1999-01-01

    Full Text Available Este trabalho teve por objetivo avaliar o efeito de Trichoderma sp. no desenvolvimento de Beauveria bassiana e Metarhizium anisopliae. Trichoderma sp., B. bassiana (isolado 634 e M. anisopliae (isolado E-9 foram inoculados em meio BDA, com intervalos de 0, 48, 120 e 168 horas entre a inoculação de Trichoderma sp. e dos entomopatógenos. Avaliou-se o crescimento radial das colônias nos períodos de 48 e 120 horas após a inoculação de Trichoderma sp., sendo que este afetou o desenvolvimento dos entomopatógenos quando inoculado simultaneamente ou após 48 horas. B. bassiana e M. anisopliae desenvolveram-se normalmente quando inoculados 168 horas antes de Trichoderma sp.. Também foi avaliado o efeito de um extrato de Trichoderma sp. sobre os entomopatógenos, com a adição de 0,1; 0,5; 1,0 e 5,0 ml de extrato/100,0 ml de meio, onde foram inoculados os entomopatógenos. Foram medidos os diâmetros de colônias e o número de conídios produzidos por B. bassiana e M. anisopliae na presença do extrato. A concentração de 5,0 ml de extrato/100,0 ml de meio alterou o crescimento e a conidiogênese de B. bassiana. O fungo M. anisopliae foi afetado a partir da adição de 1,0 ml de extrato/100,0 ml de meio.The objective of this work was to evaluate the effect of Trichoderma sp. on the development of Beauveria bassiana and Metarhizium anisopliae. The fungus Trichoderma sp. was inoculated on PDA culture medium, 0, 48, 120 and 168 hours after inoculation of the same plates with either B. bassiana (isolate 634 or M. anisopliae (isolate E-9. The radial growth of fungal colonies was measured 48 and 120 hours after Trichoderma sp. inoculation. Trichoderma sp. affected the development of both entomopathogenic fungi when inoculated simultaneously or 48 hours later. B. bassiana and M. anisopliae had normal development when inoculated 168 hours before Trichoderma sp. The effect of a toxic extract from Trichoderma sp. on the entomopathogenic fungi was also

  1. Selection of Wetting Agent for Dried Conidia of two Beauveria bassiana Strains from Different Production Systems to Control Tarnished Plant Bugs

    Science.gov (United States)

    The hydrophilic–lipophilic balance (HLB) number was used to select surfactant, TDA (polyoxy-ethylene tridecyl ether) with a range of HLB numbers in formulation development of two Beauveria bassiana strains, NI8 and GHA produced from different systems. The results indicated that optimal HLB number of...

  2. Application of hydrophilic-lypophilic balance (HLB) number to optimize a compatible non-ionic surfactant for dried aerial conidia of Beauveria bassiana

    Science.gov (United States)

    The hydrophilic-lipophilic balance (HLB) number system was used to optimize a compatible non-ionic surfactant, TDA(polyoxyethylene tridecyl ether) in formulations for two Beauveria bassiana strains, NI8 and GHA. The optimal HLB number for TDA was determined on the basis of wetting times for conidia...

  3. Field Applications of Entomopathogenic Fungi Beauveria bassiana (Hypocreales: Clavicipitaceae) and Metarhizium anisopliae F52 (Hypocreales: Nectriaceae) for the Control of Ixodes scapularis (Acari: Ixodidae)

    Science.gov (United States)

    Two commercial formulations of Beauveria bassiana (Balsamo-Crivelli) Vuillemin were applied to residential sites in Old Lyme, Connecticut for the control of nymphs of the blacklegged tick, Ixodes scapularis in 1999 and 2000. The pyrethroid bifenthrin was applied to other homes for comparison with B....

  4. Two strains of Pseudomonas fluorscens bacteria differentially affect survivorship of waxworm (Galleria mellonella) larvae exposed to an arthropod fungal pathogen, Beauveria bassiana

    Science.gov (United States)

    Two strains of Pseudomonas fluorescens were found contaminating a biopesticide used in a previous study against Varroa destructor infestations in honey bee hives. In the aforementioned study the biopesticide, a formulation of the arthropod pathogen Beauveria bassiana, failed to have any impact on t...

  5. Integrated applications of Bacillus thuringiensis serovar. tenebrionis and Beauveria bassiana for biologically-based integrated pest management of Colorado potato beetle

    Science.gov (United States)

    Research conducted over the past decade has indicated a low level of synergism and potentially high degree of complementarity between Bacillus thuringiensis (Bt)- and Beauveria bassiana (Bb)-based biopesticides applied for management of the Colorado potato beetle, Leptinotarsa decemlineata. In view...

  6. Impact of two treatments of a formulation of Beauveria bassiana (Deuteromycota: Hyphomycetes) conidia on Varroa mites (Acari: Varroidae) and on honeybee (Hymenoptera: Apidae) colony health

    Science.gov (United States)

    Bee colonies in southern France were treated with conidia from 2 strains of Beauveria bassiana – one commercial (GHA) and the other isolated from Varroa mites in the region (Bb05002). Objectives were to evaluate treatment effect on colony weight, adult bee mass, capped brood, and on Varroa fall onto...

  7. Laboratory evaluation of a native strain of Beauveria bassiana for controlling Dermanyssus gallinae (De Geer, 1778) (Acari: Dermanyssidae).

    Science.gov (United States)

    Immediato, Davide; Camarda, Antonio; Iatta, Roberta; Puttilli, Maria Rita; Ramos, Rafael Antonio Nascimento; Di Paola, Giancarlo; Giangaspero, Annunziata; Otranto, Domenico; Cafarchia, Claudia

    2015-09-15

    The poultry red mite, Dermanyssus gallinae (De Geer, 1778) (Acari: Dermanyssidae) is one of the most economically important ectoparasites of laying hens worldwide. Chemical control of this mite may result in environmental and food contamination, as well as the development of drug resistance. High virulence of Beauveria bassiana sensu lato strains isolated from naturally infected hosts or from their environment has been demonstrated toward many arthropod species, including ticks. However, a limited number of studies have assessed the use of B. bassiana for the control of D. gallinae s.l. and none of them have employed native strains. This study reports the pathogenicity of a native strain of B. bassiana (CD1123) against nymphs and adults of D. gallinae. Batches of nymph and adult mites (i.e., n=720 for each stage) for treated groups (TGs) were placed on paper soaked with a 0.1% tween 80 suspension of B. bassiana (CIS, 10(5), 10(7) and 10(9) conidia/ml), whilst 240 untreated control mites for each stage (CG) were exposed only to 0.1% tween 80. The mites in TG showed a higher mortality at all stages (p<0.01) when compared to CG, depending on the time of exposure and the conidial concentration. A 100% mortality rate was recorded using a CIS of 10(9) conidia/ml 12 days post infection (DPI) in adults and 14 DPI in nymphs. B. bassiana suspension containing 10(9) conidia/ml was highly virulent towards nymph and adult stages of D. gallinae, therefore representing a possible promising natural product to be used in alternative or in combination to other acaricidal compounds currently used for controlling the red mite. PMID:26206607

  8. Evaluation of a New Entomopathogenic Strain of Beauveria bassiana and a New Field Delivery Method against Solenopsis invicta

    Science.gov (United States)

    Li, Jun; Guo, Qiang; Lin, Miaofeng; Jiang, Lu; Ye, Jingwen; Chen, Dasong; Li, Zhigang; Dai, Jianqing; Han, Shichou

    2016-01-01

    Solenopsis invicta Buren is one of the most important pests in China, and control measures are mainly based on the use of synthetic pesticides, which may be inadequate and unsustainable. Hence, there is a growing interest in developing biological control alternatives for managing S. invicta, such as the use of entomopathogenic fungi. To facilitate the commercialization of entomopathogenic fungi against S. invicta, 10 Beauveria bassiana isolates originating from different hosts were tested for virulence in laboratory bioassays, and the most pathogenic strain, ZGNKY-5, was tested in field studies using an improved pathogen delivery system. The cumulative mortality rate reached 93.40% at 1×108 mL-1 conidia after 504 h. The germination and invasion of the spores were observed under a scanning electron microscope, and several conidia adhered to the cuticle of S. invicta after 2 h. Furthermore, the germ tubes of the conidia oriented toward the cuticle after 48 h, and the mycelium colonized the entire body after 96 h. Based on the efficacy observed in the laboratory trials, further experiments were performed with ZGNKY-5 strain to evaluate its utility in an injection control technology against S. invicta in the field. We found that three dosage treatments of ZGNKY-5 strain (500 mL, 750 mL, and 1,000 mL per nest) had significant control effects. Our results show that this strain of Beauveria bassiana and our control method were effective against S. invicta in both laboratory and field settings. PMID:27341441

  9. Glucose concentration alters dissolved oxygen levels in liquid cultures of Beauveria bassiana and affects formation and bioefficacy of blastospores.

    Science.gov (United States)

    Mascarin, Gabriel Moura; Jackson, Mark A; Kobori, Nilce Naomi; Behle, Robert W; Dunlap, Christopher A; Delalibera Júnior, Ítalo

    2015-08-01

    The filamentous fungus Beauveria bassiana is an economically important pathogen of numerous arthropod pests and is able to grow in submerged culture as filaments (mycelia) or as budding yeast-like blastospores. In this study, we evaluated the effect of dissolved oxygen and high glucose concentrations on blastospore production by submerged cultures of two isolates of B. bassiana, ESALQ1432 and GHA. Results showed that maintaining adequate dissolved oxygen levels coupled with high glucose concentrations enhanced blastospore yields by both isolates. High glucose concentrations increased the osmotic pressure of the media and coincided with higher dissolved oxygen levels and increased production of significantly smaller blastospores compared with blastospores produced in media with lower concentrations of glucose. The desiccation tolerance of blastospores dried to less than 2.6 % moisture was not affected by the glucose concentration of the medium but was isolate dependent. Blastospores of isolate ESALQ1432 produced in media containing 140 g glucose L(-1) showed greater virulence toward whitefly nymphs (Bemisia tabaci) as compared with blastospores produced in media containing 40 g glucose L(-1). These results suggest a synergistic effect between glucose concentration and oxygen availability on changing morphology and enhancing the yield and efficacy of blastospores of B. bassiana, thereby facilitating the development of a cost-effective production method for this blastospore-based bioinsecticide. PMID:25947245

  10. Compatibility between the entomopathogenic fungus Beauveria bassiana and insecticides used in coffee plantations Compatibilidade entre o fungo entomopatogênico Beauveria bassiana e inseticidas usados na cultura do cafeeiro

    Directory of Open Access Journals (Sweden)

    Carolina Natali de Oliveira

    2003-12-01

    Full Text Available Microbial control in integrated pest management (IPM programs of coffee plantations is an important factor for the reduction of pest population densities. The use of selective pesticides can be associated with entomopathogens, increasing the efficiency of the control and reducing the use of required insecticides. The in vitro fungitoxic effect of insecticide formulations of Thiamethoxam, Cyfluthrin, Deltamethrin, Alpha-Cypermethrin, Triazophos, Chlorpyrifos, Fenpropathrin and Endosulfan and Beauveria bassiana (CG 425 strain was evaluated at three concentrations (FR = average field recommendation; 0.5 ´ FR and 2 ´ FR. Effects of these products on conidia germination, vegetative growth and sporulation were compared. Only five insecticides, at the FR concentration, promoted conidia viability higher than 60%. Viability should be considered the most important factor to be evaluated since it is the first step of the infection process. The insecticide formulations of Alpha-Cypermethrin, Thiamethoxam and Cyfluthrin caused the lower inhibition level on conidia germination at the two lower concentrations, with no difference in relation to the control. With respect to vegetative growth analysis, Thiamethoxam at the two lower concentrations was not found to cause radial growth inhibition. Thiamethoxam caused the smallest inhibition level with regard to conidia production. The use of Alpha-Cypermethrin and Thiamethoxam formulations in coffee IPM programs for a B. bassiana inoculum conservation strategy are recommended, since these products were compatible with the entomopathogenic fungus Beauveria bassiana (CG 425, an important natural control agent of the coffee berry borer, Hypothenemus hampei.Em programas de Manejo integrado de pragas (MIP deve-se considerar o controle microbiano como um importante fator de redução da densidade populacional de pragas. A utilização de produtos seletivos quando associados a patógenos, pode aumentar a eficiência de

  11. Compatibilidade de isolados de Beauveria bassiana (Ascomycetes: Clavicipitaceae com carrapaticidas químicos utilizados no controle do carrapato dos bovinos Compatibility of Beauveria bassiana (Ascomycetes: Clavicipitaceae with chemicals acaricides used in the control of cattle tick

    Directory of Open Access Journals (Sweden)

    Leila A. G. Barci

    2009-12-01

    Full Text Available O presente trabalho teve como escopo avaliar a compatibilidade dos isolados IBCB66 e IBCB21 de Beauveria bassiana com os carrapaticidas a base de Flumetrina + Coumafós, Deltametrina, Diclorvós + Cipermetrina, Diclorvós + Clorpirifós, Cipermetrina High Cis, Diclorvós + Cipermetrina High Cis, Cipermetrina e Amitraz utilizados no controle do carrapato Rhipicephalus (Boophilus microplus em nosso país. O efeito dos produtos comerciais sobre os isolados foi verificado por meio da observação do crescimento vegetativo, produção de conídios e viabilidade das estirpes do fungo B. bassiana. Com referência ao isolado IBCB66, os produtos Deltametrina, Cipermetrina High Cis e Amitraz foram classificados como compatíveis, não interferindo no desenvolvimento do entomopatógeno. O produto Cipermetrina foi classificado como tóxico e os produtos Flumetrina + Coumafós, Diclorvós + Cipermetrina, Diclorvós + Clorpirifós e Diclorvós + Cipermetrina High Cis, muito tóxicos. Em relação ao isolado IBCB21, os produtos Flumetrina + Coumafós, Diclorvós + Cipermetrina, Diclorvós + Clorpirifós, Cipermetrina High Cis, Diclorvós + Cipermetrina High Cis e Cipermetrina foram classificados como muito tóxicos e o produto Amitraz como tóxico. Entre os carrapaticidas avaliados, o produto Deltametrina foi o único que não produziu efeito tóxico sobre o entomopatógeno.The purpose of the present study was to assess compatibility between IBCB66 and IBCB21 isolates of Beauveria bassiana and acaricides: Flumethrin + Coumaphos, Deltamethrin, Dichlorvos + Cypermethrin, Dichlorvos + Chlorpyrifos, Cypermethrin High Cis, Dichlorvos + Cypermethrin High Cis, Cypermethrin and Amitraz, utilized on the control of Rhipicephalus (Boophilus microplus in our country. The effect of commercial products on the isolates was assayed according to observation of vegetative growth, conidia production, and viability of strains of B. bassiana fungus. With concerning about IBCB66

  12. Could Sterile Males be Used to Vector a Microbiological Control Agent? The Case of Rhynchophorus Ferrugineus and Beauveria Bassiana

    International Nuclear Information System (INIS)

    Full text: Rhynchophorus ferrugineus (Coleoptera, Curculionidae) is the most threatening pest of palms worldwide. The potential of gamma-irradiated males to spread a pathogenic strain of the entomopathogenic fungus Beauveria bassiana (Ascomycota: Clavicipitaceae) to control this pest was studied. First, the effects of gamma irradiation (15 and 25 Gy) on the mating success and performance of adult males irradiated at age one day were studied in the laboratory. Although male longevity decreased after irradiation (118.6 vs. 244.7 days for irradiated and control males, respectively) and their testes suffered from the treatment, fecundity of mated females did not depend on the irradiation status of the male (86.8±5.5 eggs in 15 days). However, egg hatching was significantly lower in couples with irradiated males (31.4% vs. 86.5% for irradiated and control couples, respectively), and this value decreased after a second mating (6.1% vs. 85.9%). Therefore, irradiation did not affect male sexual competiveness but sperm quality. Second, a semi-field assay was carried out to evaluate infestation in young Phoenix canariensis caused by different combinations of couples with irradiated and/or B. bassiana-challenged males. The number of immature stages found in infested palms was significantly higher when females mated with untreated males and lower when mated with irradiated males (either B. bassiana-infected or not). Some females from the fungus-challenged treatments showed post-mortem hyphal growth, and this horizontal transmission proves that irradiated males could act as a vector for B. bassiana and should be considered as a new method to improve the biological control of R. ferrugineus. (author)

  13. Targeting of insect epicuticular lipids by the entomopathogenic fungus Beauveria bassiana: hydrocarbon oxidation within the context of a host-pathogen interaction

    Directory of Open Access Journals (Sweden)

    Nicolas ePedrini

    2013-02-01

    Full Text Available Broad host range entomopathogenic fungi such as Beauveria bassiana attack insect hosts via attachment to cuticular substrata and the production of enzymes for the degradation and penetration of insect cuticle. The outermost epicuticular layer consists of a complex mixture of non-polar lipids including hydrocarbons, fatty acids, and wax esters. Long chain hydrocarbons are major components of the outer waxy layer of diverse insect species, where they serve to protect against desiccation and microbial parasites, and as recognition molecules or as a platform for semiochemicals. Insect pathogenic fungi have evolved mechanisms for overcoming this barrier, likely with sets of lipid degrading enzymes with overlapping substrate specificities.. Alkanes and fatty acids are substrates for a specific subset of fungal cytochrome P450 monooxygenases involved in insect hydrocarbon degradation. These enzymes activate alkanes by terminal oxidation to alcohols, which are further oxidized by alcohol and aldehyde dehydrogenases, whose products can enter β-oxidation pathways. B. bassiana contains at least 83 genes coding for cytochrome P450s (CYP, a subset of which are involved in hydrocarbon oxidation, and several of which represent new CYP subfamilies/families. Expression data indicated differential induction by alkanes and insect lipids and 4 CYP proteins have been partially characterized after heterologous expression in yeast. Gene knockouts revealed a phenotype for only one (cyp52X1 out of 6 genes examined to date. CYP52X1 oxidizes long chain fatty acids and participates in the degradation of specific epicuticular lipid components needed for breaching the insect waxy layer. Examining the hydrocarbon oxidizing CYP repertoire of pathogens involved in insect epicuticle degradation can lead to the characterization of enzymes with novel substrate specificities. Pathogen targeting may also represent an important co-evolutionary process regarding insect cuticular

  14. A molecular tool for detection and tracking of a potential indigenous Beauveria bassiana strain for managing emerald ash borer populations in Canada.

    Science.gov (United States)

    Johny, Shajahan; Kyei-Poku, George

    2014-10-01

    Emerald ash borer is an invasive species from Asia. Beauveria bassiana strain L49-1AA is being tested for the control of emerald ash borer in Canada, using an autocontamination trapping system. We have developed a simplified allele discrimination polymerase chain reaction (PCR) assay to screen B. bassiana strain, L49-1AA from other Beauveria species by targeting the inter-strain genetic differences in 5' end of EF1-α gene of the genus Beauveria. A single nucleotide polymorphism (SNP) site, T→C was identified only in L49-1AA and was used to develop a simplified allele discrimination polymerase chain reaction (PCR) assay based on a modified allelic inhibition of displacement activity (AIDA) approach for distinguishing B. bassiana L49-1AA from all background Beauveria isolates. The SNP site was employed to design inner primers but with a deliberate mismatch introduced at the 3' antepenultimate from the mutation site in order to maximize specificity and detection efficiency. Amplification was specific to L49-1AA without cross-reaction with DNA from other Beauveria strains. In addition, the designed primers were also tested against environmental samples in L49-1AA released plots and observed to be highly efficient in detecting and discriminating the target strain, L49-1AA from both pure and crude DNA samples. This new method can potentially allow for more discriminatory tracking and monitoring of released L49-1AA in our autocontamination and dissemination projects for managing EAB populations. Additionally, the modified-AIDA format has potential as a tool for simultaneously identifying and differentiating closely related Beauveria species, strains/isolates as well as general classification of other pathogens or organisms. PMID:25110340

  15. Diversity of Fungi Associated with Atta bisphaerica (Hymenoptera: Formicidae: The Activity of Aspergillus ochraceus and Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Myriam M. R. Ribeiro

    2012-01-01

    Full Text Available The grass-cutting ant Atta bisphaerica is one of the most serious pests in several pastures and crops in Brazil. Fungal diseases are a constant threat to these large societies composed of millions of closely related individuals. We investigated the occurrence of filamentous fungi associated with the ant A. bisphaerica in a pasture area of Viçosa, Minas Gerais State, Brazil. Several fungi species were isolated from forager ants, and two of them, known as entomopathogenic, Beauveria bassiana and Aspergillus ochraceus, were tested against worker ants in the laboratory. The two species were highly virulent, achieving 50 percent worker mortality within 4-5 days. It is the first time A. ochraceus, a commonly found fungal species, is reported to infect Atta species at a high prevalence. Possible uses for the fungus within biological control are discussed.

  16. Selection of Beauveria bassiana and Metarhizium anisopliae isolates for the control of Blissus antillus (Hemiptera: Lygaeidae Seleção de isolados Beauveria Bassiana e Metarhizium Anisopliae para o controle de Blissus Antillus

    Directory of Open Access Journals (Sweden)

    Richard Ian Samuels

    2004-06-01

    Full Text Available Chinch bugs of the genus Blissus (Hemiptera: Lygaeidae are serious pests of maize, wheat, sorghum and various grasses. This study is the first to screen isolates of Beauveria bassiana and Metarhizium anisopliae against 4th instar and adult Blissus antillus aiming to develop a biological control program for this important pasture pest. Ten fungal isolates were initially screened and three isolates were chosen for further investigation. To determine virulence, insects were inoculated by immersion in concentrations of 5 ´ 10(8 conidia mL-1. Mortality was evaluated for 10 days. B. bassiana ARSEF 792 was the most virulent isolate to both nymphs and adults, causing 53 and 78% infection, respectively, and values for LT50 of 7.8 and 5.0 days, respectively. Germination studies were carried out to confirm viability and determine speed of germination as a pathogenicity factor. The production of conidia on the cadavers of insects infected with the three selected isolates was determined. The production of conidia on rice media was also evaluated. B. bassiana CG 24 produced the highest number of conidia on insects cadavers (14.9 ´ 10(7 conidia per insect and also on rice media (10.6 ´ 10(9 conidia per g.Percevejos do gênero Blissus (Hemiptera: Lygeidae são pragas importantes das plantações de milho, trigo e sorgo e de vários tipos de gramíneos forrageiros. Esse estudo é o primeiro a amostrar isolados de Beauveria bassiana e Metarhizium anisopliae contra aos 4(0 instares e adultos de Blissus antillus com a finalidade de desenvolver um programa de controle biológico dessa importante praga de pastagens. Dez isolados foram inicialmente testados e três foram escolhidos para maiores investigações. Para determinar a virulência, os insetos foram inoculados por imersão em suspensões de conídios a uma concentração de 5 ´ 10(8 conídios mL-1. Mortalidade foi avaliada por 10 dias. B. bassiana ARSEF 792 foi o isolado mais virulento para as ninfas e os

  17. Controle associado de Alphitobius diaperinuse efeito de microrganismos eficazes no desenvolvimento de Beauveria bassiana Associated control of Alphitobius diaperinus and effect of effective microorganisms in the development of Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Patricia Helena Santoro

    2008-01-01

    Full Text Available O objetivo deste trabalho foi avaliar a eficiência de Beauveria bassiana (Bb, terra diatomácea (TD e microrganismos eficazes (EM-4, associados ou não, no controle de Alphitobius diaperinus, e o efeito de EM-4 no desenvolvimento de B. bassiana. Os agentes de controle (Bb, TD e EM-4, em diferentes concentrações e combinações, foram aplicados em uma mistura de cama-de-frango e ração, em que os insetos foram acondicionados por dez dias. Avaliaram-se, in vitro: a germinação, as unidades formadoras de colônia (UFC, o crescimento vegetativo e a produtividade de conídios de Bb em contato com suspensão aquosa de EM-4 (1% não filtrada e filtrada. Os maiores índices de mortalidade foram observados nos tratamentos TD + Bb + EM-4 e TD + Bb, nas maiores concentrações. Verificou-se efeito não-aditivo sinérgico para TD + Bb nas três concentrações. Nos testes com EM-4 filtrado, não houve diferença em relação à testemunha quanto à germinação e às UFC, entretanto, o crescimento vegetativo e a produtividade de conídios foram negativamente afetados. O uso conjunto de B. bassiana e terra diatomácea, para o manejo de populações de A. diaperinus, pode reduzir o uso de produtos químicos.The objective of this work was to evaluate Beauveria bassiana (Bb, diatomaceous earth (TD and effective microorganisms (EM-4, associated or not, to Alphitobius diaperinus control, and the EM-4 effect on B. bassiana development. The control agents (Bb, TD and EM-4, in different concentrations and combinations, were applied in a mixture of litter and chicken food, where insects had been left per ten days. Conidia germination, colony-forming units (CFU, vegetative growth and the productivity of Bb conidia were evaluated when in contact with a filtered and non filtered watery EM-4 suspension (1%. The highest indices of mortality were observed in the treatments TD + Bb + EM and TD + Bb in the highest concentrations. A synergic non additive effect was

  18. Evaluating the virulence of Metarhizium anisopliae (Deuteromycotina: Hyphomycetes and Beauveria bassiana (Ascomycota: Hypocreales isolates to Arabian rhinoceros beetle, Oryctes agamemnon arabicus

    Directory of Open Access Journals (Sweden)

    M.W. Khudhair

    2015-12-01

    Full Text Available Virulence of entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana were tested against Arabian Rhinoceros Beetle, Oryctes agamemnon arabicus larvae. Four concentrations (1×105, 1×107, 1×109 and 1×1011 conidia/mL–1 of two locally isolated entomopathogenic fungi spore suspensions were used in this study via larval direct spraying. Results revealed that both isolates can cause high mortality rate reaching 100% after 29 days. However, Beauveria bassiana scored higher mortality rate in short time especially at the concentration of 1×1011 conidia/ mL–1 with lethal time (LT50 12.75 and LT90 20.00; while, Metarhizium anisopliae caused the higher percentage of malformed adults. Moreover, both isolates affected insect’s life cycle particularly in the pupal stage which was reduced remarkably by almost 50% in comparison with the control treatment.

  19. Effect of moisture content and inoculum on the growth and conidia production by Beauveria bassiana on wheat bran

    Directory of Open Access Journals (Sweden)

    Oscar Nuñez-Gaona

    2010-08-01

    Full Text Available The aim of the present work was to study the effect of moisture content and inoculum on the growth and conidia production by Beauveria bassiana on wheat bran (WB.The highest growth rate of B. bassiana 885.2 on WB media was obtained at a w=1.0, with no detected growth at a w < 0.97. Solid-state fermentation (SSF using WB (66% moisture; a w=1.0 achieved a maximal yield of 1.18x10 10 conidia per gram of dry substrate (gds. This yield decreased one order of magnitude with higher moisture contents or the addition of sugarcane bagasse (SCB as a texturiser. In SSF using WB (66% humidity,the time to obtain a yield of 1x10(10 conidia/gds, referred to as t10, could be predicted using a model considering common inoculum levels and maximal yields. For instance, t10 was 285 h with an inoculum of 1x10(6 conidia/gds; however, t10 was reduced to 232 h and 148 for inocula of 7x10(6 and 5x10(7 conidia/gds, respectively. The estimation of t10 values allowed both comparison between the cultures and prediction of harvesting times in production processes. Values for hydrophobicity were within 90 and 92%, whereas viability averages were around 70% for all the cultures

  20. Evaluación de Beauveria bassiana para el combate de insectos plaga en maíz almacenado

    Directory of Open Access Journals (Sweden)

    Juan Diego Molina

    2000-01-01

    Full Text Available El objetivo de este estudio fue evaluar la patogenicidad de aislamientos de Beauveria bassiana, para controlar los insectos plaga Prostephanus truncatus y Stophilus zeamais, en mazorcas de maíz almacenado. Se evaluó también la patogenicidad del hongo sobre Teritriosoma nigrescens, depredador natural de P. truncatus. Se mezclaron conidios secos del hongo con kaolinita y se aplicaron a trojas de maíz de 450 mazorcas acomodadas en capas de 50. Se montaron dos ensayos, en el primero se evaluaron aplicaciones del hongo al momento de almacenar el maíz, y en el segundo se evaluaron aplicaciones del hongo realizadas después de almacenar el maíz. La mortalidad de P. truncatus fue cuatro veces mayor en el ensayo donde se aplicó el hongo en forma preventiva. La mortalidad de S. zeamais fue el doble en el tratamiento donde se aplicó el hongo al momento de inocular con P. truncatus. Los niveles de mortalidad por B. bassiana fueron mayores en P. truncatus que en S. zeamais, pero S. zeamais, pero este último mostró un 20% más de infección que el primero

  1. Evaluation of the pathogenicity of multiple isolates of Beauveria bassiana (Hypocreales: Clavicipitaceae) on Rhynchophorus ferrugineus (Coleoptera: Dryophthoridae) for the assessment of a solid formulation under simulated field conditions

    OpenAIRE

    Ricaño, Jorge; Güerri Agulló, Berenice; Serna Sarriás, María José; Rubio Llorca, Germán; Asensio Berbegal, Leticia; Barranco, Pablo; López Llorca, Luis Vicente

    2013-01-01

    A solid state formulation of Beauveria bassiana (Balsamo) Vuillemin has been developed for biological control of the Red Palm Weevil (RPW), Rhynchophorus ferrugineus (Olivier, 1790). Two kinds of bioassays (dry conidia and dipping) using 10 isolates from several coleopterans in Mediterranean environments, identified 2 RPW derived isolates (193 and 203) as most pathogenic to RPW larvae and adults (zero survival within first 4–5 d for dry conidia, and 14 and 23 d for dipping bioassays). Isolate...

  2. An attempt to use the fungus Beauveria bassiana (Bals.) Vuill. in forest protection against the bark beetle Ips typographus (L.) in the field

    OpenAIRE

    Grodzki Wojciech; Kosibowicz Mieczysław

    2015-01-01

    In 2011–2013, trials on the use of the entomopathogenic fungus Beauveria bassiana against bark beetle (Ips typographus) populations were carried out under open field conditions in Norway spruce stands suffering from an outbreak in the Beskid Żywiecki Mts. in Poland. Modified pheromone traps were deployed to capture and thereafter release fungus-infected bark beetles to the forest environment. Infested spruce trees felled next to the traps remained unaffected by the transmission of the fungus ...

  3. Laboratory bioassay of Beauveria bassiana against Tetranychus urticae (Acari: Tetranychidae) on leaf discs and potted bean plants.

    Science.gov (United States)

    Ullah, Mohammad Shaef; Lim, Un Taek

    2015-03-01

    Use of the mycopathogen Beauveria bassiana (strain GHA), marketed as BotaniGard(®) ES, was evaluated as a plant protection strategy against the spider mite Tetranychus urticae Koch, which is considered one of the most economically important and cosmopolitan pests of many crops. Tetranychus urticae were treated with four concentrations of conidia (1 × 10(5), 1 × 10(6), 1 × 10(7), or 1 × 10(8) conidia/ml), and virulence was assessed on mites held at four relative humidity levels (35, 55, 75, and 95 ± 2 % RH) at 25 ± 1 °C. At 1 × 10(8) spores/ml, the LT50 value was 9.7 h at 95 % RH, which was significantly lower than values for other RH levels. At 1 × 10(7) spores/ml, the LT50 value was 43.8 h at 95 % RH, which was significantly different from values at 55 and 35 % RH. The efficacy of B. bassiana product was also verified on mites infesting potted bean plants with a concentration of 1 × 10(8) spores/ml. In double spray treatment where applications were made 2 × on days 5 and 10 after mite infestation, the nymphal and adult population of T. urticae were reduced to zero on days 20 and 15, respectively. With a single spray on day 5, the nymphal population was also greatly reduced, but increased rapidly after day 20. Single and double sprays with B. bassiana reduced leaf damage as measured by image analysis by 33 and 94 % compared to no treatment, respectively. These results suggest that 1 × 10(8) spores/ml was the most effective dose and that two applications, at a 5-day interval, provided control of T. urticae in our laboratory assay. PMID:25500970

  4. Potential of two entomopathogenic fungi, Beauveria bassiana and Metarhizium anisopliae (Coleoptera: Scarabaeidae), as biological control agents against the June beetle.

    Science.gov (United States)

    Erler, Fedai; Ates, A Ozgur

    2015-01-01

    The aim of this study was to evaluate the effectiveness of the entomopathogenic fungi (EPF), Beauveria bassiana (Bals.) Vuill. (Deuteromycotina: Hyphomycetes) strain PPRI 5339 [BroadBand, an emulsifiable spore concentrate (EC) formulation] and Metarhizium anisopliae (Metsch.) Sorokin (Hypocreales: Clavicipitaceae) strain F52 [Met52, both EC and granular (GR) formulations] against the larvae of Polyphylla fullo (L.) (Coleoptera: Scarabaeidae). Larvicidal bioassays were performed in foam boxes (100 by 75 by 50 cm; length by width by height), containing moist soil medium with some humus and potato tubers as food. Although the B. bassiana product (min. 4 × 10(9) conidia/ml) was applied at 100, 150, and 200 ml/100 l water; M. anisopliae strain F52 was applied at 500, 1,000, and 1,500 g/m(3) of moist soil medium for GR (9 × 10(8) cfu/g) and 75, 100, and 125 ml/100 l water for EC (5.5 × 10(9) conidia/ml) formulation. Both fungi were pathogenic to larvae of the pest; however, young larvae (1st and 2nd instars) were more susceptible to infection than older ones (3rd instar). Mortality rates of young and older larvae varied with conidial concentration of both fungi and elapsed time after application. The B. bassiana product was more effective than both of the formulations of the M. anisopliae product, causing mortalities up to 79.8 and 71.6% in young and older larvae, respectively. The highest mortality rates of young and older larvae caused by the M. anisopliae product were 74.1 and 67.6% for the GR formulation, 70.2 and 61.8% for the EC formulation, respectively. These results may suggest that both fungi have potential to be used for management of P. fullo. PMID:25881632

  5. RAPD e ITS Detectan Variación Molecular en Poblaciones Chilenea de Beauveria bassiana RAPD and ITS Reveal Molecular Variation of Chilean Populations of Beauveria bassiana

    OpenAIRE

    Viviana Becerra V; Mario Paredes C.; Carmen Rojo M; Andrés France I

    2007-01-01

    Los hongos entomopatógenos son una alternativa atractiva para el control biológico de insectos plagas. En Chile, el Instituto de Investigaciones Agropecuarias (INIA), Centro Regional de Investigación Quilamapu mantiene aproximadamente 400 aislamientos de Beauveria, colectados a través del país. Esta colección ha sido parcialmente clasificada en base a su morfología y a su eficacia como controlador biológico. Sin embargo, es necesario complementar estos estudios con una caracterización a nivel...

  6. A Distinctive Pattern of Beauveria bassiana-biotransformed Ginsenoside Products Triggers Mitochondria/FasL-mediated Apoptosis in Colon Cancer Cells.

    Science.gov (United States)

    Gum, Sang Il; Rahman, Md Khalilur; Won, Jong Soon; Cho, Min Kyung

    2016-01-01

    Ginseng is one of the most commonly used adaptogens. Transformation into the minor ginsenosides produces compounds with more effective action. Beauveria bassiana, a teleomorph of Cordyceps bassiana, is a highly efficient producer of mammalian steroids and produces large amounts of sugar-utilizing enzymes. However, the fermentation of steroid glycosides in ginseng with B. bassiana has never been studied. Thus, we evaluated the bioconversion of the major ginsenosides in white ginseng by B. bassiana. Interestingly, B. bassiana increased the total amount of protopanaxadiols and hydrolyzed Rb1 into minor ginsenosides, exhibiting high levels of Rd and Rg3, as well as moderate levels of Rb2 and Rc analyzed by high-performance liquid chromatography coupled with evaporative light-scattering detection. The β-glucosidase activity was highly increased, which led to the selective elimination of sugar moiety at the 20-C position of Rb1 to Rd, followed by Rg3. Rb2 and Rc accumulated because of the minimal activities of α-L-arabinopyranosidase and α-L-arabinofuranosidase, respectively. The fermentation product exerted dose-dependent cytotoxicity in HCT-15 cells, which are resistant to ginseng. The product, but not white ginseng, exhibited apoptotic effects via the Fas ligand and caspase 8/9. This study demonstrates for the first time that the B. bassiana-fermented metabolites have potent apoptotic activity in colon cancer cells, linking to a therapeutic use. PMID:26609787

  7. Laboratory and semi-field evaluation of Beauveria bassiana (Ascomycota: Hypocreales) against the lettuce aphid, Nasonovia ribisnigri (Hemiptera: Aphididae)

    DEFF Research Database (Denmark)

    Shrestha, Govinda; Enkegaard, Annie; Steenberg, Tove

    2015-01-01

    The lettuce aphid, Nasonovia ribisnigri (Mosley), is an economically important pest of lettuce worldwide. The entomopathogenic fungus Beauveria bassiana strain GHA has recently been reported as a potential biocontrol candidate for use against the lettuce aphid. This study provides information on...... the mortality inflicted by B. bassiana when applied against different life stages of the lettuce aphid under laboratory conditions and how fungus infection affects the aphid fecundity. In addition, temporal changes in persistence of fungus inoculum applied to foliage of young lettuce plants under semi......-field conditions was analysed. Immature life stages were generally the least susceptible to fungal infection and the susceptibility of all stages was dose-dependent, with the highest mortality occurring at the highest dose. B. bassiana significantly affected the rate of nymph production by the lettuce aphid, with...

  8. Differential metabolic responses of Beauveria bassiana cultured in pupae extracts, root exudates and its interactions with insect and plant.

    Science.gov (United States)

    Luo, Feifei; Wang, Qian; Yin, Chunlin; Ge, Yinglu; Hu, Fenglin; Huang, Bo; Zhou, Hong; Bao, Guanhu; Wang, Bin; Lu, Ruili; Li, Zengzhi

    2015-09-01

    Beauveria bassiana is a kind of world-wide entomopathogenic fungus and can also colonize plant rhizosphere. Previous researches showed differential expression of genes when entomopathogenic fungi are cultured in insect or plant materials. However, so far there is no report on metabolic alterations of B. bassiana in the environments of insect or plant. The purpose of this paper is to address this problem. Herein, we first provide the metabolomic analysis of B. bassiana cultured in insect pupae extracts (derived from Euproctis pseudoconspersa and Bombyx mori, EPP and BMP), plant root exudates (derived from asparagus and carrot, ARE and CRE), distilled water and minimal media (MM), respectively. Principal components analysis (PCA) shows that mycelia cultured in pupae extracts and root exudates are evidently separated and individually separated from MM, which indicates that fungus accommodates to insect and plant environments by different metabolic regulation mechanisms. Subsequently, orthogonal projection on latent structure-discriminant analysis (OPLS-DA) identifies differential metabolites in fungus under three environments relative to MM. Hierarchical clustering analysis (HCA) is performed to cluster compounds based on biochemical relationships, showing that sphingolipids are increased in BMP but are decreased in EPP. This observation further implies that sphingolipid metabolism may be involved in the adaptation of fungus to different hosts. In the meantime, sphingolipids are significantly decreased in root exudates but they are not decreased in distilled water, suggesting that some components of the root exudates can suppress sphingolipid to down-regulate sphingolipid metabolism. Pathway analysis finds that fatty acid metabolism is maintained at high level but non-ribosomal peptides (NRP) synthesis is unaffected in mycelia cultured in pupae extracts. In contrast, fatty acid metabolism is not changed but NRP synthesis is high in mycelia cultured in root exudates

  9. Patogenicidade de Beauveria bassiana ao psilídeo Diaphorina citri e compatibilidade do fungo com produtos fitossanitários Beauveria bassiana pathogenicity to Diaphorina citri and compatibility of the fungus with phytosanitary products

    Directory of Open Access Journals (Sweden)

    Ana Paula Ferreira Pinto

    2012-12-01

    Full Text Available O objetivo deste trabalho foi avaliar a patogenicidade de Beauveria bassiana a ninfas de Diaphorina citri (Hemiptera: Psyllidae e verificar a compatibilidade do fungo com produtos fitossanitários e sua persistência em plantas de citros. Ninfas de D. citri foram pulverizadas com B. bassiana, nas concentrações 5x10(6, 1x10(7, 5x10(7, 1x10(8, 5x10(8 e 1x10(9 conídios mL-1, para determinação da concentração letal. Para avaliação da compatibilidade do fungo com produtos fitossanitários, extrato de nim e cinco inseticidas de quatro grupos químicos diferentes foram incorporados individualmente ao meio de cultura BDA em que o fungo foi cultivado. Avaliaram-se o crescimento vegetativo, a esporulação e a viabilidade do entomopatógeno. Plantas de citros, mantidas em casa de vegetação, foram tratadas primeiramente com os produtos fitossanitários e depois com o entomopatógeno. Avaliaram-se os tempos de exposição de 24 horas e de 7 e 14 dias. O fungo foi patogênico às ninfas de D. citri; a CL50 foi de 0,4x10(7 e a CL90 de 6,7x10(7 conidios mL-1, no décimo dia de avaliação. Em laboratório, os produtos fitosssanitários reduzem o crescimento do fungo. Em casa de vegetação, os produtos não afetam a sobrevivência do fungo nas plantas de citros.The objective of this work was to evaluate the pathogenicity of Beauveria bassiana to Diaphorina citri (Hemiptera: Psyllidae nymphs, and to check the compatibility of the fungus with phytosanitary products, and its persistence in citrus plants. Nymphs of D. citri were sprayed with B. bassiana in the concentrations 5x10(6, 1x10(7, 5x10(7, 1x10(8, 5x10(8 and 1x10(9 conidia mL-1 for lethal concentration determination. In order to evaluate the compatibility of the phytosanitary products with the fungus, neem extract and five insecticides of four different chemical groups were individually added to PDA culture medium, in which the fungus was cultivated. Vegetative growth, sporulation and viability

  10. Patogenicidade do fungo entomopatogênico Beauveria bassiana sobre o percevejo Collaria scenica (Hemiptera: Miridae / Pathogenicity of entomopathogenic fungus Beauveria bassiana against the grass bug Collaria scenica (Hemiptera: Miridae

    Directory of Open Access Journals (Sweden)

    Marcos Roberto Barboza

    2011-12-01

    Full Text Available O percevejo Collaria scenica (Hemiptera: Miridae é uma praga de cereais cultivados e pastagens, e o controle microbiano é uma alternativa para manter estas populações abaixo do nível de dano econômico. O presente trabalho teve como objetivo avaliar a patogenicidade do isolado CG 460 de Beauveria bassiana sobre este percevejo. Insetos adultos foram inoculados em laboratório com cinco concentrações de conídios (1,0x105; 1,0x106; 1,0x107; 1,0x108 e 1,0x109 conídios.mL-1 e alimentados com folhas de trigo. A mortalidade total e confirmada (conidiogênese sobre os insetos mortos foram avaliadas durante seis dias consecutivos. O isolado apresentou alta capacidade infectiva sobre o mirideo, com mortalidade total variando de 40 a 90%. A mortalidade confirmada apresentou uma correlação linear positiva com a concentração de conídios. A taxa de conidiogênese nas concentrações mais baixas do inoculo foi em torno de 26%, sendo que nas concentrações maiores os valores chegaram a 70%. O tempo letal 50 para a concentração 109 foi de 4,3 dias.AbstractThe grass bug, Collaria scenica (Hemiptera: Miridae, is a pest of cereal crops and pastures, and the microbial control is an alternative to maintain the pest population below economic injury level. The present work had the objective to assess the pathogenicity isolate CG460 of Beauveria bassiana against this grass bug. Adult insects had been inoculated in laboratory with five conidia concentrations (1.0x105, 1.0x106, 1.0x107, 1.0x108, 1.0x109 conidia.mL-1, and fed with wheat leaves. Total and confirmed mortality (sporulation on the dead insects had been assessed during six consecutive days. CG460 showed high virulency on the grass bug, with the total mortality ranged from 40 to 90%. Confirmed mortality presented positive and linear correlation with the conidia concentrations. The conidiogenesis rates in the lowest concentrations of inoculum were around 26%, being that in the highest

  11. Virulencia de Beauveria bassiana y Metarhizium anisopliae sobre picudo del nopal Metarnasius spinolae

    OpenAIRE

    Orduño Cruz, Nuvia

    2012-01-01

    El picudo del nopal (Metamasius spinolae), es uno de los principales factores limitantes de la producción comercial de nopal en Tlalnepantla Morelos. El control de plagas se basa en insecticidas y el uso de nuevas alternativas como los hongos entomopatógenos ha sido poco estudiada. Con el objeto de seleccionar aislamientos de las especies B. bassiana y M. anisopliae para el control del picudo del nopal se evaluaron seis aislamientos de B. bassiana y dos de M. anisopliae en...

  12. Estimation of Median Lethal Concentration of Three Isolates of Beauveria bassiana for Control of Megacopta cribraria (Heteroptera: Plataspidae) Bioassayed on Solid Lygus spp. Diet.

    Science.gov (United States)

    Portilla, Maribel; Jones, Walker; Perera, Omaththage; Seiter, Nick; Greene, Jeremy; Luttrell, Randall

    2016-01-01

    The kudzu bug, Megacopta cribraria (F.), is an urban nuisance and significant agricultural pest. The median lethal concentrations of three strains of Beauveria bassiana (Balsamo), including the Mississippi Delta native strain (NI8) isolated from Lygus lineolaris (Palisot de Beauvois), the commercial strain BotaniGard(®) (GHA) (Victor, NY, USA), and the B. bassiana strain isolated from M. cribraria (KUDSC), were estimated on kudzu bug adults. A technique developed to evaluate B. bassiana against L. lineolaris was used. Younger adults (eight days after collection) were treated with NI8 and GHA and older adult (50 days after collection) were treated with NI8, GHA and KUDSC. Higher concentrations (n × 10⁶, n × 10⁷) of NI8 and GHA caused kudzu bug mortality two days after treatment in younger adults and similar concentrations of NI8, GHA, and KUDSC caused mortality one day after treatment in older adults. Lower concentrations (n × 10⁴, n × 10⁵) were not significantly different in mortality between strains. LS50 values of the KUDSC were significantly lower than NI8 and GHA values in older adults. This is the first available information on median lethal concentration of B. bassiana on kudzu bug adults bioassayed on artificial diet. It was determined that B. bassiana (KUDSC and NI8) are highly effective for young adults at very low doses (LC50 1.98-4.98 viable spores per mm²). PMID:27376335

  13. Anopheline and culicine mosquitoes are not repelled by surfaces treated with the entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Mnyone Ladslaus L

    2010-08-01

    Full Text Available Abstract Background Entomopathogenic fungi, Metarhizium anisopliae and Beauveria bassiana, are promising bio-pesticides for application against adult malaria mosquito vectors. An understanding of the behavioural responses of mosquitoes towards these fungi is necessary to guide development of fungi beyond the 'proof of concept' stage and to design suitable intervention tools. Methods Here we tested whether oil-formulations of the two fungi could be detected and avoided by adult Anopheles gambiae s.s., Anopheles arabiensis and Culex quinquefasciatus. The bioassays used a glass chamber divided into three compartments (each 250 × 250 × 250 mm: release, middle and stimulus compartments. Netting with or without fungus was fitted in front of the stimulus compartment. Mosquitoes were released and the proportion that entered the stimulus compartment was determined and compared between treatments. Treatments were untreated netting (control 1, netting with mineral oil (control 2 and fungal conidia formulated in mineral oil evaluated at three different dosages (2 × 1010, 4 × 1010 and 8 × 1010 conidia m-2. Results Neither fungal strain was repellent as the mean proportion of mosquitoes collected in the stimulus compartment did not differ between experiments with surfaces treated with and without fungus regardless of the fungal isolate and mosquito species tested. Conclusion Our results indicate that mineral-oil formulations of M. anisopliae and B. bassiana were not repellent against the mosquito species tested. Therefore, both fungi are suitable candidates for the further development of tools that aim to control host-seeking or resting mosquitoes using entomopathogenic fungi.

  14. A protocol for determination of conidial viability of the fungal entomopathogens Beauveria bassiana and Metarhizium anisopliae from commercial products.

    Science.gov (United States)

    Oliveira, Daian Guilherme Pinto; Pauli, Giuliano; Mascarin, Gabriel Moura; Delalibera, Italo

    2015-12-01

    Techniques for directly determining conidial viability have widespread use but also have limitations for quality control assessments of formulated mycoinsecticides, especially in emulsifiable oil. This study proposes a new method based on adaptations of already established protocols that use the direct viability method to make it more economical and accurate, thus enabling its use in the evaluation of formulated products. Appropriate parameters and conditions were defined using products based on Beauveria bassiana and Metarhizium anisopliae in the forms of pure conidia, fungus-colonized rice, ground fungus-colonized rice and oil dispersion. The established protocol, named ESALQ, consists of the transfer of 150 μL of a suspension containing about 0.7 and 1 × 10(6) conidia/mL onto Rodac® plates with 5 mL of potato dextrose agar culture medium + 5 mg/L of Pentabiotic® and 10 μL/L of Derosal® (Carbendazim) and subsequent counting of germinated and non-germinated conidia. For the ground fungus-colonized rice and oil dispersion formulations, prior to transferring the fungal suspension to the medium, rice should be decanted and the oil removed, respectively. This method was compared with another direct viability method and with the Colony-forming unit (CFU) and Fluorescence viability methods, comparing the accuracy obtained using the coefficient of variation (CV) of the analysis of each method. The results showed that in addition to the ease of application, the developed method has higher accuracy than the other methods (with a CV up to seven times lower than in the Standard method and up to 32 times lower than CFU). The CFU method underestimated the concentration of viable conidia in most of the tested fungal forms, and in the emulsifiable oil products, these values were 54% lower for B. bassiana and 84% lower for M. anisopliae. The adaptations and standardizations proposed in the ESALQ method showed effective improvements for routine quality assessment of

  15. Bacillus thuringiensis Cry3Aa toxin increases the susceptibility of Crioceris quatuordecimpunctata to Beauveria bassiana infection

    Science.gov (United States)

    The spotted asparagus beetle, Crioceris quatuordecimpunctata (Coleoptera: Chrysomelidae), is one of the most devastating pests of asparagus in China and elsewhere. In this study, we investigated the interaction of Bacillus thuringiensis (Bt) Cry3Aa toxin and the entomopathogenic fungus Beauveria bas...

  16. The entomopathogenic fungal endophytes Purpureocillium lilacinum (formerly Paecilomyces lilacinus and Beauveria bassiana negatively affect cotton aphid reproduction under both greenhouse and field conditions.

    Directory of Open Access Journals (Sweden)

    Diana Castillo Lopez

    Full Text Available The effects of two entomopathogenic fungal endophytes, Beauveria bassiana and Purpureocillium lilacinum (formerly Paecilomyces lilacinus, were assessed on the reproduction of cotton aphid, Aphis gossypii Glover (Homoptera:Aphididae, through in planta feeding trials. In replicate greenhouse and field trials, cotton plants (Gossypium hirsutum were inoculated as seed treatments with two concentrations of B. bassiana or P. lilacinum conidia. Positive colonization of cotton by the endophytes was confirmed through potato dextrose agar (PDA media plating and PCR analysis. Inoculation and colonization of cotton by either B. bassiana or P. lilacinum negatively affected aphid reproduction over periods of seven and 14 days in a series of greenhouse trials. Field trials were conducted in the summers of 2012 and 2013 in which cotton plants inoculated as seed treatments with B. bassiana and P. lilacinum were exposed to cotton aphids for 14 days. There was a significant overall effect of endophyte treatment on the number of cotton aphids per plant. Plants inoculated with B. bassiana had significantly lower numbers of aphids across both years. The number of aphids on plants inoculated with P. lilacinum exhibited a similar, but non-significant, reduction in numbers relative to control plants. We also tested the pathogenicity of both P. lilacinum and B. bassiana strains used in the experiments against cotton aphids in a survival experiment where 60% and 57% of treated aphids, respectively, died from infection over seven days versus 10% mortality among control insects. Our results demonstrate (i the successful establishment of P. lilacinum and B. bassiana as endophytes in cotton via seed inoculation, (ii subsequent negative effects of the presence of both target endophytes on cotton aphid reproduction using whole plant assays, and (iii that the P. lilacinum strain used is both endophytic and pathogenic to cotton aphids. Our results illustrate the potential of

  17. The effect of Mirabilis jalapa leaves biopesticide treatment on the mycelium growth of entomopathogenic fungi Beauveria bassiana inside the larvae body Crocidolomia binotalis

    Science.gov (United States)

    Pramita, Mia; Anggraeni, Tjandra

    2015-09-01

    Pest control with biological method (biopesticide and entomopathogenic fungi) is an alternative program to reduce application of chemical insecticide. Biopesticide of Mirabilis jalapa leaves has been discovered rich in secondary metabolites which has antifeedant activity that can provide physiological interference in insect larvae and the generation numbers[1]. Entomopathogenic fungi Beauveria bassiana has potential to control pest populations[2]. The growth of mycelium B. bassiana may interfere metabolism process inside the host body. Otherwise, B. bassiana produce toxins such as beauvericin that can increase mortality of pest. Combination of M. jalapa and B. bassiana reduce LT50 on C. binotalis larvae[3]. Thus, this study aims to determine influence of provision of biopesticide M. jalapa leaves on growth of mycelium entomopathogenic fungi B. bassiana inside larvae body C. binotalis and to detect the presence of beauvericin in vivo. Third instar larvae of C. binotalis were divided into a control, fungal and combination group. The combination group was given biopesticide and fungi. The concentration of biopesticide was 0.8% (w/v) and concentration of fungi spores was 107 spores/ml. Spores (vol. 5µl) done topically to larvae in interval 6 hours after treatment of biopesticide on non-pesticide cabbage leaves. Afterwards, histological observations performed at 24, 48, 72, 96 hours after treatment. The result show of emergence hyphae and mycelium growth inside lumen of larvae midgut on combination group faster than fungal group. This is thought to be caused by the influence of secondary metabolites of biopesticide M. jalapa leaves. In addition, beauviricin is detectable both of fungal and combination group. Thus, it can be concluded that treatment of biopesticide from M. jalapa leaves can accelerate on growth of mycelium entomopathogenic fungi B. bassiana inside the larvae body C. binotalis and toxic of B. bassiana such as beauvericin was detected on fungal and

  18. External development of the entomopathogenic fungi Beauveria bassiana and Metarhizium anisopliae in the subterranean termite Heterotermes tenuis Desenvolvimento dos fungos entomopatogênicos Beauveria bassiana E Metarhizium anisopliae no cupim subterrâneo Heterotermes tenuis

    Directory of Open Access Journals (Sweden)

    Alcides Moino Jr.

    2002-06-01

    Full Text Available The subterranean termite Heterotermes tenuis is one of the main pests of sugarcane and eucalyptus in Brazil, and the use of entomopathogenic fungi, alone or associated to chemicals, is an efficient and environmentally favorable method for its control. Studies related to the fungal development on these insects are important due to the effect of insect behavior on entomopathogens. The objective of this work was to describe the external development of Beauveria bassiana and Metarhizium anisopliae on H. tenuis using Scanning Electron Microscopy (SEM, determining the duration of the different phases of fungal infection. Two fixation techniques for preparing SEM samples were also evaluated. Worker specimens of H. tenuis were inoculated with a 1 x 10(9 conidia mL-1 suspension of the fungi and maintained at 25±1ºC and 70±10% relative humidity. Insects were collected from 0 to 144 hours after inoculation and prepared on SEM stubs for each of the two fixation techniques. The results obtained with the two techniques were compared and duration of the different phases of the infection process were estimated from SEM observations and compared for three fungal isolates. B. bassiana and M. anisopliae have similar development cycles on the termite, but some important differences exist. The penetration, colonization and conidiogenesis phases are relatively faster for M. anisopliae than for B. bassiana, which results in a faster rate of insect mortality. The fixation technique with OsO4 vapor is suitable for preparation of insects to be used in SEM observation of the developmental stages of entomopathogenic fungi.O cupim subterrâneo Heterotermes tenuis , uma das principais pragas da cana-de-açúcar e eucalipto no Brasil, e o uso de fungos entomopatogênicos, isoladamente ou associados a produtos químicos, é um método eficiente e ambientalmente seguro para seu controle. Estudos relacionados ao desenvolvimento fúngico nestes insetos são importantes devido

  19. Synergistic interaction between the fungus Beauveria bassiana and desiccant dusts applied against poultry red mites (Dermanyssus gallinae).

    Science.gov (United States)

    Steenberg, Tove; Kilpinen, Ole

    2014-04-01

    The poultry red mite, Dermanyssus gallinae, is a major pest in egg production, feeding on laying hens. Widely used non-chemical control methods include desiccant dusts, although their persistence under field conditions is often short. Entomopathogenic fungi may also hold potential for mite control, but these fungi often take several days to kill mites. Laboratory experiments were carried out to study the efficacy of 3 types of desiccant dusts, the fungus Beauveria bassiana and combinations of the two control agents against D. gallinae. There was significant synergistic interaction between each of the desiccant dusts and the fungus, with observed levels of mite mortality significantly higher than those expected for an additive effect (up to 38 % higher). Synergistic interaction between desiccant dust and fungus was found also when different application methods were used for the fungus and at different levels of relative humidity. Although increased levels of mortality were reached due to the synergistic interaction, the speed of lethal action was not influenced by combining the two components. The persistence of the control agents applied separately or in combination did not change over a period of 4 weeks. Overall, combinations of desiccant dusts and fungus conidia seem to hold considerable promise for future non-chemical control of poultry red mites. PMID:24253584

  20. Optimization of erythritol and glycerol accumulation in conidia of Beauveria bassiana by solid-state fermentation, using response surface methodology.

    Science.gov (United States)

    Tarocco, Federico; Lecuona, Roberto E; Couto, Alicia S; Arcas, Jorge A

    2005-09-01

    Entomopathogenic fungi are widely produced for use as mycoinsecticides. Therefore, improvement of the shelf life of fungal propagules under good and adverse conditions should be a pre-requisite of their production. In order to improve conidial physiology as well as mycoinsecticide efficiency, culture conditions may be varied. The Doehlert design was used to generate response surfaces with an estimation of the parameters of the quadratic model allowing the study of three different factors at a different number of levels. This experimental design was applied to optimize water activity (aw), pH, and fermentation time for Beauveria bassiana conidial production and accumulation of polyols in solid-state fermentation. Thus, it was possible to identify the region in the experimental range in which the optimum values of these parameters were simultaneously achieved. Maximal conidia production was achieved at pH 5-6 and aw=0.999. Under these conditions, polyol accumulation was 3 mg erythritol/g conidia and 29.6 mg glycerol/g conidia. However, maximal polyol accumulation was achieved at pH 4.5 and aw 0.950; erythritol production increased 33-fold and glycerol production 4.5-fold. Under these conditions conidia production was 1,000 times lower. The possibilities of increasing the quality of the biocontrol agent without neglecting yield are discussed. PMID:15731900

  1. Evaluación de un biorreactor de lecho empacado para el desarrollo del hongo Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Zapata Zapata Arley David

    2003-06-01

    Full Text Available La evaluación del biorreactor de lecho empacado para el desarrollo del hongo Beauveria bassiana se hizo con base en las variables temperatura y concentración de conidias, utilizando un sustrato sólido constituido por trigo entero. Se tomaron como parámetros de operación, la altura del lecho, el flujo de aire y la posición dentro del biorreactor, siendo el tiempo de fermentación un parámetro predeterminado que permitió monitorear las variables y comparar la productividad en el desarrollo del hongo. Se pudo observar, con ayuda de un diseño de experimentos factorial y una prueba de Tukey, que bajo ciertas condiciones de operación como una relación H/D = 0.9 (H: altura del lecho, D: diametro del biorreactor y un flujo de aire de 12.3 L/min, se incrementó significativamente la productividad del hongo con respecto al método tradicional de producción (botellas bajo la escala ensayada, siendo la posición un factor poco significativo en el proceso. Palabras clave: Fermentación en estado sólido, control biológico.

  2. Pathogenicity induced by the entomopathogenic fungi Beauveria bassiana and Metarhizium anisopliae in Agrotisipsilon (Hufn.)

    International Nuclear Information System (INIS)

    Scanning electron microscopy (SEM) allowed to observe B. bassiana and M. anisopliae adhesion and penetration structure on A. ipsilon larvae treated with the Lc50 of the fungus, B. bassiana revealed adhesion and penetration structures in the infected larvae. Growth of the fungus on the infected larvae and signs of hyphal penetration of insect cuticle as well as proliferation of the cuticle were also appeared. On the other hand, the fungus, M. anisopliaeas declared by SEM showed a dense network together and caused the green spores on the insect cuticle. Also, SEM allowed observing the spores and hyphae of the fungus in the body cavity of infected larvae. Scanning electron microscopy is convenient tools to observe the mode of action of entomopathogenic fungi and to observe how they are able to colonize and infect the host.

  3. Estudio de las condiciones de mezclado en fermentador para la producción de blastosporas de Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Cipriano García Gutiérrez

    2013-12-01

    Full Text Available Título en ingles: Study of the mixing conditions in bioreactor for blastospores production of Beauveria bassiana.Resumen: Se caracterizaron tres fermentadores: New Brunswick M-19 de 14 litros, Applikon Biocontroller 1035 de 7 litros y New Brunswick Bioflo III de 7 litros, determinando el coeficiente volumétrico de transferencia de oxígeno (KLa, la retención de gas (RG y el tiempo de mezclado (tM. El fermentador New Brunswick Bioflo III tuvo los mejores valores con una relación de diámetro del impulsor/diámetro del tanque (DI/DT de 0.43, KLa = 9.5-208 h-1 y tM = 1.0-3.0 s, por lo que fue seleccionado para realizar la producción de blastosporas de Beauveria bassiana, utilizando melaza como fuente de carbono. Se estudiaron las condiciones de mezclado, utilizando diferentes combinaciones de impulsores tipo Rushton, Maxflo y Lightnin, bajo un diseño experimental factorial 32. El tiempo de propagación fue de 4 días, el volumen de trabajo 4 litros, 10% de inóculo (1x106 blastosporas/ml, temperatura 30°C, agitación de 400-500 rpm, aireación de 0.5-1.0 vvm, y pH de 5.4.El hongo se desarrolló mejor utilizando la combinación de impulsores Rushton-Maxflo a 400 rpm y 1.0 vvm (F = 10.324, p £ 0.0123 (DMS=0.585, obteniendo una concentración de 1.2x109 blastosporas/ml, 2.2 g/l de biomasa y 2.48 g/l de consumo de sustrato (Y x/s=0.89. Las condiciones de mezclado y los parámetros obtenidos pueden ser aplicados en otros fermentadores para optimizar la producción de blastosporas de B. bassiana en la elaboración experimental de bioinsecticidas.Palabras clave: fermentación líquida, aireación, agitación, hongo entomopatógeno.Abstract: In this work three fermenters were characterized: New Brunswick M-19 of 14 liters, Biocontroller Applikon 1035 of 7 liters and New Brunswick Bioflo III of 7 liters, determining the volumetric coefficient of oxygen transfer (KLa, gas retention (GH and the mixing time (tM. The fermenter New Brunswick Bioflo III

  4. Susceptibilidade de larvas de Cerotoma arcuata Olivier (Coleoptera: Chrysomelidae a Beauveria bassiana (Bals. Vuillemin, Metarhizium anisopliae (Metsch. Sorokin e Bacillus thuringiensis Berliner Susceptibility of Cerotoma arcuata Olivier (Coleoptera: Chrysomelidae larvae to Beauveria bassiana (Bals. Vuillemin, Metarhizium anisopliae (Metsch. Sorokin and Bacillus thuringiensis Berliner

    Directory of Open Access Journals (Sweden)

    Maria Lucia França Teixeira

    2007-02-01

    Full Text Available Larvas de 2° instar de Cerotoma arcuata foram avaliadas em relação à susceptibilidade aos fungos entomopatogênicos Beauveria bassiana, Metarhizium anisopliae e a bactéria Bacillus thuringiensis com as toxinas Cry3. Os insetos adultos foram mantidos em gaiolas e alimentados com plântulas de feijão (Phaseolus vulgaris L. e as larvas em "gerbox" com cotilédones de plântulas de feijão recém-germinadas. Das oito estirpes de B. bassiana avaliadas, CG 156 e CG 213 causaram 100% de mortalidade das larvas, as duas estirpes de M. anisopliae CG 210 e CG 321 foram patogênicas, eliminando 80 e 100% das larvas de C. arcuata, e, das cinco estirpes de B. thuringiensis testadas, o isolado CG 940 causou 70% de mortalidade das larvas.Second instar larvae of Cerotoma arcuata were evaluated concerning the susceptibility to fungi Beauveria bassiana and Metarhizium anisopliae and Bacillus thuringiensis strains containing Cry3 toxin. Adults of C. arcuata were kept in large cages and fed on bean seedlings and the larvae were reared in ‘gearbox’ feeding on germinated Phaseolus bean cotyledons. Strains CG 156 and CG 213 of B. bassiana killed 100% of the insect larvae and strains CG 210 and CG 321 of M. anisopliae killed 80 and 100% of the insect larvae. Strain CG 940 of B. thuringiensis killed 70% of the insect larvae.

  5. Evaluacion del efecto de Beauveria bassiana en el control biológico de Varroa destructor, parasito de la abeja melífera (Apis mellifera en la finca Felisa en el municipio de los Patios, Norte de Santander - Evaluacion del efecto de Beauveria bassiana en el control biológico de Varroa destructor, parasito de la abeja melífera (Apis mellifera en la finca Felisa en el municipio de los Patios, Norte de Santander

    Directory of Open Access Journals (Sweden)

    Francy Liliana Duarte

    2013-08-01

    Full Text Available Beekeeping is an activity that produces significant benefits to agriculture and the environment; Through the pollination action of bees helps to increase productivity as well as biodiversity in the ecosystem. In recent years, has significantly increased prevalence of parasites in this species, particularly the Varroasis, a disease caused by the mite Varroa destructor. The causal agent produces losses between 30% and 50% of total production and in turn can cause damage to the quality of honey by the excessive use of chemicals for disease control and the slow and progressive deterioration health of producers. Noting this, we evaluated the incidence of fungus Beauveria bassiana in natural populations of Varroa destructor in acarofauna associated, and the remains of the hive by pathogenicity tests in laboratory conditions to evaluate the effect of the biocontrol entomopathogenic then enter in apiaries infected with the disease. According to the results obtained in the adult infestation of V. destructor in Apis mellifera Africanized sampling Felisa made on the farm in the municipality of Los Patios, recorded rates of infestation in hives from 3.4% to 8.3% on the infection status of breeding was 4.5% to 13.7%. In laboratory tests it was possible to observe thatthe fungus B. bassiana attacked by an effective control mites without harming bees, propolis and honey allowing the insect to continue their normal activities, controlling the disease in a biological, not chemical.

  6. Conidia production by Beauveria bassiana (for the biocontrol of a diamondback moth) during solid-state fermentation in a packed-bed bioreactor.

    Science.gov (United States)

    Kang, S W; Lee, S H; Yoon, C S; Kim, S W

    2005-01-01

    Conidia of Beauveria bassiana CS-1, which have the potential for the control of the diamondback moth (Plutella xylostella), were produced by solid-state fermentation (SSF) using a packed-bed bioreactor with rice straw and wheat bran. As the packing density and the bed height were increased, the production of conidia decreased. In a packed-bed bioreactor under no aeration and no addition of polypropylene (PP) foam (control), the total average of conidia was 4.9 x 10(8) g-1. The production of conidia was affected more by the addition of PP foam as an inert support than forced aeration and was approx. 23 times higher than that of the control. The total average of conidia produced by B. bassiana was 1.1-1.2 x 10(10) g-1 . PMID:15703878

  7. Preservation of beauveria bassiana (balsam) vuillemin (moniliales: moniliaceae) pathogenicityagainst the coffee borer in different systems

    OpenAIRE

    T. Bahamón; E. Aycardi; Orozco, J; Marín, P. (Pedro); Bustillo, A.

    2011-01-01

    Este trabajo tiene como objetivo evaluar técnicas de preservación de patogenicidad en el laboratorio, que permitan almacenar por tiempos prolongados cultivos de B. bassiana de manera que se puedan utilizar en la preparación de un producto industrial sin tener que recurrir tan frecuentemente a pases sobre poblaciones de Hypothenemus hampei (Ferrari) (Coleóptera: Scolytidae) para mantener su efectividad en el control de esta plaga. Existen numerosos trabajos sobre la preservación de la viabilid...

  8. Pyrethroid resistance in Anopheles gambiae leads to increased susceptibility to the entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Knols Bart GJ

    2010-06-01

    Full Text Available Abstract Background Entomopathogenic fungi are being investigated as a new mosquito control tool because insecticide resistance is preventing successful mosquito control in many countries, and new methods are required that can target insecticide-resistant malaria vectors. Although laboratory studies have previously examined the effects of entomopathogenic fungi against adult mosquitoes, most application methods used cannot be readily deployed in the field. Because the fungi are biological organisms it is important to test potential field application methods that will not adversely affect them. The two objectives of this study were to investigate any differences in fungal susceptibility between an insecticide-resistant and insecticide-susceptible strain of Anopheles gambiae sensu stricto, and to test a potential field application method with respect to the viability and virulence of two fungal species Methods Pieces of white polyester netting were dipped in Metarhizium anisopliae ICIPE-30 or Beauveria bassiana IMI391510 mineral oil suspensions. These were kept at 27 ± 1°C, 80 ± 10% RH and the viability of the fungal conidia was recorded at different time points. Tube bioassays were used to infect insecticide-resistant (VKPER and insecticide-susceptible (SKK strains of An. gambiae s.s., and survival analysis was used to determine effects of mosquito strain, fungus species or time since fungal treatment of the net. Results The resistant VKPER strain was significantly more susceptible to fungal infection than the insecticide-susceptible SKK strain. Furthermore, B. bassiana was significantly more virulent than M. anisopliae for both mosquito strains, although this may be linked to the different viabilities of these fungal species. The viability of both fungal species decreased significantly one day after application onto polyester netting when compared to the viability of conidia remaining in suspension. Conclusions The insecticide

  9. The entomopathogenic fungus Beauveria bassiana reduces instantaneous blood feeding in wild multi-insecticide-resistant Culex quinquefasciatus mosquitoes in Benin, West Africa

    Directory of Open Access Journals (Sweden)

    Howard Annabel FV

    2010-09-01

    Full Text Available Abstract Background Mosquito-borne diseases are still a major health risk in many developing countries, and the emergence of multi-insecticide-resistant mosquitoes is threatening the future of vector control. Therefore, new tools that can manage resistant mosquitoes are required. Laboratory studies show that entomopathogenic fungi can kill insecticide-resistant malaria vectors but this needs to be verified in the field. Methods The present study investigated whether these fungi will be effective at infecting, killing and/or modifying the behaviour of wild multi-insecticide-resistant West African mosquitoes. The entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana were separately applied to white polyester window netting and used in combination with either a permethrin-treated or untreated bednet in an experimental hut trial. Untreated nets were used because we wanted to test the effect of fungus alone and in combination with an insecticide to examine any potential additive or synergistic effects. Results In total, 1125 female mosquitoes were collected during the hut trial, mainly Culex quinquefasciatus Say. Unfortunately, not enough wild Anopheles gambiae Giles were collected to allow the effect the fungi may have on this malaria vector to be analysed. None of the treatment combinations caused significantly increased mortality of Cx. quinquefasciatus when compared to the control hut. The only significant behaviour modification found was a reduction in blood feeding by Cx. quinquefasciatus, caused by the permethrin and B. bassiana treatments, although no additive effect was seen in the B. bassiana and permethrin combination treatment. Beauveria bassiana did not repel blood foraging mosquitoes either in the laboratory or field. Conclusions This is the first time that an entomopathogenic fungus has been shown to reduce blood feeding of wild mosquitoes. This behaviour modification indicates that B. bassiana could potentially be a new

  10. Evaluation of kinetic parameters of chitinases produced by Beauveria bassiana (Bals. Vuill. / Avaliação de parâmetros cinéticos de quitinases produzidas por Beauveria bassiana (Bals. Vuill.

    Directory of Open Access Journals (Sweden)

    Cristiane Mita

    2008-07-01

    Full Text Available Entomopathogenic fungus Beauveria bassiana is currently used as a biocontrol agent for agricultural pests. The infection process involves extracellular enzymes such as proteases and chitinases that degrade the cuticle of the insects. The objective of this work was to evaluate kinetic parameters of pH, temperature, ionic concentration and time of reaction on chitinases activity. The fungus B. bassiana CG432 was cultivated on coffee berry borer Hypothenemus hampei (Ferrari and the conidia grown on insect were used to prepare the inoculum containing 108conídia/mL. These conidia were inoculated at 1% (v/v in culture liquid medium containing D-glucose (10g, yeast extract (5g, NaNO3 (1,58g, Na2HPO4.7H2O (1,05g, KCl (1g, MgSO4.7H2O (0,6g and KH2PO4 (0,36g per liter. The cultivation was carried at 28°C and 180rpm during 5 days. Culture fluid was obtained by filtration and centrifugation at 8.000g, and the chitinases were isolated and concentrated by ultrafiltration using 10 and 100kDa cut off membranes under nitrogen pressure. Chitinase activity was detected and quantified using N-acetylglucosamine released by hydrolysis of colloidal chitin at 40 to 60ºC, at 50, 100 and 200 mM ionic concentrations of buffers sodium acetate (pH 4.0 to 6.0; sodium phosphate (pH 6.0 to 8.0; and Glycine-NaOH (pH 8.0 to 10.0 during 60 minutes. Maximum chitinase activity was at 45ºC and pH 5.5, and was also high at pH 6.0 and pH 8.5 using 50mM buffer. The chitinase activity increased and was stable during an hour at optimum conditions of the reaction, shown the stable nature of this enzyme.Beauveria bassiana é um fungo entomopatogênico utilizado no controle biológico de insetos-praga que infestam produtos agrícolas. O mecanismo de infecção envolve a produção de enzimas extracelulares, como proteases e quitinases que degradam a cutícula dos insetos. O objetivo deste trabalho foi avaliar parâmetros cinéticos de pH, temperatura, concentração iônica e tempo de

  11. Endophytic Ability of Different Isolates of Entomopathogenic Fungi Beauveria bassiana (Balsamo) Vuillemin in Stem and Leaf Tissues of Maize (Zea mays L.).

    Science.gov (United States)

    Renuka, S; Ramanujam, B; Poornesha, B

    2016-06-01

    The present study was conducted to examine the ability of six promising indigenous isolates of Beauveria bassiana (NBAII-Bb-5a, 7, 14, 19, 23 and 45) as an endophyte in maize stem and leaf tissues. Maize seedlings (var. Nithyashree) were inoculated with conidial suspensions and were examined for endophytic establishment in leaf and stems at different intervals during 15-90 days after treatment. All six isolates showed colonization in stem and leaf tissues with varying abilities of colonization and persistence. The mean percent colonization ranged from 7.41 to 20.37 % in older stem tissues and 3.70 to 21.29 % in young stem tissues and in leaf, it ranged from 6.46 to 27.78 % in older leaf tissues and 11.11 to 26.85 % in young leaf tissues. Among six isolates tested, Bb-23 isolate recorded the maximum mean colonization in older stem (20.37 %), older leaf (27.78 %) and in young stem (21.29 %). Bb-5a isolate showed maximum mean colonization in young leaf tissues (26.85 %). Persistence of inoculated fungal isolates decreased with increase in age of the plant. No physical symptoms of damage were observed in any of the B. bassiana treated plants. No colonization of B. bassiana was observed in the untreated control maize plants. The results obtained in plating and PCR techniques were similar with regard to the confirmation of endophytic establishment of B. bassiana. This study indicated the possibility of using B. bassiana as an endophyte in maize for management of maize stem borer, Chilo partellus. PMID:27570303

  12. Conclusion on the peer review of the pesticide risk assessment of the active substances Beauveria bassiana strains ATCC-74040 and GHA

    Directory of Open Access Journals (Sweden)

    European Food Safety Authority

    2013-01-01

    Full Text Available The conclusions of the European Food Safety Authority (EFSA following the peer review of the initial risk assessments carried out by the competent authority of the rapporteur Member State Germany, for the pesticide active substances Beauveria bassiana strains ATCC-74040 and GHA are reported. The context of the peer review was that required by Commission Regulation (EC No 2229/2004, as amended by Commission Regulation (EC No 1095/2007 and Commission Regulation (EU No 114/2010. The conclusions were reached on the basis of the evaluation of the representative uses of Beauveria bassiana strains ATCC-74040 and GHA as an insecticide on tomatoes for strain ATCC-74040 and on tomatoes, cucumbers and ornamentals for strain GHA. The reliable endpoints concluded as being appropriate for use in regulatory risk assessment, derived from the available studies and literature in the dossier peer reviewed, are presented. Missing information identified as being required by the regulatory framework is listed. Concerns are identified.

  13. Effect of plant extracts and a disinfectant on biological parameters and pathogenicity of the fungus Beauveria bassiana (Bals.) Vuill. (Ascomycota: Cordycipitaceae).

    Science.gov (United States)

    Martins, C C; Alves, L F A; Mamprim, A P

    2016-06-01

    The fungus Beauveria bassiana is naturally found in poultry houses and causes high rates of mortality in Alphitobius diaperinus. Laboratory and field experiments have shown the potential of this fungus as an insect control agent. However, in poultry houses, bacteria as Salmonella, can be found and have been studied alternative control methods for this pathogen. Thus, this study aimed to evaluate the effect of plant extracts and a disinfectant on the fungus Beauveria bassiana (strain Unioeste 4). Conidial viability, colony-forming unit (CFU) counts, vegetative growth, conidia production, insecticidal activity of the fungus and compatibility were used as parameters in the evaluation of the effect of these products on the fungus. Alcoholic and aqueous extracts of jabuticaba (Myrciaria cauliflora (Mart.), guava (Psidium guajava (L.)), and jambolan (Syzygium cumini (L.), at concentrations of 10% as well as the commercial disinfectant, Peroxitane® 1512 AL, were evaluated at the recommended concentrations (RC), 1:200 (RC), 0.5 RC and 2 RC. There was a negative influence of alcoholic and aqueous extracts of jabuticaba, guava and three dilutions of Peroxitane on the viability of conidia. The CFUs and vegetative growth of the fungus were affected only by the Peroxitane (all dilutions). For conidial production, the aqueous extract of guava had a positive effect, increasing production, while the Peroxitane at the R and RC concentrations resulted in a negative influence. The mortality of A. diaperinus, caused by the fungus after exposure to these products, was 60% for the peracetic acid at 0.5 RC, and above 80% for the extracts. Thus, the results showed that all the extracts and Peroxitane at RC 0.5 are compatible with the fungus B. bassiana Unioeste 4, however only the extracts had a low impact on inoculum potential. PMID:27143049

  14. Populational parameters of Spalangia endius Walker (Hymenoptera: Pteromalidae) on Pupae of Musca domestica L. (Diptera: Muscidae) treated with two strains of Beauveria bassiana (Bals.) Vuil. (Deuteromycetes).

    Science.gov (United States)

    Lecuona, Roberto; Crespo, Diana; La Rossa, Francisco

    2007-01-01

    The parasitoid Spalangia endius Walker is an efficient controller of Dipteran pupae, such as Musca domestica L. The entomopathogenic fungus Beauveria bassiana (Bals.) Vuil. is a regulator of insect populations, including these synanthropic pests. The aim of this work was to explore the possibilities of utilizing both agents in a combined form for the biocontrol of the domestic fly. Recently formed M. domestica pupae were inoculated by immersion in conidia suspension (10(8) conidia/ml) with two strains of B. bassiana (Bb6 and Bb10). The inoculated pupae were offered to the female parasitoid. In one bioassay they were offered pupae inoculated a single day and in other, pupae inoculated the following day as well. In both bioassays non inoculated (control) pupae were offered to the parasitoids until their death. Thirty females of S. endius were used for each strain and bioassay. From the study of the parasitoid offspring, life tables were built and the reproduction net rate (R(0)) and intrinsic natural increase (r(m)) were obtained among other demographic parameters; the parasitism percentages and sex ratios were also analyzed. B. bassiana did not affect significantly the biodemography of the parasitoid when pupae were inoculated a single time. On the other hand the R0 and the rm were smaller than that of the control without the fungus when pupae were inoculated twice, although sporulation was not observed in the cadavers of S. endius. PMID:17934618

  15. Field applications of entomopathogenic fungi Beauveria bassiana and Metarhizium anisopliae F52 (Hypocreales: Clavicipitaceae) for the control of Ixodes scapularis (Acari: Ixodidae).

    Science.gov (United States)

    Stafford, Kirby C; Allan, Sandra A

    2010-11-01

    Two commercial formulations of Beauveria bassiana (Balsamo-Crivelli) Vuillemin were applied to residential sites in Old Lyme, CT, for the control of nymphs of the blacklegged tick, Ixodes scapularis, in 1999 and 2000. The pyrethroid bifenthrin was applied to other premises for comparison with B. bassiana. A wood chip barrier was installed and maintained at six of the treated properties. In 1999, control of I. scapularis nymphs ranged from 74.5 to 83.0% on lawns without wood chips and from 88.9 to 90% on lawns with wood chip barriers. As a control check, no ticks (n = 23) collected at pretreatment or control sites died from B. bassiana, although 15 of 18 nymphs from treated lawns developed mycoses. Control of I. scapularis on the lawns in 2000 with the two B. bassiana products was lower, as follows: 38.0 and 58.7% without the barrier and 56.9 and 55.1% with the wood chip barrier. Posttreatment differences in nymphal numbers between treatments and control were significant (P = 0.005 and P = 0.039, 1999 and 2000, respectively). The bifenthrin provided 86 and 87% control each year, respectively. The application of Metarhizium anisopliae (Metschnikoff) Sorokin strain F52 to 9 residential sites in Westport and Weston, CT, in 2002 provided significant (P = 0.034; P = 0.039) reductions in nymphal tick abundance with 55.6 and 84.6% fewer ticks on lawn and woodland plots, respectively. These results suggest the application of entomopathogenic fungi could provide another approach for the control of I. scapularis nymphs in residential or similar landscapes. PMID:21175060

  16. [Interaction of Metarhizium anisopliae (Metsch.) Sorok., Beauveria bassiana (Bals.) Vuill. and the parasitoid Oomyzus sokolowskii (Kurdjumov) (Hymenoptera: Eulophidae) with larvae of diamondback moth, Plutella xylostella (L.) (Lepidoptera: Plutellidae)].

    Science.gov (United States)

    dos Santos, Hugo J G; Marques, Edmilson J; Barros, Reginaldo; Gondim, Manoel G C

    2006-01-01

    Chemical insecticides are broadly applied to control diamondback moth, Plutella xylostella (L.). Diamondback moth is a major pest of cruciferous worldwide, and resistance of this pest to insecticide has been often reported. Thus, this research investigated the interactions among the fungi Metarhizium anisopliae (Metsch.) Sorok., Beauveria bassiana (Bals.) Vuill., and the larval-pupal parasitoid Oomyzus sokolowskii (Kurdjumov) before and after application of the fungi on DBM larvae offered to the parasitoid. The experiment was carried out at 26+/-l degreeC, 75+/- 5% RH and 12h photophase using a completely randomized design, with eight treatments with six replications each. The isolates E9 of M. anisopliae and ESALQ 447 of B. bassiana, were used at the concentration of 10(7) conidia ml(-1). The results showed that M. anisopliae and B. bassiana reduced the parasitism of P. xylostella by O. sokolowskii. Additive effects were found on the mortality of P. xylostella with the different combinations among the fungi and parasitoid, except for the treatment B. bassiana inoculated 24h before exposition of the larvae to O. sokolowskii. The isolates were more efficacious when applied after exposition of the larvae to the parasitoid. The efficiency of O. sokolowskii was negatively influenced by the presence of the fungi, mainly when the fungi were applied 24h before diamondback's larvae were exposed to the parasitoid. The association of the fungi with the parasitoid presents potential to be tested in field. The use of these natural enemies in the integrated management of P. xylostella may economically improve the cabbage productive system, especially for organic farming. PMID:17348136

  17. Potential of Metarrhizium anisopliae and Beauveria bassiana isolates and Neem oil to control the aphid Lipaphis erysimi (Kalt.) (Hemiptera: Aphididae); Potencial de isolados de Metarhizium anisopliae e Beauveria bassiana e do oleo de Nim no controle do pulgao Lipaphis erysimi (Kalt.) (Hemiptera: Aphididae)

    Energy Technology Data Exchange (ETDEWEB)

    Araujo Junior, Jose M. de; Marques, Edmilson J.; Oliveira, Jose V. de [Universidade Federal Rural de Pernambuco (UFRPE), Recife, PE (Brazil). Dept. de Agronomia - Entomologia], e-mail: jma_junior@yahoo.com.br, e-mail: emar@depa.ufrpe.br, e-mail: vargasoliveira@uol.com.br

    2009-07-15

    This work aimed to determine the efficiency of the entomopathogenic fungi Metarrhizium anisopliae and Beauveria bassiana to control the aphid Lipaphis erysimi (Kalt.) (Hemiptera:Aphididae) in kale Brassica oleracea var acephala D.C., as well as their compatibility with a neem oil formulation (Neemseto{sup R}). Ten isolates of both fungi were tested and the most pathogenic ones were B. bassiana CG001 and M. anisopliae CG30 with 90% and 4.4 days, and 64% and 3.8 days of mortality and median lethal time, respectively. Bioassays with neem at concentrations of 0.5, 1.0 and 2.0% were done either by leaf discs dipping or spraying the aphids on the leaf discs. The neem spraying treatment at 2.0% provided 90% mortality. The use of B. bassiana isolate CG001 or M. anisopliae isolate CG30 with neem at 0.125, 0.25, and 0.5%, demonstrated that these isolates could have their spore viability or colony growth affected when exposed to neem concentrations higher than 0.25%. In absolute values, the isolates B. bassiana CG001 and M. anisopliae CG30 are the most virulent to L. erysimi, and could be utilized in the management of this pest. (author)

  18. Seleção de isolados de Metarhizium anisopliae e Beauveria bassiana patogênicos a soldados de Atta bisphaerica e Atta sexdens rubropilosa em condições de laboratório Selection of Metarhizium anisopliae and Beauveria bassiana isolates pathogenic to Atta bisphaerica and Atta sexdens rubropilosa soldiers under laboratory conditions

    OpenAIRE

    Alzimiro Marcelo Conteiro Castilho; Marcelo Elias Fraga; Elen de Lima Aguiar-Menezes; Carlos Alberto da Rocha Rosa

    2010-01-01

    As formigas do gênero Atta são pragas importantes de diversas culturas agrícolas, pastagens e reflorestamentos. Os fungos entomopatogênicos estão entre os fatores naturais de mortalidade dessas formigas e por isso apresentam potencial para serem usados no controle biológico dessa praga. O presente trabalho teve como objetivo selecionar isolados de Metarhizium anisopliae e Beauveria bassiana patogênicos a soldados de Atta bisphaerica e Atta sexdens rubropilosa em condições de laboratório. Para...

  19. Identification of proteases produced by entomopathogenic fungi Beauveria bassiana (Bals) Vuill. strain CG432 previously activated in coffee berry borer alive (Hypothenemus hampei)
    Identificação de proteases produzidas pelo fungo entomopatogênico Beauveria bassiana (Bals) Vuill. Cepa CG432 previamente ativada em insetos vivos de broca do café ((Hypothenemus hampei))

    OpenAIRE

    Luiz Filipe Protásio Pereira; Diogo Maciel de Magalhães; Humberto Josué de Oliveira Ramos; Dalva Trevisan; Eliana Tiemi Ito; Jurandir Pereira Pinto; Vanessa Hitomi Sugahara; Geni Silva Varéa; Jakeliny Akemi Yamamoto Oliveira

    2012-01-01

    Conídios de fungos entomopatogênicos atravessam o exoesqueleto do inseto pela ação mecânica do tubo germinativo e produção de múltiplas isoformas de proteases, quitinases e lipases em resposta à composição da cutícula do inseto. Desta forma o objetivo deste trabalho foi extrair, purificar e caracterizar a estrutura de proteases produzidas em cultivo submerso por Beauveria bassiana CG432 previamente ativada em adultos vivos de broca-do-café (Hypothenemus hampei). Uma suspensão contendo 106 con...

  20. Regulative roles of glutathione reductase and four glutaredoxins in glutathione redox, antioxidant activity, and iron homeostasis of Beauveria bassiana.

    Science.gov (United States)

    Zhang, Long-Bin; Tang, Li; Ying, Sheng-Hua; Feng, Ming-Guang

    2016-07-01

    Multiple glutaredoxins (Grx) and glutathione reductase (Glr) are vital for the thiol-disulfide redox system in budding yeast but generally unexplored in filamentous fungi. Here we characterized the Beauveria bassiana redox system comprising dithiol Grx1, monothiol Grx2-4, Grx-like Grx5, and Glr orthologue. Each grx or glr deletion was compensated by increased transcripts of some other grx genes in normal cultures. Particularly, grx3 compensated the absence of grx1, grx2, grx5, or glr under oxidative stress while its absence was compensated only by undeletable grx4 under normal conditions but by most of other undeleted grx and glr genes in response to menadione. Consequently, the redox state was disturbed in Δglr more than in Δgrx3 but not in Δgrx1/2/5. Superoxide dismutases were more active in normal Δgrx1-3 cultures but less in Δgrx5 or Δglr response to menadione. Total catalase activity increased differentially in all the mutant cultures stressed with or without H2O2 while total peroxidase activity decreased more in the normal or H2O2-stressed culture of Δglr than of Δgrx3. Among the mutants, Δgrx3 showed slightly increased sensitivity to menadione or H2O2; Δglr exhibited greater sensitivity to thiol-oxidizing diamide than thiol-reducing 1-chloro-2,4-dinitrobenzene as well as increased sensitivity to the two oxidants. Intriguingly, all the mutants grew slower in a Fe(3+)-inclusive medium perhaps due to elevated transcripts of two Fe(3+) transporter genes. More or fewer phenotypes linked with biocontrol potential were altered in four deletion mutants excluding Δgrx5. All the changes were restored by targeted gene complementation. Overall, Grx3 played more critical role than other Grx homologues in the Glr-dependent redox system of the fungal entomopathogen. PMID:26969041

  1. 球孢白僵菌液体制剂研究%The Study on A Liquid Preparation of Beauveria Bassiana

    Institute of Scientific and Technical Information of China (English)

    朱天辉; 杨世璋; 李远翔

    2001-01-01

    Effects of different media and fermentative conditions on the production of spores and cumulation of mycelial substence for Beauveria bassiana were studied by means of liquid fermentation. The results show that Beauveria bassiana does not produce blastospores on five media except for the medium (substitute code D) which contains 5% waste sugar, 1% corn abstract, and 0.1% K2HPO4, meanwhile, the D-medium, on which Beauveria bassiana grows well and produces bigger spores, is regarded as a ideal liquid carrier. The optimal fermentative conditions are as follows: temperature 25~30℃, pH6.0~7.0, Vibrating time 96hr, and not excess 1/6 flak volume as ventilation index.%通过液体发酵试验,研究了不同营养基质、不同发酵条件对球孢白僵菌液生分生孢子、芽孢子、干物质积累的影响,结果显示:在5种培养基中,除“糖蜜5%、玉米浸提液1%、K2HPO4 0.1%”(代号D)外,其它均不产生芽孢子,以D配方生物量最高,孢子较大,为本试验选出的液体制剂的理想载体,最佳发酵条件为温度25~30℃,pH6.0~7.0,通气量以瓶装培养液量为指标不超过1/6瓶装量,发酵时间以96小时为佳。白僵菌液体制剂的理想载体与最佳发酵条件的组合可使白僵菌液生分生孢子达2.5×1010左右,超过了目前四川固体发酵的生产水平。

  2. Advances and Perspectives of the use of the entomopathogenic fungi beauveria bassiana and metarhizium anisopliae for the control of arthropod pests in poultry production

    Directory of Open Access Journals (Sweden)

    DGP Oliveira

    2014-03-01

    Full Text Available Global poultry production is plagued by a wide variety of arthropods. The problems associated with their chemical control have led to an increasing search for control alternatives, and entomopathogenic fungi seem to be a promising strategy. Despite the large number of insects and mites considered as important pests in animal production, studies on the use of entomopathogenic fungi for their control are still scarce compared with agricultural pests, particularly in Brazil. This article reviews some damages and control aspects of the main arthropod pests that affect Brazilian poultry production, including house flies, lesser mealworms, and feather mites, by the use of the entomopathogenic fungi Beauveria bassiana and Metarhizium anisopliae. Studies published in the last 20 years were reviewed, and the main problems and limitations of that pest-control strategy are discussed.

  3. Natural Occurrence of Beauveria bassiana (Balsamo Vuillemin (Hyphomycetes: Moniliales on Anticarsia gemmatalis Hübner (Lepidoptera: Noctuidae in the State of Mato Grosso do Sul

    Directory of Open Access Journals (Sweden)

    Camila Rossoni

    2013-07-01

    Resumo. Relata-se a ocorrência natural de um fungo entomopatogênico sobre a lagarta Anticarsia gemmatalis Hübner (Lepidoptera: Noctuidae em uma área de soja convencional situada no município de Dourados, Mato Grosso do Sul. A lagarta foi coletada a campo e levada ao laboratório de microbiologia da Universidade Federal da Grande Dourados (UFGD, onde permaneceu em câmera úmida por aproximadamente 7 dias. Posteriormente, o fungo foi isolado em meio de cultura (BDA para identificação da espécie do entomopatógeno. O fungo foi identificado como Beauveria bassiana (Balsamo Vuillemin (Hyphomycetes: Moniliales e, isso representa o primeiro registro de parasitismo, dessa espécie, sobre a lagarta-da-soja no Estado de Mato Grosso do Sul.

  4. Genetic improvement of the nematicidal fungus Lecanicillium attenuatum against Heterodera glycines by expression of the Beauveria bassiana Cdep1 protease gene.

    Science.gov (United States)

    Xie, Ming; Zhang, Yan-Jun; Zhang, Xiao-Lin; Peng, De-Liang; Yu, Wen-Bin; Li, Qian

    2016-07-01

    Lecanicillium attenuatum is an important nematophagous fungus with potential as a biopesticide against plant-parasitic nematodes. The Pr1A-like cuticle-degrading protease (Cdep1) gene originating from the entomopathogenic fungus Beauveria bassiana was transformed into the nematophagous fungus L. attenuatum using a polyethylene-glycol mediated protoplast-based transformation system. Protease activity was increased 0.64- to 1.63-fold 2-10d after growth in the transformed L. attenuatum. Inhibition of egg-hatching and J2 motility of soybean cyst nematodes (Heterodera glycines) by cell-free fungal culture filtrates were enhanced by 17-76% 2-14d and 43-152% 1-13d after incubation, respectively. PMID:27342597

  5. An entomopathogenic strain of Beauveria bassiana against Frankliniella occidentalis with no detrimental effect on the predatory mite Neoseiulus barkeri: evidence from laboratory bioassay and scanning electron microscopic observation.

    Directory of Open Access Journals (Sweden)

    Shengyong Wu

    Full Text Available Among 28 isolates of Beauveria bassiana tested for virulence against F. occidentalis in laboratory bioassays, we found strain SZ-26 as the most potent, causing 96% mortality in adults at 1×10(7 mL(-1conidia after 4 days. The effect of the strain SZ-26 on survival, longevity and fecundity of the predatory mite Neoseiulus (Amblyseius barkeri Hughes were studied under laboratory conditions. The bioassay results showed that the corrected mortalities were less than 4 and 8% at 10 days following inoculation of the adult and the larvae of the predator, respectively, with 1×10(7 conidia mL(-1 of SZ-26. Furthermore, no fungal hyphae were found in dead predators. The oviposition and postoviposition durations, longevity, and fecundity displayed no significant differences after inoculation with SZ-26 using first-instar larvae of F. occidentalis as prey in comparison with untreated predator. In contrast, the preoviposition durations were significantly longer. Observations with a scanning electron microscope, revealed that many conidia were attached to the cuticles of F. occidentalis at 2 h after treatment with germ tubes oriented toward cuticle at 24 h, penetration of the insect cuticle at 36 h, and finally, fungal colonization of the whole insect body at 60 h. In contrast, we never observed penetration of the predator's cuticle and conidia were shed gradually from the body, further demonstrating that B. bassiana strain SZ-26 show high toxicity against F. occidentalis but no pathogenicity to predatory mite.

  6. The effect of leaf biopesticide (Mirabilis jalapa) and entomopathogenic fungi (Beauveria bassiana) combinations to some physiological characters and histology of Crocidolomia pavonana (Lepidoptera: Pyralidae) larvae

    Science.gov (United States)

    Sirajuddin, Nur Tasmiah; Anggraeni, Tjandra

    2014-03-01

    Crocidolomia pavonana is one of the most prominent pest that cause damage to vegetables especially Brassicaceae such us cabbage, broccoli, mustard greens and turnips, these vegetable have been widely consumed and cultivated in Indonesia. The invation of this pest might created high risk of cultivated failure. Enviromentally pest control efforts by utilizing biological control agents such us biopesticides of plants and entomopathogenic fungi have been carried out, but the work was relatively long and strongly influenced by environmental factors. The purpose of this study was to combine biopesticide of Mirabilis jalapa and entomopathogenic fungi Beauveria bassiana to look at mortality of C. pavonana larvae observing by histological incision and scanning electron microscope. Concentration treatments of extracts M. jalapa was (control; 0,1; 0,2; 0,4 and 0,8 gr/ml) and the result showed that the effective concentration was 0,8 g/ml which affect significantly (PHistological incision observed at hour 24, 48, 72 and 96, where the biggest damage occurred at hour 96. Observation by scanning electron microscope showed fungus spores that attach to the body surface of larvae subsequently penetrate into the body. Thus the combination use of biopesticides M. jalapa and fungi B. bassiana, can be used as an alternative pest control C. pavonana.

  7. The effect of leaf biopesticide (Mirabilis jalapa) and entomopathogenic fungi (Beauveria bassiana) combinations to some physiological characters and histology of Crocidolomia pavonana (Lepidoptera: Pyralidae) larvae

    International Nuclear Information System (INIS)

    Crocidolomia pavonana is one of the most prominent pest that cause damage to vegetables especially Brassicaceae such us cabbage, broccoli, mustard greens and turnips, these vegetable have been widely consumed and cultivated in Indonesia. The invation of this pest might created high risk of cultivated failure. Enviromentally pest control efforts by utilizing biological control agents such us biopesticides of plants and entomopathogenic fungi have been carried out, but the work was relatively long and strongly influenced by environmental factors. The purpose of this study was to combine biopesticide of Mirabilis jalapa and entomopathogenic fungi Beauveria bassiana to look at mortality of C. pavonana larvae observing by histological incision and scanning electron microscope. Concentration treatments of extracts M. jalapa was (control; 0,1; 0,2; 0,4 and 0,8 gr/ml) and the result showed that the effective concentration was 0,8 g/ml which affect significantly (P<0,05) in reduce pupa weight, improve pupasi time, lowering percentage of emergence imago and improve the long phase of pupa which differ significantly with control. The combination of biopesticides proved to accelerate the mortality of larvae. Histological incision observed at hour 24, 48, 72 and 96, where the biggest damage occurred at hour 96. Observation by scanning electron microscope showed fungus spores that attach to the body surface of larvae subsequently penetrate into the body. Thus the combination use of biopesticides M. jalapa and fungi B. bassiana, can be used as an alternative pest control C. pavonana

  8. The effect of leaf biopesticide (Mirabilis jalapa) and entomopathogenic fungi (Beauveria bassiana) combinations to some physiological characters and histology of Crocidolomia pavonana (Lepidoptera: Pyralidae) larvae

    Energy Technology Data Exchange (ETDEWEB)

    Sirajuddin, Nur Tasmiah, E-mail: nurtasmiah@yahoo.com; Anggraeni, Tjandra, E-mail: nurtasmiah@yahoo.com [Sekolah Ilmu dan Teknologi Hayati - ITB, Jalan Ganesa 10 Bandung (Indonesia)

    2014-03-24

    Crocidolomia pavonana is one of the most prominent pest that cause damage to vegetables especially Brassicaceae such us cabbage, broccoli, mustard greens and turnips, these vegetable have been widely consumed and cultivated in Indonesia. The invation of this pest might created high risk of cultivated failure. Enviromentally pest control efforts by utilizing biological control agents such us biopesticides of plants and entomopathogenic fungi have been carried out, but the work was relatively long and strongly influenced by environmental factors. The purpose of this study was to combine biopesticide of Mirabilis jalapa and entomopathogenic fungi Beauveria bassiana to look at mortality of C. pavonana larvae observing by histological incision and scanning electron microscope. Concentration treatments of extracts M. jalapa was (control; 0,1; 0,2; 0,4 and 0,8 gr/ml) and the result showed that the effective concentration was 0,8 g/ml which affect significantly (P<0,05) in reduce pupa weight, improve pupasi time, lowering percentage of emergence imago and improve the long phase of pupa which differ significantly with control. The combination of biopesticides proved to accelerate the mortality of larvae. Histological incision observed at hour 24, 48, 72 and 96, where the biggest damage occurred at hour 96. Observation by scanning electron microscope showed fungus spores that attach to the body surface of larvae subsequently penetrate into the body. Thus the combination use of biopesticides M. jalapa and fungi B. bassiana, can be used as an alternative pest control C. pavonana.

  9. Proteomic and Phosphoproteomic Insights into a Signaling Hub Role for Cdc14 in Asexual Development and Multiple Stress Responses in Beauveria bassiana

    Science.gov (United States)

    Wang, Zhi-Kang; Wang, Jie; Liu, Jing; Ying, Sheng-Hua; Peng, Xiao-Jun; Feng, Ming-Guang

    2016-01-01

    Cdc14 is a dual-specificity phosphatase that regulates nuclear behavior by dephosphorylating phosphotyrosine and phosphoserine/phosphothreonine in fungi. Previously, Cdc14 was shown to act as a positive regulator of cytokinesis, asexual development and multiple stress responses in Beauveria bassiana, a fungal insect pathogen. This study seeks to gain deep insight into a pivotal role of Cdc14 in the signaling network of B. bassiana by analyzing the Cdc14-specific proteome and phosphoproteome generated by the 8-plex iTRAQ labeling and MS/MS analysis of peptides and phosphopeptides. Under normal conditions, 154 proteins and 86 phosphorylation sites in 67 phosphoproteins were upregulated in Δcdc14 versus wild-type, whereas 117 proteins and 85 phosphorylation sites in 58 phosphoproteins were significantly downregulated. Co-cultivation of Δcdc14 with NaCl (1 M), H2O2 (3 mM) and Congo red (0.15 mg/ml) resulted in the upregulation / downregulation of 23/63, 41/39 and 79/79 proteins and of 127/112, 52/47 and 105/226 phosphorylation sites in 85/92, 45/36 and 79/146 phosphoproteins, respectively. Bioinformatic analyses revealed that Cdc14 could participate in many biological and cellular processes, such as carbohydrate metabolism, glycerophospholipid metabolism, the MAP Kinase signaling pathway, and DNA conformation, by regulating protein expression and key kinase phosphorylation in response to different environmental cues. These indicate that in B. bassiana, Cdc14 is a vital regulator of not only protein expression but also many phosphorylation events involved in developmental and stress-responsive pathways. Fourteen conserved and novel motifs were identified in the fungal phosphorylation events. PMID:27055109

  10. Proteomic and Phosphoproteomic Insights into a Signaling Hub Role for Cdc14 in Asexual Development and Multiple Stress Responses in Beauveria bassiana.

    Science.gov (United States)

    Wang, Zhi-Kang; Wang, Jie; Liu, Jing; Ying, Sheng-Hua; Peng, Xiao-Jun; Feng, Ming-Guang

    2016-01-01

    Cdc14 is a dual-specificity phosphatase that regulates nuclear behavior by dephosphorylating phosphotyrosine and phosphoserine/phosphothreonine in fungi. Previously, Cdc14 was shown to act as a positive regulator of cytokinesis, asexual development and multiple stress responses in Beauveria bassiana, a fungal insect pathogen. This study seeks to gain deep insight into a pivotal role of Cdc14 in the signaling network of B. bassiana by analyzing the Cdc14-specific proteome and phosphoproteome generated by the 8-plex iTRAQ labeling and MS/MS analysis of peptides and phosphopeptides. Under normal conditions, 154 proteins and 86 phosphorylation sites in 67 phosphoproteins were upregulated in Δcdc14 versus wild-type, whereas 117 proteins and 85 phosphorylation sites in 58 phosphoproteins were significantly downregulated. Co-cultivation of Δcdc14 with NaCl (1 M), H2O2 (3 mM) and Congo red (0.15 mg/ml) resulted in the upregulation / downregulation of 23/63, 41/39 and 79/79 proteins and of 127/112, 52/47 and 105/226 phosphorylation sites in 85/92, 45/36 and 79/146 phosphoproteins, respectively. Bioinformatic analyses revealed that Cdc14 could participate in many biological and cellular processes, such as carbohydrate metabolism, glycerophospholipid metabolism, the MAP Kinase signaling pathway, and DNA conformation, by regulating protein expression and key kinase phosphorylation in response to different environmental cues. These indicate that in B. bassiana, Cdc14 is a vital regulator of not only protein expression but also many phosphorylation events involved in developmental and stress-responsive pathways. Fourteen conserved and novel motifs were identified in the fungal phosphorylation events. PMID:27055109

  11. The Pal pathway required for ambient pH adaptation regulates growth, conidiation, and osmotolerance of Beauveria bassiana in a pH-dependent manner.

    Science.gov (United States)

    Zhu, Jing; Ying, Sheng-Hua; Feng, Ming-Guang

    2016-05-01

    The Pal/Rim pathway essential for fungal adaptation to ambient pH has been unexplored in Beauveria bassiana, a classic fungal entomopathogen. Here, we show the characterized Pal pathway comprising transcription factor PacC and upstream six Pal partners (PalA/B/C/F/H/I) in B. bassiana. Their coding genes were all transcribed most abundantly in standard wild-type culture under the alkaline condition of pH 9. Deletion of pacC or each pal gene resulted in a significant delay of culture acidification in a minimal broth (initial pH = 7.3). This delay concurred with altered accumulation levels of intra/extracellular organic acids and drastically depressed expression of some enzyme genes required for the syntheses of oxalic and lactic acids. Our deletion mutants except ΔpalI showed growth defects and maximal sensitivity to NaCl, KCl, LiCl, or sorbitol at pH 9, an alkaline condition leading to fragmented vacuoles in their hyphal cells exposed to osmotic stress. In these mutants, conidiation was significantly facilitated at pH 3 more than at pH 7 but suppressed slightly at pH 9. Mild virulence defects also occurred in the absence of pacC or any pal gene. These changes were restored by targeted gene complementation. Taken together, PacC and Pal partners regulate the growth, conidiation, and osmotolerance of B. bassiana in a pH-dependent manner, highlighting their vitality for the fungal pH response. PMID:26754817

  12. Interaction between TATA-Binding Protein (TBP and Multiprotein Bridging Factor-1 (MBF1 from the Filamentous Insect Pathogenic Fungus Beauveria bassiana.

    Directory of Open Access Journals (Sweden)

    Chi Song

    Full Text Available TATA-binding protein (TBP is a ubiquitous component of eukaryotic transcription factors that acts to nucleate assembly and position pre-initiation complexes. Multiprotein bridging factor 1 (MBF1 is thought to interconnect TBP with gene specific transcriptional activators, modulating transcriptional networks in response to specific signal and developmental programs. The insect pathogen, Beauveria bassiana, is a cosmopolitan fungus found in most ecosystems where it acts as an important regulator of insect populations and can form intimate associations with certain plants. In order to gain a better understanding of the function of MBF1 in filamentous fungi, its interaction with TBP was demonstrated. The MBF1 and TBP homologs in B. bassiana were cloned and purified from a heterologous E. coli expression system. Whereas purified BbTBP was shown to be able to bind oligonucleotide sequences containing the TATA-motif (Kd ≈ 1.3 nM including sequences derived from the promoters of the B. bassiana chitinase and protease genes. In contrast, BbMBF1 was unable to bind to these same target sequences. However, the formation of a ternary complex between BbMBF1, BbTBP, and a TATA-containing target DNA sequence was seen in agarose gel electrophoretic mobility shift assays (EMSA. These data indicate that BbMBF1 forms direct interactions with BbTBP, and that the complex is capable of binding to DNA sequences containing TATA-motifs, confirming that BbTBP can link BbMBF1 to target sequences as part of the RNA transcriptional machinery in fungi.

  13. Ação do fungo Beauveria bassiana associado a gel polimerizado de celulose no controle do carrapato Anocentor nitens em teste de campo Action of the fungus Beauveria bassiana associated with cellulose polymerized gel in the control of the tick Anocentor nitens in a field test

    Directory of Open Access Journals (Sweden)

    E.J. Souza

    2009-02-01

    Full Text Available Foram selecionados 20 equídeos naturalmente infestados por Anocentor nitens, dos quais seus pavilhões auriculares foram submetidos a quatro tratamentos distintos: gel associado a Beauveria bassiana, apenas gel, apenas B. bassiana e um grupo-controle. Procederam-se à contagem e ao registro do número total de fêmeas adultas (>3mm em cada pavilhão auricular, nos dias 0, 1, 4, 7, 11, 14, 18, 21, 25 e 28, para cálculo do percentual de controle. Foram coletadas e mantidas em laboratório 20 fêmeas pertencentes a cada tratamento, para cálculo dos períodos de pré-postura, postura, incubação e eclosão, e peso médio das posturas. No grupo tratado com o composto gel associado a B. bassiana, observou-se percentual de controle maior que 50%, entre o 4º e o 25º dia, assim como decréscimo progressivo do peso médio da postura das fêmeas coletadas no período entre o 7º e 14º dia. Para os outros tratamentos, o percentual de controle manteve-se abaixo de 20%, e o peso da postura não apresentou diferença significativa. Os percentuais de controle, assim como as reduções no peso médio da postura, sugerem que a utilização do composto gel associado a B. bassiana potencializou a virulência do entomopatógeno.Twenty horses naturally infected by Anocentor nitens were selected and their auricular pinna were submitted to four treatments: gel associated with Beauveria bassiana, gel only, B. bassiana only, and a control group. The count and the register of the total number of grown up tick females (>3mm were performed in each auricular pinna on days 0, 1, 4, 7, 11, 14, 18, 21, 25, and 28 for the calculus of percentage of control. Twenty females from each treatment were collected and maintained in laboratory, to calculate the periods of pre-oviposition, oviposition, incubation, and hatching and mean weight of oviposition. In the group treated with the gel associated to B. bassiana, it was observed a control percentage higher than 50% from the 4º

  14. Molecular tracing of white muscardine in the silkworm, Bombyx mori (Linn.) II. Silkworm white muscardine is not caused by artificial release or natural epizootic of Beauveria bassiana in China.

    Science.gov (United States)

    Chen, Xue; Huang, Cui; He, Lingmin; Zhang, Shengli; Li, Zengzhi

    2015-02-01

    The fungal pathogen Beauveria bassiana causes serious economic losses in sericulture. Its origin is usually attributed to the release of B. bassiana insecticides against pine caterpillars (Dendrolimus punctuatus). In the present study, 488 B. bassiana isolates obtained from silkworm (Bombyx mori) collected from 13 Chinese provinces, and 327 B. bassiana isolates obtained from D. punctatus collected from 9 provinces, were analyzed for population genetic structure using the ISSR technique based on genetic distance. A UPGMA dendrogram clustered them into three independent clades: two B. mori clades and one D. punctatus clade. A 3-D principal component analysis further divided them into two completely independent host groups, revealing high host-specificity. This suggested that white muscardine occurring in B. mori populations throughout southern China was not caused by any B. bassiana strain either naturally prevailing in D. punctatus populations or by any strain artificially released as a fungal insecticide against D. punctatus. We further investigated the genetic differentiation coefficient Gst and gene flow between B. mori-pathogenic and D. punctatus-pathogenic B. bassiana isolates from across China and from five provinces inhabited by both B. mori and D. punctatus. The Gst value across China was computed as 0.410, while the values of the five provinces ranged from 0.508 to 0.689; all above 0.25, which is the threshold for significant genetic differentiation. This suggests that B. bassiana strains isolated from the two different hosts maintained their respective heredity without a convergent homogenization trend, and reduces the possibility that the host range of the caterpillar isolates could expand and enhance their virulence in B. mori. These findings indicate that the use of B. bassiana does not threaten the safety of sericulture. PMID:25541121

  15. Selection of optimum conditions of medium acidity and aeration for submerget cultivation of Bacillus thuringiensis and Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    O. A. Dregval

    2010-06-01

    Full Text Available The paper deals with the influence of medium pH and aeration rate on growth and sporulation of Bacillus thuringiensis and Вeauveria bassiana, which are main constituents of the complex microbial insecticide. It was established optimal medium pH for B. thuringiensis – 6.0 and for В. bassiana – 6.0–7.0. The maximum productivity of the studied microorganisms was observed in the same range of aeration – 7– 14 mmol O2/l/h. The selected conditions of cultivation are necessary for the production of complex biological insecticide based on the association of B. thuringiensis and B. bassiana.

  16. Phylogeny and systematics of the anamorphic, entomopathogenic genus Beauveria

    Science.gov (United States)

    Beauveria is a cosmopolitan anamorph genus of arthropod pathogens that includes the agronomically important species B. bassiana and B. brongniartii, which are used as mycoinsecticides for the biological control of pest insects. Recent phylogenetic evidence demonstrates that Beauveria is monophyletic...

  17. Efeitos de Beauveria bassiana (Bals Vuill e Metarhizium anisopliae (Metsc Sorok sobre fêmeas ingurgitadas de Amblyomma cajennense (Fabricius, 1787 em condições de laboratório Effects of Beauveria bassiana (Bals Vuill and Metarhizium anisopliae (Metsc Sorok on engorged females of Amblyomma cajennense (Fabricius, 1787 in laboratory conditions

    Directory of Open Access Journals (Sweden)

    R.C.S. Reis

    2004-12-01

    Full Text Available The in vitro susceptibility of Amblyomma cajennense engorged females to some isolated of the fungus Beauveria bassiana and Metarhizium anisopliae was verified and lethal concentrations (LC 50 and LC 90 were calculated. The females were dived in conidia suspensions for five minutes, and kept in climatically controlled chambers BOD under 27° C and 80% relative humidity. Each bioassay had four treatments in concentrations of 10(5,10(6,10(7e10(8 conidia/ml. A control group was also used. The following characteristics were evaluated: weight and period of oviposition, indexes of reproductive and nutritional efficiency and percentage of microbiological control. A dose dependent negative effect was observed in ticks treated with the suspension. All isolates tested cause a negative effect on in vitro tests of engorged females of A. cajennense, suggesting its potential for microbiological control of tick's species.

  18. Patogenicidade de Beauveria bassiana ao psilídeo Diaphorina citri e compatibilidade do fungo com produtos fitossanitários

    Directory of Open Access Journals (Sweden)

    Ana Paula Ferreira Pinto

    2012-12-01

    Full Text Available O objetivo deste trabalho foi avaliar a patogenicidade de Beauveria bassiana a ninfas de Diaphorina citri (Hemiptera: Psyllidae e verificar a compatibilidade do fungo com produtos fitossanitários e sua persistência em plantas de citros. Ninfas de D. citri foram pulverizadas com B. bassiana, nas concentrações 5x10(6, 1x10(7, 5x10(7, 1x10(8, 5x10(8 e 1x10(9 conídios mL-1, para determinação da concentração letal. Para avaliação da compatibilidade do fungo com produtos fitossanitários, extrato de nim e cinco inseticidas de quatro grupos químicos diferentes foram incorporados individualmente ao meio de cultura BDA em que o fungo foi cultivado. Avaliaram-se o crescimento vegetativo, a esporulação e a viabilidade do entomopatógeno. Plantas de citros, mantidas em casa de vegetação, foram tratadas primeiramente com os produtos fitossanitários e depois com o entomopatógeno. Avaliaram-se os tempos de exposição de 24 horas e de 7 e 14 dias. O fungo foi patogênico às ninfas de D. citri; a CL50 foi de 0,4x10(7 e a CL90 de 6,7x10(7 conidios mL-1, no décimo dia de avaliação. Em laboratório, os produtos fitosssanitários reduzem o crescimento do fungo. Em casa de vegetação, os produtos não afetam a sobrevivência do fungo nas plantas de citros.

  19. Biological Control of the Chagas Disease Vector Triatoma infestans with the Entomopathogenic Fungus Beauveria bassiana Combined with an Aggregation Cue: Field, Laboratory and Mathematical Modeling Assessment.

    Directory of Open Access Journals (Sweden)

    Lucas Forlani

    2015-05-01

    Full Text Available Current Chagas disease vector control strategies, based on chemical insecticide spraying, are growingly threatened by the emergence of pyrethroid-resistant Triatoma infestans populations in the Gran Chaco region of South America.We have already shown that the entomopathogenic fungus Beauveria bassiana has the ability to breach the insect cuticle and is effective both against pyrethroid-susceptible and pyrethroid-resistant T. infestans, in laboratory as well as field assays. It is also known that T. infestans cuticle lipids play a major role as contact aggregation pheromones. We estimated the effectiveness of pheromone-based infection boxes containing B. bassiana spores to kill indoor bugs, and its effect on the vector population dynamics. Laboratory assays were performed to estimate the effect of fungal infection on female reproductive parameters. The effect of insect exuviae as an aggregation signal in the performance of the infection boxes was estimated both in the laboratory and in the field. We developed a stage-specific matrix model of T. infestans to describe the fungal infection effects on insect population dynamics, and to analyze the performance of the biopesticide device in vector biological control.The pheromone-containing infective box is a promising new tool against indoor populations of this Chagas disease vector, with the number of boxes per house being the main driver of the reduction of the total domestic bug population. This ecologically safe approach is the first proven alternative to chemical insecticides in the control of T. infestans. The advantageous reduction in vector population by delayed-action fungal biopesticides in a contained environment is here shown supported by mathematical modeling.

  20. SELECTION OF BEAUVERIA BASSIANA (BALSAMO VUILLEMIN ISOLATES FOR MANAGEMENT OF MYZUS PERSICAE (SULTZAR (HOM.: APHIDAE BASED ON VIRULENCE AND GROWTH RELATED CHARACTERISTICS

    Directory of Open Access Journals (Sweden)

    Mohammad S. Al-alawi

    2014-01-01

    Full Text Available Isolates of the entomopathogenic fungus Beauveria bassiana originated from Jordan were evaluated for their efficacy against the green peach aphid, Myzus persicae under laboratory and greenhouse conditions. Efficacy evaluation involved testing all isolates at a concentration of 1×107 conidia/mL followed by concentration dependent and greenhouse bioassays for the top virulent isolates. Growth characteristics related to virulence were evaluated for high, intermediate and low virulent isolates. Results showed that three isolates namely: BAU004, BAU018 and BAU019 were highly virulent to the aphid in the laboratory causing more than 75% infection. In the greenhouse, the three isolates caused infection from 41.3 to 46.5%. For the growth characteristics, isolate BAU019 produced more spores than the other highly virulent ones including the commercial isolate GHA. Highly virulent isolates also showed faster hyphal growth than low virulent isolates. These findings indicate that isolates BAU004, Bau018 and BAU019 might be developed as commercial microbial insecticides for safe and effective control of green peach aphid.

  1. Impact of two treatments of a formulation of Beauveria bassiana (Deuteromycota: Hyphomycetes) conidia on Varroa mites (Acari: Varroidae) and on honeybee (Hymenoptera: Apidae) colony health.

    Science.gov (United States)

    Meikle, William G; Mercadier, Guy; Holst, Niels; Girod, Vincent

    2008-12-01

    Bee colonies in southern France were treated with conidia (asexual spores) from two strains of Beauveria bassiana, an entomopathogenic fungus. One strain was commercial (GHA) and the other had been isolated from Varroa mites in the region (Bb05002). Objectives were to evaluate treatment effect on colony weight, adult bee mass, capped brood, and on Varroa fall onto sticky boards. Treatments included conidia formulated with either carnauba or candelilla wax powder, candelilla wax powder alone, or control; in two treatment groups formulation was applied a second time after one week. Treatment did not affect colony health. Colonies treated twice with Bb05002 conidia and carnauba wax powder had significantly higher mite fall compared to colonies treated with blank candelilla wax powder. The proportion of fallen mites that were infected in both conidia treatments was higher than controls for 18 days after the second treatment. The number of fungal propagules on the bees themselves remained elevated for about 14 days after the second treatment. These results were compared to published results from previous experiments with regard to infection duration. PMID:18506583

  2. Survival Rate and Transcriptional Response upon Infection with the Generalist Parasite Beauveria bassiana in a World-Wide Sample of Drosophila melanogaster.

    Directory of Open Access Journals (Sweden)

    Francesco Paparazzo

    Full Text Available The ability to cope with infection by a parasite is one of the major challenges for any host species and is a major driver of evolution. Parasite pressure differs between habitats. It is thought to be higher in tropical regions compared to temporal ones. We infected Drosophila melanogaster from two tropical (Malaysia and Zimbabwe and two temperate populations (the Netherlands and North Carolina with the generalist entomopathogenic fungus Beauveria bassiana to examine if adaptation to local parasite pressures led to differences in resistance. Contrary to previous findings we observed increased survival in temperate populations. This, however, is not due to increased resistance to infection per se, but rather the consequence of a higher general vigor of the temperate populations. We also assessed transcriptional response to infection within these flies eight and 24 hours after infection. Only few genes were induced at the earlier time point, most of which are involved in detoxification. In contrast, we identified more than 4,000 genes that changed their expression state after 24 hours. This response was generally conserved over all populations with only few genes being uniquely regulated in the temperate populations. We furthermore found that the American population was transcriptionally highly diverged from all other populations concerning basal levels of gene expression. This was particularly true for stress and immune response genes, which might be the genetic basis for their elevated vigor.

  3. Patogenitas Beberapa Cendawan Entomopatogen (Lecanicillium lecanii, Metarhizium anisopliae, dan Beauveria bassiana)terhadap Aphis glycines pada Tanaman Kedelai

    OpenAIRE

    Widariyanto, Riri

    2016-01-01

    The objectives of the research were to study the effectiveness of entomopatogen’s fungus ( L. Lecanii, M. Anisopliae, and B. bassiana) to Aphis glycines in soybean on field. Research done at Farm of Faculty of Agriculture of University of Sumatera Utara, Medan from December 2015 until Februari 2016. The method used Randomized Block Design by seven treatment that is : P0/control (Instar 4 of Aphis glycines without treatment Entomopathogen), P1 (Instar 2 of Aphis glycines + Lecanicillium lecani...

  4. Soil application of Beauveria bassiana GHA against apple sawfly, Hoplocampa testudinea (Hymenoptera: Tenthredinidae)

    DEFF Research Database (Denmark)

    Świergiel, Weronika; Meyling, Nicolai Vitt; Porcel, Mario;

    2016-01-01

    ) Vuillemin (BotaniGard) against apple sawfly under common organic orchard practices. We also assessed the efficacy of B. bassiana GHA and Metarhizium brunneum Petch (indigenous strain) against sawfly in the laboratory. Larvae treated with either fungus in the laboratory died faster than control larvae and......, but reversion to background levels occurred within a year. It remains to be investigated whether this has a detrimental effect on nontarget organisms. Additional work is needed to bridge the knowledge gap between laboratory and field efficacy in orchards....

  5. Ação do fungo Beauveria bassiana, isolado 986, sobre o ciclo biológico do cascudinho Alphitobius diaperinus em laboratório Action of the fungus Beauveria bassiana, strain 986, over the biologic cycle of the Alphitobius diaperinus beetle in laboratory

    Directory of Open Access Journals (Sweden)

    Aleksandro Schafer da Silva

    2006-12-01

    Full Text Available O presente trabalho foi realizado para verificar a eficácia do fungo Beauveria bassiana em todas as etapas de desenvolvimento de Alphitobius diaperinus e assim saber em que fase ele é mais susceptível ao controle biológico. O fungo B. bassiana, isolado 986, foi testado em duas concentrações (3,4 X 10(6 e 3,4 X 10(8 conídios ml-1 mais um grupo controle. Foram realizadas duas leituras, uma sete e outra quatorze dias após a aplicação dos fungos. Na concentração 3,4 X 10(6, 54% dos ovos tratados estavam inférteis, ocorrendo 54% de mortalidade de larvas tratadas nos estádios I, II e III, 22,5% nos estádios IV, V e VI, 9,5% nos estádios VII e VIII e 24,5% de mortalidade das pupas. Na concentração 3,4 X 10(8, 66,8% dos ovos tratados estavam inviáveis, ocorrendo mortalidade de 56% das larvas tratadas nos estádios I, II e III, 34% nos estádios IV, V e VI, 24,5% nos estádios VII e VIII e 49,5% das pupas. Já no grupo controle, 13,3% dos ovos estavam inviáveis, ocorrendo mortalidade de 10% das larvas nos estádios I, II e III, 4% nos estádios IV, V e VI e 0% de mortalidade nos estádios VII, VIII e em pupas. Sobre o cascudinho adulto, o fungo não teve efeito nocivo em nenhum grupo analisado. Com base nesses resultados, observou-se que o fungo nas concentrações testadas apresentou efeito nocivo às fases do ciclo biológico do cascudinho, com exceção do inseto adulto.The present research was carried out to verify the Beauveria bassiana fungus efficacy in all development phases of Alphitobius diaperinus and to know in which phase it is more susceptible for biologic control. The B. bassiana, 986-isolated fungus, was tested in two different concentrations (3.4 x 10(6 and 3.4 x 10(8 conidium ml-1 and a control group. Two readings were realized, one after 7 days of fungus application and the other after 14 days. At concentration of 3.4 x 10(6 conidium ml-1, 54% of treated eggs were infertile, with larva death of 54% at I, II and III

  6. Desenvolvimento dos fungos Metarhizium anisopliae (Metschnikoff, 1879 Sorokin, 1883 E Beauveria bassiana (Balsamo Vuillemin, 1912 sobre Ctenocephalides felis felis (Bouché, 1835 Development of the fungi Metarhizium anisopliae (Metschnikoff, 1879 Sorokin, 1883 and Beauveria bassiana (Balsamo Vuillemin, 1912 on the Ctenophephalides felis felis (Bouché, 1835

    Directory of Open Access Journals (Sweden)

    Denise R. De Melo

    2007-09-01

    Full Text Available A pulga Ctenocephalides felis felis é um parasita causador dermatites alérgicas e também pode transmitir diversos agentes etiológicos aos animais domésticos e aos homens. O objetivo deste trabalho foi verificar o desenvolvimento do fungo sobre a cutícula da pulga, através da microscopia eletrônica de varredura. Os isolados fúngicos testados foram o Metarhizium anisopliae 959 e Beauveria bassiana 986, ambos na concentração 10(8 conídios/ml. Após a exposição dos isolados fúngicos no período de duas, 15, 26 e 96 horas , o material foi processado para a microscopia eletrônica de varredura. Com a obtenção das micrografias, pode-se observar que com 2 horas após exposição aos fungos, os conídios estavam aderidos por toda a cutícula, situando-se preferencialmente nas membranas intersegmentais do abdome. Com 15 horas observou-se a formação do tubo de germinação e a cabeça do apressório e após 26 horas foi possível observar as ramificações e o engrossamento das hifas sobre a cutícula das pulgas. Os resultados indicam que os fungos testados foram capazes de se desenvolver sobre a cutícula de C. f. felis.The flea Ctenocephalides felis felis is a parasite that causes allergic dermatitis and also may transmit etiologic agents to domestic animals and humans. This study investigated by scanning electron microscopy the development of entomopathogenic fungi on flea cuticle. Fleas were exposed to conidia (10(8 ml-1 of Metarhizium anisopliae (isolate 959 or Beauveria bassiana (isolate 986. Following standard protocols for electron microscopy, the specimens were prepared 2, 15, 26 and 96 h after infection. The micrography revealed that 2 h after fungus exposure, conidia attachments encompassed the entire flea cuticle, especially on abdominal intersegmental membranes. The emergence of germ tubes and appressoria formation occurred at 15 h, thickening and branching of hyphae on the flea cuticle was noted at 26 h. Therefore, both of

  7. Seleção de isolados de Metarhizium anisopliae e Beauveria bassiana patogênicos a soldados de Atta bisphaerica e Atta sexdens rubropilosa em condições de laboratório Selection of Metarhizium anisopliae and Beauveria bassiana isolates pathogenic to Atta bisphaerica and Atta sexdens rubropilosa soldiers under laboratory conditions

    Directory of Open Access Journals (Sweden)

    Alzimiro Marcelo Conteiro Castilho

    2010-06-01

    Full Text Available As formigas do gênero Atta são pragas importantes de diversas culturas agrícolas, pastagens e reflorestamentos. Os fungos entomopatogênicos estão entre os fatores naturais de mortalidade dessas formigas e por isso apresentam potencial para serem usados no controle biológico dessa praga. O presente trabalho teve como objetivo selecionar isolados de Metarhizium anisopliae e Beauveria bassiana patogênicos a soldados de Atta bisphaerica e Atta sexdens rubropilosa em condições de laboratório. Para a avaliação da patogenicidade, foram utilizados oito isolados de M. anisopliae e seis de B. bassiana. O experimento foi conduzido em DIC, sendo a parcela composta por um grupo de 10 soldados por espécie de formiga, sendo utilizadas três repetições por tratamento. Para cada isolado, três grupos de soldados foram pulverizados com suspensão de 1,0 x 10(8 conídios ml-1 e mantidos em câmara úmida (25±1°C, 80±1% de UR e no escuro sem alimentação, sendo a mortalidade verificada diariamente. Dos 14 isolados testados, quatro de M. anisopliae e quatro de B. bassiana foram patogênicos aos soldados de ambas as espécies de formigas. A virulência foi avaliada para os isolados que causaram mortalidade igual ou maior a 50%. Para cada isolado, suspensões contendo 1,0 x 10(6 a 1,0 x 10(11 conídios ml-1 foram pulverizadas sobre três grupos de 10 soldados e igualmente acondicionados como no teste de patogenicidade. A porcentagem de mortalidade foi calculada a cada 24 horas para determinação do TL50. O isolado ENA04 de M. anisopliae foi mais patogênico, causando mais de 80% de mortalidade nos primeiros três dias após a inoculação, apresentou maior capacidade de esporular nos cadáveres dos soldados e foi o mais virulento para os soldados de A. bisphaerica, com um TL50 de 1,15 dias. Todos os isolados patogênicos aos soldados de A. sexdens rubropilosa foram igualmente virulentos.The ants of the genus Atta are important pests of several

  8. A New Dibenz[b,e]oxepine Derivative, 1-Hydroxy-10-methoxy-dibenz[b,e]oxepin-6,11-dione, from a Marine-Derived Fungus, Beauveria bassiana TPU942

    Directory of Open Access Journals (Sweden)

    Michio Namikoshi

    2012-11-01

    Full Text Available 1-Hydroxy-10-methoxy-dibenz[b,e]oxepin-6,11-dione (1 was obtained from the culture broth of a marine-derived fungus, Beauveria bassiana TPU942, isolated from a marine sponge collected at Iriomote Island in Okinawa, together with two known compounds, chrysazin (2 and globosuxanthone A (3. The structure of 1 was elucidated on the basis of its spectroscopic data (HREIMS, 1D and 2D NMR experiments including 1H–1H COSY, HMQC and HMBC spectra. Dibenz[b,e]oxepines are rare in nature, and only six natural products have been reported. Therefore, compound 1 is the seventh natural product in this class. Compounds 2 and 3 showed an antifungal activity against Candida albicans, and 3 inhibited the cell growth against two human cancer cell lines, HCT-15 (colon and Jurkat (T-cell lymphoma. Compound 1 did not show an apparent activity in the same bioassays.

  9. Réponse des stades larvaires de Helicoverpa armigera (Hübner (Lepidoptera : Noctuidae à l'application de champignons entomopathogènes Metarhizium anisopliae et Beauveria bassiana

    Directory of Open Access Journals (Sweden)

    Tamò, M.

    2012-01-01

    Full Text Available Response of the nymphs of Helicoverpa armigera (Hübner (Lepidoptera: Noctuidae to entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana. Two experiments on dose/mortality response between the instars of Helicoverpa armigera and two strains of entomopathogenic fungi, Metarhizium anisopliae (Met 31 and Beauveria bassiana (Bb 11 were carried out in laboratory conditions. In the first experiment, M. anisopliae Met 31 was tested on the third instar of H. armigera, while in the second experiment, both Met 31 and Bb 11 were tested on the fourth instar. In all the experiments, the following different doses of conidia per insect were used: 104, 105, 106, 107. The following parameters were measured: mortality and sporulation rates, the number of pupae formed and the number of adults that emerged. Abbott's formula was used to correct the treatment mortality rates. LD50 was determined using Cox-regression. For the third instar in experiment one, no significant difference was observed between high doses (106 and 107 conidia per insect. For instar L4, only the dose of 107 conidia per insect showed high mortality rates (74%. For the strain Bb 11, in spite of the variation observed between the mortality rates induced by high doses (106 and 107 conidia per insect, no significant difference was recorded at the 5% level. No mycosis was observed from cadavers resulting from lower doses when tested on L4. The control recorded the highest numbers of pupae and adults. These two parameters were related to the level of dosage: the higher the dose, the lower the numbers of pupae and adults that emerged. For all the strains of fungi used, whatever the larval stage of H. armigera, the dose/mortality response was significant.

  10. Efeito de Beauveria bassiana (Bals. Vuill. e Metarhizium anisopliae (Metsch. Sorok. sobre características biológicas de Diatraea saccharalis F. (Lepidoptera: Crambidae - DOI: 10.4025/actascibiolsci.v30i2.3627 Effect of Beauveria bassiana (Bals. Vuill. and Metarhizium anisopliae (Metsch. Sorok. on Biological Characteristics of Diatraea saccharalis F. (Lepidoptera: Crambidae - DOI: 10.4025/actascibiolsci.v30i2.3627

    Directory of Open Access Journals (Sweden)

    Valéria Wanderley Teixeira

    2008-05-01

    Full Text Available A broca da cana-de-açúcar Diatraea saccharalis F. é considerada uma das principais pragas nas Américas. Entre os métodos de controle, o uso de fungos entomopatogênicos tem sido amplamente recomendado no manejo das pragas da cana-de-açúcar, incluindo outras lepidobrocas. Assim sendo, este estudo investigou os efeitos de diferentes concentrações de Beauveria bassiana (Bals. Vuill. e Metarhizium anisopliae (Metsch. Sorok. sobre parâmetros biológicos da broca da cana-de-açúcar. Larvas de terceiro instar de D. saccharalis foram tratadas com os fungos usando as concentrações de 103, 104 e 105 conídios mL-1. Larvas tratadas com 105 conídios mL-1 de B. bassiana tiveram menor sobrevivência (56,6%, comparadas com lagartas não-tratadas (90%. Adultos originados de larvas tratadas colocaram menor número de ovos, com menor viabilidade, e viveram menos, comparados com adultos originados de larvas não-tratadas. Larvas tratadas com M. anisopliae na concentração de 105 conídios mL-1 e adultos originados destas larvas também exibiram redução no desempenho, comparados aos insetos não-tratados. Os resultados indicam que B. bassiana e M. anisopliae, além de patogênicos às larvas de D. saccharalis, também interferem negativamente na sua biologia, mostrando potencial de uso contra esta praga.The sugarcane borer Diatraea saccharalis F. is considered one of the major sugarcane pests in the American continent. Among control methods, the use of entomopathogenic fungi has been broadly recommended to manage sugarcane pests, including other sugarcane borers. Therefore, this study investigated the effects of different concentrations of Beauveria bassiana (Bals. Vuill and Metarhizium anisopliae (Metch. Sorok on biological characteristics of the sugarcane borer. Third-instar larvae of D. saccharalis were fungi-treated using the concentrations of 103, 104 and 105 conidia mL-1. Larvae treated with 105 conidia mL-1 of B. bassiana showed lower

  11. Antagonism of Beauveria bassiana against Two Fusarium spp.Pathogenic to Cotton%球孢白僵菌对两种植物病原镰孢的拮抗作用

    Institute of Scientific and Technical Information of China (English)

    张胜利; 李增智

    2011-01-01

    体外测定了球孢白僵菌Beauveria bassiana对两种棉花病原镰孢——棉花枯萎病菌Fusarium oxysporium f.sp.vasinfecturn和棉花红腐病菌Fusarium verticillioides的拮抗作用。平板对峙培养时,两种镰孢的生长均受到明显抑制。不同含孢量的球孢白僵菌对两种镰孢的抑制效果不同,且抑制率与孢子浓度成显著的线性量效关系;在接种量为6×107孢子.mL-1时,对两种菌的抑制率均达到90%以上,对红腐病菌的抑制率稍高。白僵菌代谢液对两种植物病原菌也表现出抑菌作%In vitro antagonism of Beauveria bassiana,an entomopathogenic fungus,was tested against Fusarium oxysporium f.sp.vasinfecturn,pathogen of cotton wilt,and F.verticillioides,pathogen of cotton red rot.On dual culture,B.bassiana showed obvious inhibition on the growth of the two pathogens.Different doses of conidia had different inhibitory effects,with inhibition rate linearly correlated to inoculum,suggesting that the antagonism was associated with competition for nutrition and space.The inhibition on the two pathogens was both over 90% at inoculum of 6×107 spores·mL-1,slightly higher on F.verticillioide.The metabolite in SDY shake culture of B.bassiana also displayed inhibition,with inhibition rate linearly correlated to metabolite concentration,suggesting that the antagonism was also associated with antibiotic substances.Based on the comparison of inhibition rates,antibiosis was considered to contribute more than competition.In the analysis on the antibiotic metabolite,none of the lyophilized supernatant extracted by 4 different organic extractants showed obvious inhibition on the Fusarium spp.,while addition of crude extract of either polysaccharide or protein significantly inhibited mycelium growth of the two Fusarium spp.,suggesting that the main inhibitory substances are polysaccharide and protein with high molecular weight.

  12. Identification of proteases produced by entomopathogenic fungi Beauveria bassiana (Bals Vuill. strain CG432 previously activated in coffee berry borer alive (Hypothenemus hampeiIdentificação de proteases produzidas pelo fungo entomopatogênico Beauveria bassiana (Bals Vuill. Cepa CG432 previamente ativada em insetos vivos de broca do café ((Hypothenemus hampei

    Directory of Open Access Journals (Sweden)

    Luiz Filipe Protásio Pereira

    2012-02-01

    Full Text Available Conídios de fungos entomopatogênicos atravessam o exoesqueleto do inseto pela ação mecânica do tubo germinativo e produção de múltiplas isoformas de proteases, quitinases e lipases em resposta à composição da cutícula do inseto. Desta forma o objetivo deste trabalho foi extrair, purificar e caracterizar a estrutura de proteases produzidas em cultivo submerso por Beauveria bassiana CG432 previamente ativada em adultos vivos de broca-do-café (Hypothenemus hampei. Uma suspensão contendo 106 conídios ativados/mL foi inoculada em meio de cultura líquido a 28ºC, 150 rpm por 3 dias. O extrato de proteases (EP foi obtido da centrifugação a 8000 g por 20 minutos, fracionado e concentrado por ultrafiltração em membrana de porosidade controlada 100 kDa e 3 kDa, respectivamente. A cromatografia de gel filtração em Sephadex G-100 separou um pico proteico (Pico II que apresentou 56% de resíduos do aminoácido ácido aspártico quando analisado por HPLC em coluna de fase reversa ODS-C18; atividade específica 43 vezes superior ao EP sobre soro albumina bovina; atividade de protease tipo-subtilisina e uma única banda proteica revelada por nitrato de prata e Coomassie Brilhant Blue em zimograma sobre gelatina por eletroforese PAGE em condições nativas. A homogeneidade do Pico II foi confirmada pela revelação de uma única banda durante a determinação do pH isoelétrico igual a 4,5, porém a determinação da massa molecular separou 2 bandas de 23 e 26 kDa por eletroforese PAGE-2D. As proteases foram caracterizadas como serino proteases com resíduo cisteína importante para a atividade, pois foram inibidas por fluoreto fenil-metil-sufonil e ácido p-cloromercúriobenzóico. As proteases do Pico II apresentaram Km 4x10-4 sobre substrato tipo-subtilisina.

  13. Integrated use of Beauveria bassiana and Bacillus thuringiensis serovar.tenebrionis for microbial biocontrol of colorado potato beetle%球孢白僵菌和苏云金杆菌拟步甲血清亚种联合使用防治马铃薯甲

    Institute of Scientific and Technical Information of China (English)

    斯蒂芬· 瑞特; Mark A Ramos

    2007-01-01

    This paper reviews the potential for using insect pathogens to control the Colorado potato beetle,Leptinotarsa decemlineata,and summarizes results from nearly 10 years of research by USDA-ARS-PPRU scientists aimed at developing methods and strategies for integrated use of Bacillus thuringiensis and Beauveria bassiana for biologically-based management of potato beetles in the northeastern USA.The described studies have resulted in 1) design of a tractor-mounted hydraulic spray system that improved targeting and consequent efficacy of microbial control agents, 2) discovery of synergism between the bacterial pathogen Bacillus thuringiensis (Bt) and the fungal pathogen Beauveria bassiana (Bb),3) findings that substantial mortality of beetle larvae treated with B.bassiana during foliar spray programs did not occur until after they entered the soil to pupate, and 4) observations that spray applications made in the evening (at sunset) were significantly, but not substantially, more effective than applications made during the morning hours.These findings have led to development of a bio-based pest management system based on three spray applications made in the following order at 3-5-day intervals:Bt alone,Bt and Bb mixed,and Bb alone.This spray program,with the applications initiated at 50% egg hatch,is intended to control the actively feeding larval stages (providing protection from defoliation) and reduce survivorship to the adult stage (providing long-term control by reducing populations of overwintering adults). In the initial test of the integrated management system,beetle control and potato yields were statistically equivalent to those in plots in which the beetles were controlled with chemical insecticides.Demonstration of the effectiveness of this program will continue over the next 2-3 field seasons.

  14. Rosalia longicorn Rosalia alpina (LINNAEUS, 1758 (Coleoptera: Cerambycidae as a host of the entomopathogenic fungus Cordyceps bassiana LI, LI, HUANG

    Directory of Open Access Journals (Sweden)

    Bartnik Czesław

    2016-06-01

    Full Text Available The paper describes, for the first time, the occurrence of the entomopathogenic fungus Cordyceps bassiana (anamorph: Beauveria bassiana on the imago of the endangered beetle Rosalia longicorn Rosalia alpina from the Low Beskid Mountains (the Carpathians, SE Poland. Furthermore, an isolate of the saprotrophic fungus Hypoxylon fragiforme was obtained as a result of laboratory tests on R. alpina specimens. Relationships between the identified fungi and R. alpina are discussed.

  15. Effects of multiple applications of a Beauveria based biopesticide on Varroa destructor (Acari: Varroidae) densities in honey bee (Hymenoptera: Apidae) colonies

    Science.gov (United States)

    A biopesticide, formulated with a strain of Beauveria bassiana isolated from varroa mites, was tested in an experiment in southern France and the results were were compared to published results from previous experiments with the same biopesticide. Bee colonies were treated either with biopesticide, ...

  16. Development of a method for detection and quantification of B. brongniartii and B. bassiana in soil.

    Science.gov (United States)

    Canfora, L; Malusà, E; Tkaczuk, C; Tartanus, M; Łabanowska, B H; Pinzari, F

    2016-01-01

    A culture independent method based on qPCR was developed for the detection and quantification of two fungal inoculants in soil. The aim was to adapt a genotyping approach based on SSR (Simple Sequence Repeat) marker to a discriminating tracing of two different species of bioinoculants in soil, after their in-field release. Two entomopathogenic fungi, Beauveria bassiana and B. brongniartii, were traced and quantified in soil samples obtained from field trials. These two fungal species were used as biological agents in Poland to control Melolontha melolontha (European cockchafer), whose larvae live in soil menacing horticultural crops. Specificity of SSR markers was verified using controls consisting of: i) soil samples containing fungal spores of B. bassiana and B. brongniartii in known dilutions; ii) the DNA of the fungal microorganisms; iii) soil samples singly inoculated with each fungus species. An initial evaluation of the protocol was performed with analyses of soil DNA and mycelial DNA. Further, the simultaneous detection and quantification of B. bassiana and B. brongniartii in soil was achieved in field samples after application of the bio-inoculants. The protocol can be considered as a relatively low cost solution for the detection, identification and traceability of fungal bio-inoculants in soil. PMID:26975931

  17. 不同温度下白僵菌Bb04菌株对红火蚁工蚁的致病力%Pathogenicity of strain Bb04 of Beauveria bassiana (Bals) Vuill. to red imported fire ant workers under different temperatures

    Institute of Scientific and Technical Information of China (English)

    刘晓燕; 吕利华; 何余容

    2014-01-01

    Red imported fire ant ( RIFA) , Solenopsis invicta Buren, is one of the most devastating pests in the world . Entomopathengenic fungi have been applied to control many crops insect pests successfully worldwide and may be a promising control for RIFA.The effect of temperature on pathogenicity of strain Bb 04 of Bearveria bassiana, a suitable candidate to the RIFA workers , was studied in the laboratory .[Method]The RIFA workers were infected with two concentrations of B.bassiana spore suspension (1 ×105 conidia· mL-1 and 1 ×108 conidia· mL-1 ) and kept under 17, 21, 25, 29 and 33 ℃ conditions.[Result]The results showed there were significant differences in virulence of Bb 04 to RIFA under different temperatures .When workers of RIFA were treated with 1 ×108 conidia· mL-1 , the total mortality of infected RIFA after 15 days reached as high as 100%under 21℃, 25℃and 29 ℃.Total mortality was 99.36%at 17 ℃and 98.74%at 33 ℃.However, after 15 days with an infection rate of 1 ×105 conidia/mL, total mortalities of treated workers at 17 ℃, 21 ℃, 25 ℃, 29 ℃and 33 ℃were only 16.83%, 29.42%,36.18%, 33.17%and 27.21%, respectively .At 17, 21 and 25 ℃, LT50 values of Bb04 against RIFA decreased from 5.41 at 17℃to 3.88 at 21 ℃and then 2.57 days at 25℃.LT50 increased again to 2.97 at 29℃and 5.11 at 33℃.[Conclusion and significance]25 ℃was the most effective temperature to promote infection of RIFA by Bb 04 and should be applied in both spring and autumn in the field .%【背景】白僵菌是一种应用最广泛的虫生真菌,已被用于工厂化大量生产,可防治多种农林害虫。【方法】试验设置17、21、25、29和33℃5个温度水平,采用喷雾法,将浓度为1×105和1×108个· mL-1的白僵菌孢子悬浮液分别感染红火蚁工蚁,以测试不同温度下白僵菌菌株对红火蚁工蚁的致病力。【结果】当浓度为1×108个· mL-1时,在21、25和29℃条件下,红火蚁工蚁在15 d

  18. 75 FR 10186 - Beauveria bassiana HF23; Amendment of Exemption from the Requirement of a Tolerance

    Science.gov (United States)

    2010-03-05

    ... evaluated whether there is any potential for residues of the pesticide to result in or on meat, milk... requirement for a tolerance (the legal limit for a pesticide chemical residue in or on a food) only if EPA... exposure of infants and children to the pesticide chemical residue in ] establishing a tolerance and...

  19. The characteristics of keratomycosis by Beauveria bassiana and its successful treatment with antimycotic agents

    OpenAIRE

    Hiroko Sonoyama; Kaoru Araki-Sasaki; Shigeyasu Kazama; Tsutomu Kawasaki; Hidenao Ideta; et al

    2008-01-01

    Hiroko Sonoyama1, Kaoru Araki-Sasaki1, Shigeyasu Kazama1, Tsutomu Kawasaki1, Hidenao Ideta1, Atsuko Sunada2, Seishi Asari2, Yoshitsugu Inoue3, Kozaburo Hayashi41Ideta Eye Hospital, Kumamoto, Kumamoto, Japan; 2Department of Laboratory for Clinical Investigation, Osaka University Hospital, Suita, Osaka, Japan; 3Division of Ophthalmology and Visual Science, Department of Medicine of Sensory and Motor Organ, Tottori University, Yonago, Tottori, Japan; 4Immunology and Virology Section Lab, Immunol...

  20. Imbibitional damage in conidia of the entomopathogenic fungi Beauveria bassiana, Metarhizium anisopliae, and Metarhizium acridum

    Science.gov (United States)

    When dried organisms are immersed in water, rapid imbibition may cause severe damage to plasma membranes; in unicellular organisms, such damage is usually lethal. This study investigated effects of pre-immersion moisture levels and immersion temperature on imbibitional damage in three insect pathoge...

  1. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  2. Compatibility between the entomopathogenic fungus Beauveria bassiana and insecticides used in coffee plantations Compatibilidade entre o fungo entomopatogênico Beauveria bassiana e inseticidas usados na cultura do cafeeiro

    OpenAIRE

    Carolina Natali de Oliveira; Pedro Manuel Oliveira Janeiro Neves; Lídio Sueki Kawazoe

    2003-01-01

    Microbial control in integrated pest management (IPM) programs of coffee plantations is an important factor for the reduction of pest population densities. The use of selective pesticides can be associated with entomopathogens, increasing the efficiency of the control and reducing the use of required insecticides. The in vitro fungitoxic effect of insecticide formulations of Thiamethoxam, Cyfluthrin, Deltamethrin, Alpha-Cypermethrin, Triazophos, Chlorpyrifos, Fenpropathrin and Endosulfan and ...

  3. In vitro compatibility between three bacterial sugarbeet disease-control agents and the entomopathogenic fungi, Metarhizium anisopliae and Beauveria bassiana

    Science.gov (United States)

    The rhizosphere is the primary arean for entomopathogenic fungi (EPF) deployed against soil-dwelling pests, and is also the site of action of biological agents used against root pathogens. Interactions between EPF and soil microbes, much less biofungicidal agents, have been barely studied, however, ...

  4. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion of at...... attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  5. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  6. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  7. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  8. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  9. Attack warning

    Energy Technology Data Exchange (ETDEWEB)

    1988-12-01

    The North American Aerospace Defense Command, located at Cheyenne Mountain Air Force Station, is responsible for warning the United States and Canadian leaders that North America is under air, missile, or space attack. The Air Force has been developing a replacement for NORAD's communications computer system, and it expects to spend about $281 million on this program-about $72 million for block I and $209 million for block II. Block I of the replacement system has experienced significant schedule and performance problems, such as the inability to meet the requirement for the unit to restore full mission capability within 267 minutes after a total loss of power, and the incompatibility of the unit with other computer equipment due to the wiring standard. These problems have pushed the planned installation data from 1986 to 1999. The Air Force intends to have the contractor correct the deficiencies during block II development. This report discusses how the replacement program should be reassessed.

  10. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  11. Active Linkability Attacks

    OpenAIRE

    Schnoor, Henning; Woizekowski, Oliver

    2013-01-01

    We study linking attacks on communication protocols. We show that an active attacker is strictly more powerful in this setting than previously-considered passive attackers. We introduce a formal model to reason about active linkability attacks, formally define security against these attacks and give very general conditions for both security and insecurity of protocols. In addition, we introduce a composition-like technique that allows to obtain security proofs by only studying small component...

  12. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  13. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  14. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  15. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  16. Development of a CO2 releasing co-formulation 1 based on starch, Saccharomyces cerevisiae and Beauveria bassiana attractive towards western corn rootworm larvae

    Science.gov (United States)

    CO2 is known as an attractant for many soil-dwelling pests. To implement an attract-and-kill strategy for soil pest control, CO2 emitting formulations need to be developed. This work aimed at the development of a slow release bead system in order to bridge the gap between application and hatching of...

  17. The entomopathogenic fungus Beauveria bassiana reduces instantaneous blood feeding in wild multi-insecticide-resistant Culex quinquefasciatus mosquitoes in Benin, West Africa

    NARCIS (Netherlands)

    A.F.V. Howard; R. N'Guessan; C.J.M. Koenraadt; A. Asidi; M. Farenhorst; M. Akogbeto; M.B. Thomas; B.G.J. Knols; W. Takken

    2010-01-01

    Background: Mosquito-borne diseases are still a major health risk in many developing countries, and the emergence of multi-insecticide-resistant mosquitoes is threatening the future of vector control. Therefore, new tools that can manage resistant mosquitoes are required. Laboratory studies show tha

  18. DEVELOPMENT OF A BIOASSAY SYSTEM FOR THE PREDATOR XYLOCORIS FLAVIPES (REUTER) AND ITS USE IN SUBCHRONIC TOXICITY/PATHOGENICITY STUDIES OF BEAUVERIA BASSIANA (BALS.) VUILL. STRAIN GHA.

    Science.gov (United States)

    Microbial biocontrol agents are useful commercially only if they do not harm other natural biocontrol organisms, at recommended use rate in the environment where the microorganism is being used. To test the hypothesis that the predatory warehouse pirate bug, Xylocoris flavipes (Reuter), is not adve...

  19. Caracterización molecular de 15 aislamientos de Beauveria bassiana asociados con Cosmopolites y Metamasius en plátano y banano en tres regiones de Colombia

    Directory of Open Access Journals (Sweden)

    Muñoz Flórez Jaime Eduardo

    2008-09-01

    Full Text Available Se colectaron picudos de Cosmopolites y Metamasius en municipios del Valle del Cauca, Caldas y Quindío. Se obtuvieron cultivos monospóricos con diluciones de 10-10 y 10-11. Los aislamientos fueron almacenados a -80°C con glicerol al 10% y el ADN a –20°C. Los marcadores moleculares RAM generaron 82 fragmentos de los cuales 67% fueron polimórficos con una heterocigocidad de 0.24, que indica diversidad media a alta. A un índice de similitud 0.84 se formaron 5 grupos: uno con 11 aislamientos y 4 con un solo aislamiento. En el gran grupo se detectó un duplicado y se encontró diversidad del hongo en los sitios muestreados. No se encontró relación entre aislamientos sobre Cosmopolites y Metamasius o zona geográfica en la formación de grupos genéticos.

  20. Synergistic interaction between the fungus Beauveria bassiana and desiccant dusts applied against poultry red mites (Dermanyssus gallinae)

    DEFF Research Database (Denmark)

    Steenberg, Tove; Kilpinen, Ole Østerlund

    2014-01-01

    The poultry red mite, Dermanyssus gallinae, is a major pest in egg production, feeding on laying hens. Widely used non-chemical control methods include desiccant dusts, although their persistence under field conditions is often short. Entomopathogenic fungi may also hold potential for mite contro...

  1. Assessing deposition and persistence of Beauveria bassiana GHA (Ascomycota: Hypocreales) applied for control of emerald ash borer, Agrilus planipennis (Coleoptera: Buprestidae), in a commercial tree nursery

    Science.gov (United States)

    Determining the deposition and field persistence of mycoinsecticides is essential in the development of effective and economical application strategies, including specifically the timing and frequency of spray applications. In this study we used three methods to evaluate the persistence of Beauveri...

  2. Tri-Tek (Petroleum Horticultural Oil) and Beauveria bassiana: Use in Eradication Strategies for Bemisia tabaci Mediterranean Species in UK Glasshouses

    OpenAIRE

    Cuthbertson, Andrew G. S.; Collins, Debbie A.

    2015-01-01

    The sweetpotato whitefly Bemisia tabaci (Gennadius) (Hemiptera: Aleyrodidae) is a pest of global importance on both outdoor and glasshouse crops. To date, B. tabaci has not become established in the UK. The UK holds Protected Zone status against this pest and, as a result, B. tabaci entering on plant material is subjected to a policy of eradication. Mediterranean species is now the most prevalent Bemisia species entering the UK. Increasing neonicotinoid resistance is becoming increasingly wid...

  3. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  4. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  5. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  6. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  7. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L; Nardi Antonio E; Nascimento Isabella; Valença Alexandre M.; Zin Walter A.

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  8. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  9. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  10. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  11. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  12. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  13. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  14. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  15. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  16. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  17. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  18. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  19. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  20. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  1. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  2. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  3. Cell Counting Attack and Browser Attack against TOR Network

    OpenAIRE

    Swati

    2014-01-01

    The onion router (TOR) allows to hide your identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). In this paper we are comparing cell-counting attacks and browser attacks against TOR. Different from cell-counting attacks, these attacks can confirm anonymou...

  4. Blocking of Brute Force Attack

    Directory of Open Access Journals (Sweden)

    M.Venkata Krishna Reddy

    2012-08-01

    Full Text Available A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it could take years to find it. Depending on the password's length and complexity, there could be trillions of possible combinations. To speed things up a bit, a brute-force attack could start with dictionary words or slightly modified dictionary words because most people will use those rather than a completely random password. These attacks are called dictionary attacks or hybrid brute-force attacks. Brute-force attacks put user accounts at risk and flood your site with unnecessary traffic. Hackers launch brute-force attacks using widely available tools that utilize wordlists and smart rule set to intelligently and automatically guess user passwords. Although such attacks are easy to detect, they are not so easy to prevent

  5. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  6. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  7. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  8. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  9. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  10. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  11. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  12. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  13. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are...... caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  14. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  15. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  16. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Metabolic profiles and free radical scavenging activity of Cordyceps bassiana fruiting bodies according to developmental stage.

    Directory of Open Access Journals (Sweden)

    Sun-Hee Hyun

    Full Text Available The metabolic profiles of Cordyceps bassiana according to fruiting body developmental stage were investigated using gas chromatography-mass spectrometry. We were able to detect 62 metabolites, including 48 metabolites from 70% methanol extracts and 14 metabolites from 100% n-hexane extracts. These metabolites were classified as alcohols, amino acids, organic acids, phosphoric acids, purine nucleosides and bases, sugars, saturated fatty acids, unsaturated fatty acids, or fatty amides. Significant changes in metabolite levels were found according to developmental stage. Relative levels of amino acids, purine nucleosides, and sugars were higher in development stage 3 than in the other stages. Among the amino acids, valine, isoleucine, lysine, histidine, glutamine, and aspartic acid, which are associated with ABC transporters and aminoacyl-tRNA biosynthesis, also showed higher levels in stage 3 samples. The free radical scavenging activities, which were significantly higher in stage 3 than in the other stages, showed a positive correlation with purine nucleoside metabolites such as adenosine, guanosine, and inosine. These results not only show metabolic profiles, but also suggest the metabolic pathways associated with fruiting body development stages in cultivated C. bassiana.

  18. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  19. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  20. Sulfate attack expansion mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  1. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  2. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  3. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  4. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  5. Drug: D09176 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available bassiana Vuillemin.; Standards for non-pharmacopoeial crude drugs Crude drugs [BR:br08305] Animals Insects D09176 Stiff silkworm PubChem: 96025856 ... ...91], Beauveria bassiana [TAX:176275] Same as: E00308 Bombycidae Silkworm infected Cordycepitaceae Beauveria

  6. Metarhizium brunneum Blastospore Pathogenesis in Aedes aegypti Larvae: Attack on Several Fronts Accelerates Mortality.

    Directory of Open Access Journals (Sweden)

    Abeer M Alkhaibari

    2016-07-01

    Full Text Available Aedes aegypti is the vector of a wide range of diseases (e.g. yellow fever, dengue, Chikungunya and Zika which impact on over half the world's population. Entomopathogenic fungi such as Metarhizium anisopliae and Beauveria bassiana have been found to be highly efficacious in killing mosquito larvae but only now are the underlying mechanisms for pathogenesis being elucidated. Recently it was shown that conidia of M. anisopliae caused stress induced mortality in Ae. aegypti larvae, a different mode of pathogenicity to that normally seen in terrestrial hosts. Blastospores constitute a different form of inoculum produced by this fungus when cultured in liquid media and although blastospores are generally considered to be more virulent than conidia no evidence has been presented to explain why. In our study, using a range of biochemical, molecular and microscopy methods, the infection process of Metarhizium brunneum (formerly M. anisopliae ARSEF 4556 blastospores was investigated. It appears that the blastospores, unlike conidia, readily adhere to and penetrate mosquito larval cuticle. The blastospores are readily ingested by the larvae but unlike the conidia are able infect the insect through the gut and rapidly invade the haemocoel. The fact that pathogenicity related genes were upregulated in blastospores exposed to larvae prior to invasion, suggests the fungus was detecting host derived cues. Similarly, immune and defence genes were upregulated in the host prior to infection suggesting mosquitoes were also able to detect pathogen-derived cues. The hydrophilic blastospores produce copious mucilage, which probably facilitates adhesion to the host but do not appear to depend on production of Pr1, a cuticle degrading subtilisin protease, for penetration since protease inhibitors did not significantly alter blastospore virulence. The fact the blastospores have multiple routes of entry (cuticle and gut may explain why this form of the inoculum killed

  7. Metarhizium brunneum Blastospore Pathogenesis in Aedes aegypti Larvae: Attack on Several Fronts Accelerates Mortality.

    Science.gov (United States)

    Alkhaibari, Abeer M; Carolino, Aline T; Yavasoglu, Sare I; Maffeis, Thierry; Mattoso, Thalles C; Bull, James C; Samuels, Richard I; Butt, Tariq M

    2016-07-01

    Aedes aegypti is the vector of a wide range of diseases (e.g. yellow fever, dengue, Chikungunya and Zika) which impact on over half the world's population. Entomopathogenic fungi such as Metarhizium anisopliae and Beauveria bassiana have been found to be highly efficacious in killing mosquito larvae but only now are the underlying mechanisms for pathogenesis being elucidated. Recently it was shown that conidia of M. anisopliae caused stress induced mortality in Ae. aegypti larvae, a different mode of pathogenicity to that normally seen in terrestrial hosts. Blastospores constitute a different form of inoculum produced by this fungus when cultured in liquid media and although blastospores are generally considered to be more virulent than conidia no evidence has been presented to explain why. In our study, using a range of biochemical, molecular and microscopy methods, the infection process of Metarhizium brunneum (formerly M. anisopliae) ARSEF 4556 blastospores was investigated. It appears that the blastospores, unlike conidia, readily adhere to and penetrate mosquito larval cuticle. The blastospores are readily ingested by the larvae but unlike the conidia are able infect the insect through the gut and rapidly invade the haemocoel. The fact that pathogenicity related genes were upregulated in blastospores exposed to larvae prior to invasion, suggests the fungus was detecting host derived cues. Similarly, immune and defence genes were upregulated in the host prior to infection suggesting mosquitoes were also able to detect pathogen-derived cues. The hydrophilic blastospores produce copious mucilage, which probably facilitates adhesion to the host but do not appear to depend on production of Pr1, a cuticle degrading subtilisin protease, for penetration since protease inhibitors did not significantly alter blastospore virulence. The fact the blastospores have multiple routes of entry (cuticle and gut) may explain why this form of the inoculum killed Ae. aegypti larvae

  8. Optimization of cyclosporin A production by Beauveria nivea in continuous fed-batch fermentation

    Directory of Open Access Journals (Sweden)

    Dong Huijun

    2011-01-01

    Full Text Available To develop the effective control method for fed-batch culture of cyclosporin A production, we chose fructose, L-valine and (NH42HPO4 as feeding nutrients and compared their productivities in relation to different concentrations. The feeding rate of three kinds of feeding materials was controlled to maintain the suitable residual concentration. The fed-batch fermentation results indicated that the optimal concentrations of fructose, L-valine and (NH42HPO4 were about 20 g/L, 0.5 g/L and 0.6 g/L for cyclosporin A production, respectively. The cultivation of Beauveria nivea could produce cyclosporin A up to 6.2 g/L for 240 hrs through a continuous feeding-rate-controlled-batch process under the optimal feeding conditions.

  9. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  10. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the...... security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  11. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  12. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  13. Beauveria brongniartii Sacc. (Petch) against Melolontha spp. white grubs in forest nurseries with different soil pH

    OpenAIRE

    Sierpińska Alicja; Popowska-Nowak Elżbieta; Bednarek Andrzej

    2015-01-01

    In 2011, the General Directorate of State Forests in Poland managed 669 forest nurseries on the total area of 2411 ha that produced forest tree seedlings bare root systems, hence vulnerable to Melolontha spp. white grubs. Up to date, no chemical or biological plant protection product for control of cockchafer grubs in forests has been registered in Poland. The study was carried out with the aim to evaluate the efficacy of a biocontrol product Bovecol with BP strain of Beauveria brongniartii o...

  14. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  15. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  16. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  17. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  18. Panic Attacks and Panic Disorders

    OpenAIRE

    Fontaine, Rejean; Beaudry, Paul

    1984-01-01

    The diagnosis and treatment of panic attacks and panic disorders have progressed markedly during the last decade. Unlike phobic disorders, the key feature of panic disorders is the many panic attacks that are mostly spontaneous or not caused by a particular situation. Recent studies linking its pathogenesis with lactate infusion tests are reviewed. For treatment, psychotherapy combined with in vivo exposure and pharmacotherapy is more efficacious than either treatment alone. In most cases, ps...

  19. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  20. Migraine attacks the Basal Ganglia

    OpenAIRE

    Bigal Marcelo; Brawn Jennifer; Pendse Gautam; Nutile Lauren; Becerra Lino; Maleki Nasim; Burstein Rami; Borsook David

    2011-01-01

    Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unr...

  1. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  2. VoIP Malware: Attack Tool & Attack Scenarios

    OpenAIRE

    Nassar, Mohamed; State, Radu; Festor, Olivier

    2009-01-01

    With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our ``VoIP bots'' support a ...

  3. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  4. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica...

  5. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  6. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  7. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  8. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of a...

  9. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  10. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang

    2012-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to

  11. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  12. Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2014-01-01

    Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is...

  13. Cyclodepsipeptides and Other O-Containing Heterocyclic Metabolites from Beauveria felina EN-135, a Marine-Derived Entomopathogenic Fungus

    Directory of Open Access Journals (Sweden)

    Feng-Yu Du

    2014-05-01

    Full Text Available Bioassay-guided fractionation of a culture extract of Beauveria felina EN-135, an entomopathogenic fungus isolated from a marine bryozoan, led to the isolation of a new cyclodepsipeptide, iso-isariin D (1; two new O-containing heterocyclic compounds that we have named felinones A and B (2 and 3; and four known cyclodepsipeptides (4–7. The structures were elucidated via spectroscopic analysis, and the absolute configurations of 1 and 2 were determined using single-crystal X-ray diffraction and CD, respectively. All isolated compounds were evaluated for antimicrobial activity and brine-shrimp (Artemia salina lethality.

  14. A multi-screening approach for marine-derived fungal metabolites and the isolation of cyclodepsipeptides from Beauveria felina

    International Nuclear Information System (INIS)

    Extracts obtained from 57 marine-derived fungal strains were analyzed by HPLC-PDA, TLC and 1H NMR. The analyses showed that the growth conditions affected the chemical profile of crude extracts. Furthermore, the majority of fungal strains which produced either bioactive of chemically distinctive crude extracts have been isolated from sediments or marine algae. The chemical investigation of the antimycobacterial and cytotoxic crude extract obtained from two strains of the fungus Beauveria felina have yielded cyclodepsipeptides related to destruxins. The present approach constitutes a valuable tool for the selection of fungal strains that produce chemically interesting or biologically active secondary metabolites. (author)

  15. A multi-screening approach for marine-derived fungal metabolites and the isolation of cyclodepsipeptides from Beauveria felina

    Energy Technology Data Exchange (ETDEWEB)

    Vita-Marques, Aline Maria de; Lira, Simone P.; Berlinck, Roberto G.S. [Universidade de Sao Paulo (USP), Sao Carlos, SP (Brazil). Inst. de Quimica]. E-mail: rgsberlinck@iqsc.usp.br; Seleghim, Mirna H.R. [Universidade Federal de Sao Carlos (UFSCAR), SP (Brazil). Dept. de Ecologia e Biologia Evolutiva; Sponchiado, Sandra R.P. [UNESP, Araraquara, SP (Brazil). Inst. de Quimica. Dept. de Bioquimica e Tecnologia Quimica; Tauk-Tornisielo, Samia M. [UNESP, Rio Claro, SP (Brazil). Centro de Estudos Ambientais; Barata, Margarida [Faculdade de Ciencias de Lisboa (Portugal). Centro de Biologia Ambiental. Dept. de Biologia Vegetal; Pessoa, Claudia; Moraes, Manoel O. de; Cavalcanti, Bruno Coelho [Universidade Federal do Ceara (UFC), Fortaleza, CE (Brazil). Dept. de Fisiologia e Farmacologia; Nascimento, Gislene G.F. [Universidade Metodista de Piracicaba (UNIMEP), SP (Brazil). Faculdade de Ciencias da Saude; Souza, Ana O. de [Instituto Butantan, Sao Paulo, SP (Brazil); Galetti, Fabio C.S.; Silva, Celio L. [Universidade de Sao Paulo (USP), Ribeirao Preto, SP (Brazil). Faculdade de Medicina. Dept. de Bioquimica e Imunologia; Silva, Marcio; Pimenta, Eli F.; Thiemann, Otavio [Universidade de Sao Paulo (USP), Sao Carlos, SP (Brazil). Inst. de Fisica; Passarini, Michel R.Z.; Sette, Lara D. [Universidade Estadual de Campinas (UNICAMP), Campinas, SP (Brazil). Centro Pluridisciplinar de Pesquisas Quimicas, Bioligicas e Agricolas. Div. de Recursos Microbianos

    2008-07-01

    Extracts obtained from 57 marine-derived fungal strains were analyzed by HPLC-PDA, TLC and {sup 1}H NMR. The analyses showed that the growth conditions affected the chemical profile of crude extracts. Furthermore, the majority of fungal strains which produced either bioactive of chemically distinctive crude extracts have been isolated from sediments or marine algae. The chemical investigation of the antimycobacterial and cytotoxic crude extract obtained from two strains of the fungus Beauveria felina have yielded cyclodepsipeptides related to destruxins. The present approach constitutes a valuable tool for the selection of fungal strains that produce chemically interesting or biologically active secondary metabolites. (author)

  16. A multi-screening approach for marine-derived fungal metabolites and the isolation of cyclodepsipeptides from Beauveria felina

    Directory of Open Access Journals (Sweden)

    Aline Maria de Vita-Marques

    2008-01-01

    Full Text Available Extracts obtained from 57 marine-derived fungal strains were analyzed by HPLC-PDA, TLC and ¹H NMR. The analyses showed that the growth conditions affected the chemical profile of crude extracts. Furthermore, the majority of fungal strains which produced either bioactive of chemically distinctive crude extracts have been isolated from sediments or marine algae. The chemical investigation of the antimycobacterial and cytotoxic crude extract obtained from two strains of the fungus Beauveria felina have yielded cyclodepsipeptides related to destruxins. The present approach constitutes a valuable tool for the selection of fungal strains that produce chemically interesting or biologically active secondary metabolites.

  17. Selection, Identification and Culture Characteristics of a Highly Virulent Strain of Beauveria towards Sympiezomias citri%柑橘灰象甲一株高毒力白僵菌菌株的筛选鉴定及培养特性

    Institute of Scientific and Technical Information of China (English)

    王定锋; 黎健龙; 王庆森; 李慧玲; 吴光远

    2014-01-01

    %, highest muscardine rates of 97.78%and shortest LT50 of 3.77 d after fungal inoculation at a concentration of 1.0×108 spores/mL (7 d, 26 ℃). The LC50 value was 4.55×104 spores/mL at 26 ℃. According to culture characteristics, morphology feature and rDNA ITS sequence analysis, the strain Bb2-1 was identified to be Beauveria bassiana. The effect of five medium types (PDA, PPDA, 1/4 SDAY, SDAY, and Czapek), five temperature gradient (15, 20, 25, 30 and 35 ℃), seven different pH value (pH 4.0—10.0) and seven different illumination periods (0L:24D, 24L:0D, 18L:6D, 12L:12D, 6L:18D, dark in the first 7 days and light in the last 7 days, and light in the first 7 days and dark in the last 7 days) on colony growth and sporulation of the strain Bb2-1 were evaluated through the determination of colony diameter and sporulation. The results showed that SDAY medium at pH 7.0 was the most optimal medium for the colony growth and sporulation of the strain Bb2-1 at 25 ℃, and photoperiod didn’t pose any obvious effects on colony growth, but prolonging illumination time was benefit to the sporulation. In this study, the selection of a highly virulent B. bassiana (Bb2-1) towards S. citri and the evaluation of culture characteristics of Bb2-1 would provide reference for large scale production of the fungi to control this beetle.

  18. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  19. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  20. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  1. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  2. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  3. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  4. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  5. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  6. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  7. Faked states attack and quantum cryptography protocols

    CERN Document Server

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  8. Panic attacks simulate presence of somatic illnesses

    OpenAIRE

    Latas Milan; Soldatović Ivan; Stamenović Marko; Starčević Vladan

    2009-01-01

    Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnos...

  9. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  10. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  12. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  13. Selection and characterization of Beauveria spp. isolates to control the broad mite Polyphagotarsonemus latus (Banks, 1904) (Acari: Tarsonemidae).

    Science.gov (United States)

    Martins, C C; Alves, L F A; Mamprim, A P; Souza, L P A

    2016-01-01

    This study was performed under laboratory conditions to identify isolates of the fungus Beauveria spp. that can control Polyphagotarsonemus latus in the greenhouse and field. Thirty Beauveria spp. isolates were tested by spraying 1 mL conidia (1 × 108 conidia/mL) on pepper leaf discs containing 15 mites. Evaluations were performed on the 3rd and 6th day post application by counting the number of dead mites. Vegetative growth and conidial production were measured from the selected isolates, and bioassays were conducted in the greenhouse on bean seedlings in plastic pots. The isolate Unioeste 53 was selected, and a conidial suspension (1 × 108 conidia/mL) was applied with a backpack sprayer. The evaluation consisted of pre- and post-treatment counts of the number of live mites on ten leaflets in both the plots treated with the fungus and control plots, and the same procedure was followed for the field experiment. In the laboratory, the Unioeste 53 isolate resulted in total and confirmed mortality rates of 70% and 57.7%, respectively. In the greenhouse, the population decreased by 76.71% by the 16th day after application. In the field, the population decreased by 66% by the 12th day after application, demonstrating the potential of this fungus for mite management. PMID:27332672

  14. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  15. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  16. Attacking Embedded Systems through Power Analysis

    Directory of Open Access Journals (Sweden)

    Dr. Sastry JKR

    2011-03-01

    Full Text Available Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the litterer suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provides for knowledge base. In this paper an experimental setup is proposed which is an embedded system itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

  17. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  18. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  19. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  20. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  1. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  2. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  3. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  4. Classification of Attacks in Wireless Sensor Networks

    OpenAIRE

    Messai, Mohamed-Lamine

    2014-01-01

    In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are dis...

  5. Detection Block Model for SQL Injection Attacks

    OpenAIRE

    Diksha G. Kumar; Madhumita Chatterjee

    2014-01-01

    With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack te...

  6. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  7. Detecting Denial of Service Attacks in Tor

    Science.gov (United States)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  8. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  9. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  10. Agent Based Preventive Measure for UDP Flood Attack in DDoS Attacks

    Directory of Open Access Journals (Sweden)

    AARTI SINGH,

    2010-08-01

    Full Text Available Distributed Denial-of-Service (DDoS attack is an attack which makes victim resources and services unavailable to its intended users. In particular, User Datagram Protocol (UDP flood attack in DDoS attacks is a method causing host based denial of service. It occurs when attacker sends UDP packets to a random port on the victim system,causing responses to be sent to forged IP address. The basic thrust of this paper is agent based solution for UDP lood attack because software agent technology seems to be a strong candidate for defending DDoS attacks and very few researchers have thought of deploying agents towards providing solution for UDP attack earlier.

  11. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  12. Ochratoxin A Management in Vineyards by Lobesia botrana Biocontrol

    Directory of Open Access Journals (Sweden)

    Giuseppe Cozzi

    2013-01-01

    Full Text Available Grape berries attacked by Lobesia botrana larvae are more easily infected by Aspergillus section Nigri (black aspergilli ochratoxigenic species. Two-year field trials were carried out in Apulia (Italy to evaluate a bioinsecticide control strategy against L. botrana and the indirect effect on reducing ochratoxin A (OTA contamination in vineyards. A commercial Bacillus thuringiensis formulate and an experimental Beauveria bassiana (ITEM-1559 formulate were tested in two vineyards cultivated with the same grape variety, Negroamaro, but with two different training systems (espalier and little-arbor techniques. In both years and training systems the treatments by B. bassiana ITEM-1559 significantly controlled L. botrana larvae attacks with effectiveness similar to B. thuringensis (more than 20%. A significant reduction of OTA concentrations (up to 80% compared to untreated controls was observed only in the first year in both training systems, when the metereological parameters prior to harvest were more favorable to the insect attack. Results of field trials showed that B. bassiana ITEM-1559 is a valid bioinsecticide against L. botrana and that grape moth biocontrol is a strategy to reduce OTA contamination in vineyard in seasons with heavy natural infestation.

  13. Baeuveria bassiana (BalsVuill and Metarhizium anisioplae (Metsch. Sorokin in the pupas control of Prodiplosis longifila Gagné on asparagus crop

    Directory of Open Access Journals (Sweden)

    Carolina Cedano

    2012-03-01

    Full Text Available The objective of the present work was to evaluate the effect of the entomopathogen fungi Baeuveria bassiana and Metarhizium anisioplae of the Prodiplosis longifila pupas, in order to reduce the adult population of this insect. The treatments consisted on the application of two different propagel concentrations (mycel and conidia of each entomopathogen. One of these concentration was 1x106 propagels/ml (obtained from the total amount of conidia collected of 25 kg of rice colonized by the entomopathogen; and the other one, was 1x107 propagels/ml (obtained from the total amount of conidia collected of 40 kg of rice colonized by the entomopathogen. As a check a non application treatment was considered. The applications were trough the irrigation system and started 15 days after the end of harvest and were repeated each five days during a month, coincident with the period of most falls of pupas of the soil. As a result Baeuveria bassiana at 1x107 propagels/ml shown 53.4 % of the total pupas colonized by the entomopathogen, which allows indicating B. bassiana as a promissory biocontrol of this specie

  14. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  15. A Efficient Approach for Password Attacks

    Directory of Open Access Journals (Sweden)

    I. Naga Geethika

    2014-03-01

    Full Text Available Online password guessing attacks has emerged as a major problem in password based systems. To avoid this we implemented many solutions day by day to restrict bruteforce attacks and password guessing attacks and dictionary attacks. The approach in this paper is that using of mobile alert messages and giving options to the mobile user for more security that will intimate admin that someone is trying to hack his email. The legal users/attackers are challenged to answer the code that is sent to the mobile to retrieve the login page when the number of failed login attempts from a single machine crosses certain threshold value. This protocol uses either the IP addresses of the machines or the browser cookies, or both to identify the machines from which successful logins are made previously. A machine is said to be known when a successful login is made from it and its IP address is added to whitelist. The main goal of this protocol is to limit the attackers with a few failed login attempts made from each unknown machine and forcing them to challenge the security options. Attackers can have a threshold value (For ex 5 which is Whenever a user/attacker types an invalid username.

  16. Panic attacks simulate presence of somatic illnesses

    Directory of Open Access Journals (Sweden)

    Latas Milan

    2009-01-01

    Full Text Available Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnosis of panic disorder, without any acute, severe and unstable somatic illness. The presence and frequency of symptoms of panic attacks were estimated by the Panic Disorder Questionnaire. Results. The study results indicate that the most frequent symptoms of panic attacks were cardiological signs (heart pounding or racing and trembling, followed by unsteady and fainting feeling symptoms, sweating, respiratory symptoms and gastroenterological symptoms. The results of correlation analyses indicate that symptoms of panic attacks classified into cardio-vascular, gastro-enterological, respiratory and neuro-otological systems show statistically significant correlations. Conclusion. The results of analyses of symptoms of panic attacks point to their intercorrelation. This specific association of the symptoms, if they are examined on their own in the patients, could lead to false clinical manifestation of some somatic illness. Therefore, it is necessary to analyze adequately and make the proper differential diagnosis of patients with panic disorder.

  17. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  18. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  19. The cost of attack in competing networks.

    Science.gov (United States)

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  20. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  1. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  2. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  3. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  4. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers....

  5. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  6. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  7. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  8. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  9. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  10. Cotton in Benin: governance and pest management

    NARCIS (Netherlands)

    Togbe, C.E.

    2013-01-01

    Key words: cotton, synthetic pesticides, neem oil (Azadirachta indica), Beauveria bassiana, Bacillus thuringiensis, field experiment, farmers’ participation   Pests are one of the main factors limiting cotton production worldwide. Most of the pest control strategies in cotton producti

  11. Mass production of fungal entomopathogens

    Science.gov (United States)

    Hypocrealean fungi encompassing Beauveria bassiana, B. brongniartii, Isaria fumosorosea, I. farinosa, several Lecanicillium spp., Nomuraea rileyi, and Metarhizium spp. are being increasingly exploited worldwide for insect pest management because of the ease with which they can be produced in contras...

  12. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  13. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  14. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  15. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  16. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  17. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  18. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  19. RAPTOR: Routing Attacks on Privacy in Tor

    OpenAIRE

    Sun, Yixin; Edmundson, Anne; Vanbever, Laurent; Li, Oscar; Rexford, Jennifer; Chiang, Mung; Mittal, Prateek

    2015-01-01

    The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of...

  20. Security Attacks On MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Chiragkumar V. Patel

    2013-10-01

    Full Text Available The paper gives idea about various routing protocols for Mobile Ad-Hoc Network against security issues. MANET is vulnerable to various security attacks due to its dynamically changing topology, self configurable nature and lack of centralized control. Malicious node can significantly degrade the performance and reliability of Ad-hoc Network routing protocols. From the survey it has been made quite clear that basic MANET protocols are vulnerable to various routing attacks. While Secure AODV (SAODV routing protocol performs quite well to improve performance in presence of security attack in MANET.

  1. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  2. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  3. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  4. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  5. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  6. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  7. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  8. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  9. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  10. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  11. Desynchronization Attacks on RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Miaolei Deng

    2013-02-01

    Full Text Available The characteristics of radio frequency identification (RFID systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.

  12. Dengue Virus May Bolster Zika's Attack

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159534.html Dengue Virus May Bolster Zika's Attack Prior exposure to ... 23, 2016 (HealthDay News) -- Prior exposure to the dengue fever virus may increase the severity of Zika ...

  13. Fault attacks on two software countermeasures

    OpenAIRE

    Moro, Nicolas; Heydemann, Karine; Dehbaoui, Amine; Robisson, Bruno; Encrenaz, Emmanuelle

    2014-01-01

    Short version of the article "Experimental evaluation of two software countermeasures against fault attacks" presented at the 2014 IEEE Symposium on Hardware-Oriented Security and Trust (HOST) in May 2014.

  14. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  15. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  16. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  17. Attacks in WEB Based Embedded Applications

    OpenAIRE

    C. Yaashuwanth; Ramesh, R.

    2010-01-01

    This paper deals with the issues related to embedded applications when they are implemented in internet. There are various attacks in embedded systems when implemented in the internet. These attacks have a negligible effect in the operating system which results in the decrease in the system performance. But in embedded system case, it has life and death consequence attached to it. Many of these embedded systems work in hazardous environment where a system failure results to catastrophic effec...

  18. Wireless Sensor Networks Attacks and Solutions

    OpenAIRE

    Alajmi, Naser

    2014-01-01

    A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the se...

  19. Cluster headache attacks and multiple sclerosis

    OpenAIRE

    Gentile, Salvatore; Ferrero, Margherita; Vaula, Giovanna; Rainero, Innocenzo; Pinessi, Lorenzo

    2007-01-01

    We report the case of a patient who developed typical cluster headache attacks and was diagnosed as having multiple sclerosis (MS) at the same time. The headache attacks resolved after i.v. treatment with methylprednisolone. MR imaging showed a pontine demyelinating lesion involving the trigeminal nerve root inlet area, on the same side as the pain. The association between cluster headache and MS has been rarely described before. This case suggests that in patients with cluster headache neuro...

  20. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  1. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  2. Various Database Attacks and its Prevention Techniques

    OpenAIRE

    K.A.VarunKumar; M.Prabakaran; Ajay Kaurav; S.Sibi Chakkaravarthy; Thiyagarajan, S; Pokala Venkatesh

    2014-01-01

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness of the database. Intrusion detection system is used to detect whether the attack is carried on the database. In this paper we surveyed different types of database att...

  3. Private Circuits II versus Fault Injection Attacks

    OpenAIRE

    Rakotomalala, Henitsoa; Ngo, Xuan Thuy; Najm, Zakaria; Danger, Jean-Luc; Guilley, Sylvain

    2015-01-01

    —Cryptographic implementations are subject to physical attacks. Private circuits II is a proven protection against a strong attacker, able to read and write on a finite number of chosen internal nodes. In practice, side-channel analyses and fault injections are less accurate: typically, classical injection techniques (clock and power glitches, electromagnetic pulses, etc.) can be reproducible, but they do not allow to choose the targeted nodes (the situation is different for software dual-rai...

  4. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  5. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  6. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  7. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  8. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  9. Optical and structural properties of plasma-treated Cordyceps bassiana spores as studied by circular dichroism, absorption, and fluorescence spectroscopy

    Science.gov (United States)

    Lee, Geon Joon; Sim, Geon Bo; Choi, Eun Ha; Kwon, Young-Wan; Kim, Jun Young; Jang, Siun; Kim, Seong Hwan

    2015-01-01

    To understand the killing mechanism of fungal spores by plasma treatment, the optical, structural, and biological properties of the insect pathogenic fungus Cordyceps bassiana spores were studied. A nonthermal atmospheric-pressure plasma jet (APPJ) was used to treat the spores in aqueous solution. Optical emission spectra of the APPJ acquired in air indicated emission peaks corresponding to hydroxyl radicals and atomic oxygen. When the APPJ entered the aqueous solution, additional reactive species were derived from the interaction of plasma radicals with the aqueous solution. Fluorescence and absorption spectroscopy confirmed the generation of hydroxyl radicals and hydrogen peroxide in the plasma-activated water (PAW). Spore counting showed that plasma treatment significantly reduced spore viability. Absorption spectroscopy, circular dichroism (CD) spectroscopy, and agarose gel electrophoresis of the DNA extracted from plasma-treated spores showed a reduction in spore DNA content. The magnitude of the dip in the CD spectrum was lower in the plasma-treated spores than in the control, indicating that plasma treatment causes structural modifications and/or damage to cellular components. Tryptophan fluorescence intensity was lower in the plasma-treated spores than in the control, suggesting that plasma treatment modified cell wall proteins. Changes in spore viability and DNA content were attributed to structural modification of the cell wall by reactive species coming from the APPJ and the PAW. Our results provided evidence that the plasma radicals and the derived reactive species play critical roles in fungal spore inactivation.

  10. Optical and structural properties of plasma-treated Cordyceps bassiana spores as studied by circular dichroism, absorption, and fluorescence spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Geon Joon, E-mail: gjlee@kw.ac.kr; Sim, Geon Bo; Choi, Eun Ha [Plasma Bioscience Research Center/Department of Electrical and Biological Physics, Kwangwoon University, Seoul 139-701 (Korea, Republic of); Kwon, Young-Wan [KU-KIST Graduate School of Converging Science and Technology, Korea University, Seoul 136-701 (Korea, Republic of); Kim, Jun Young; Jang, Siun; Kim, Seong Hwan, E-mail: piceae@naver.com [Department of Microbiology and Institute of Basic Sciences, Dankook University, Cheonan 330-714 (Korea, Republic of)

    2015-01-14

    To understand the killing mechanism of fungal spores by plasma treatment, the optical, structural, and biological properties of the insect pathogenic fungus Cordyceps bassiana spores were studied. A nonthermal atmospheric-pressure plasma jet (APPJ) was used to treat the spores in aqueous solution. Optical emission spectra of the APPJ acquired in air indicated emission peaks corresponding to hydroxyl radicals and atomic oxygen. When the APPJ entered the aqueous solution, additional reactive species were derived from the interaction of plasma radicals with the aqueous solution. Fluorescence and absorption spectroscopy confirmed the generation of hydroxyl radicals and hydrogen peroxide in the plasma-activated water (PAW). Spore counting showed that plasma treatment significantly reduced spore viability. Absorption spectroscopy, circular dichroism (CD) spectroscopy, and agarose gel electrophoresis of the DNA extracted from plasma-treated spores showed a reduction in spore DNA content. The magnitude of the dip in the CD spectrum was lower in the plasma-treated spores than in the control, indicating that plasma treatment causes structural modifications and/or damage to cellular components. Tryptophan fluorescence intensity was lower in the plasma-treated spores than in the control, suggesting that plasma treatment modified cell wall proteins. Changes in spore viability and DNA content were attributed to structural modification of the cell wall by reactive species coming from the APPJ and the PAW. Our results provided evidence that the plasma radicals and the derived reactive species play critical roles in fungal spore inactivation.

  11. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  12. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  13. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  14. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  15. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  16. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  17. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  18. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  19. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  20. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  1. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  2. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  3. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  4. Effect of migraine attacks on paracetamol absorption.

    OpenAIRE

    Tokola, R A; Neuvonen, P J

    1984-01-01

    The absorption of effervescent paracetamol (1000 mg) was investigated in nine female patients during a migraine attack and in the same patients when headache free. Migraine attack decreased (P less than 0.05) the areas under the serum paracetamol concentration-time curves (AUC) of 0-2 h, 0-4 h and 0-6 h and the peak serum concentration. The severity of nausea correlated significantly with the decrease in the AUC values. Our results support findings of delayed gastric emptying in migraine atta...

  5. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  6. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  7. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  8. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  9. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  10. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  11. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  12. Antiproliferative and Apoptosis-Inducing Activities of 4-Isopropyl-2,6-bis(1-phenylethylphenol Isolated from Butanol Fraction of Cordyceps bassiana

    Directory of Open Access Journals (Sweden)

    Ji Hye Kim

    2015-01-01

    Full Text Available The Cordyceps species have been widely used for treating various cancer diseases. Although the Cordyceps species have been widely known as an alternative anticancer remedy, which compounds are responsible for their anticancer activity is not fully understood. In this study, therefore, we examined the anticancer activity of 5 isolated compounds derived from the butanol fraction (Cb-BF of Cordyceps bassiana. For this purpose, several cancer cell lines such as C6 glioma, MDA-MB-231, and A549 cells were employed and details of anticancer mechanism were further investigated. Of 5 compounds isolated by activity-guided fractionation from BF of Cb-EE, KTH-13, and 4-isopropyl-2,6-bis(1-phenylethylphenol, Cb-BF was found to be the most potent antiproliferative inhibitor of C6 glioma and MDA-MB-231 cell growth. KTH-13 treatment increased DNA laddering, upregulated the level of Annexin V positive cells, and altered morphological changes of C6 glioma and MDA-MB-231 cells. In addition, KTH-13 increased the levels of caspase 3, caspase 7, and caspase 9 cleaved forms as well as the protein level of Bax but not Bcl-2. It was also found that the phosphorylation of AKT and p85/PI3K was also clearly reduced by KTH-13 exposure. Therefore, our results suggest KTH-13 can act as a potent antiproliferative and apoptosis-inducing component from Cordyceps bassiana, contributing to the anticancer activity of this mushroom.

  13. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  14. Modified localized attack on complex network

    Science.gov (United States)

    Dong, Gaogao; Du, Ruijin; Hao, Huifang; Tian, Lixin

    2016-01-01

    Since a shell structure contains a wealth of information, it is not only very important for understanding the transport properties of the network, but also essential to identify influential spreaders in complex networks. Nodes within each shell can be classified into two categories: protected nodes and unprotected nodes. In this paper, we propose a generalization of the localized attack, modified localized attack, which means that when a randomly chosen node (root node) is under attack, protected nodes will not be removed, but unprotected nodes in the nearest shells will fail. We numerically and analytically study the system robustness under this attack by taking an Erdös-Rényi (ER) network, a regular random (RR) network and a scale-free (SF) network as examples. Moreover, a fraction of nodes belonging to giant component S and a critical threshold q c , where S approaches to zero, are given. The result implies that increasing connection density has been found to be useful to significantly improve network robustness.

  15. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  16. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  17. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  18. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  19. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  20. After Heart Attack, New Threat: Heart Failure

    Science.gov (United States)

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  1. Nonepileptic attack disorder among married women

    Directory of Open Access Journals (Sweden)

    Dhanaraj M

    2005-01-01

    Full Text Available Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized ′attack.′ The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. Results: The mean duration of illness was 18 months, and the pattern of the attack was ′fall and lying still′ in 53% and ′fall with generalized motor movements′ in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (c2 = 9.02, P = 0.003 and constant quarrel with other family members (c2 = 5.19, P = 0.02. The prevalence of sexual abuse was low (7%. Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (c2 = 4.52, P = 0.03 and lower frequency of attack at the time of reporting (c2 = 3.88, P = 0.05 correlated with good outcomes. Conclusion : Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  2. Evaluation of Some Biocontrol Agents/Antagonistic Microbes Against Pastule Development of Leaf Rust of Wheat Caused by Puccinia recondita f. sp. Tritici Roberge ex. Desmaz (Erikson and Henn D.M. Henderson

    Directory of Open Access Journals (Sweden)

    A. Sheroze

    2002-01-01

    Full Text Available Out of five biocontrol agents/antagonistic microbes viz., Verticillium lecanii, Paecilomyces fumosoroseus, Beauveria bassiana, Cladosporium cladosporiodes and Metarrhizium anisopliae, Beauveria bassiana proved the best in retarding the postulation/rust development in wheats. When the microbes tested alone against leaf rust development, B. bassiana proved excellent and in combination with Verticillium lecanii and Paecilomyces furnosoroseus. Although there was an increase in colony diameter after 2nd week but the pattern of growth was the same as after one week of incubation of bio-control agents application.

  3. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  4. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  5. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  6. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  7. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  8. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  9. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  10. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  11. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date. PMID:26115644

  12. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  13. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  14. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In...... this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible...... attacks in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  15. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... 160692.html Heart Attack Before 50 Ups Early Death Risk But healthy living can improve those odds, ... 30, 2016 (HealthDay News) -- The risk of early death after a heart attack has lessened over the ...

  16. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  17. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  18. Sex Suffers for Younger Adults After Heart Attack

    Science.gov (United States)

    ... gov/news/fullstory_160722.html Sex Suffers for Younger Adults After Heart Attack Lack of interest a ... 2016 (HealthDay News) -- After a heart attack, many younger adults experience sexual difficulties -- and women more so ...

  19. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  20. Extensions of the Cube Attack Based on Low Degree Annihilators

    Science.gov (United States)

    Zhang, Aileen; Lim, Chu-Wee; Khoo, Khoongming; Wei, Lei; Pieprzyk, Josef

    At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

  1. Heart Attack: Tips for Recovering and Staying Well

    Science.gov (United States)

    ... version Heart Attack | Tips for Recovering and Staying Well If you have had a heart attack, you ... healthy diet. The food you eat affects how well your blood flows through your heart and arteries. ...

  2. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  3. Securing iris recognition systems against masquerade attacks

    OpenAIRE

    Galbally Herrero, Javier; Gómez-Barrero, Marta; Ross, Arun A.; Fiérrez, Julián; Ortega-García, Javier

    2013-01-01

    Javier Galbally ; Marta Gomez-Barrero ; Arun Ross ; Julian Fierrez ; Javier Ortega-Garcia; "Securing iris recognition systems against masquerade attacks", Biometric and Surveillance Technology for Human and Activity Identification X, Proc. SPIE 8712 (May 31, 2013); doi:10.1117/12.2015690. Copyright 2013 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in...

  4. Incidence of Fungal attack on Aircraft Fuselage

    Directory of Open Access Journals (Sweden)

    H. M. Dayal

    1968-10-01

    Full Text Available Incidence of fungal attack on the fuselage of a few Vampire aircraft has been observed. The fungus isolated from the infected regions has been tentatively indentified as TorulaSp. Laboratory experiments have revealed that within four weeks this fungus causes about 44 percent loss in the tensile strength of the brich plywood used in the manufacture of the fuselage of the aircraft.

  5. Transient ischemic attack after Mesobuthus gibbosus envenomation

    OpenAIRE

    Golcuk, Yalcin; Ozsarac, Murat; Bilge, Adnan; Golcuk, Burcu; Cinar, Bilge Piri; Hayran, Mustafa

    2014-01-01

    Endometriosis Mesobuthus gibbosus is a medically important venomous scorpion in western of Turkey which causes significant morbidity. Envenoming of this species scorpion results with varying degrees of local symptoms and clinically important systemic effects. This case describes an authenticated first case of transient ischemic attack in a 68 year-old-woman following envenoming by M. gibbosus in Turkey.Keywords: Scorpion, Envenomation, Emergency department

  6. Visualizing Endpoint Security Technologies using Attack Trees

    OpenAIRE

    Pettersson , Stefan

    2008-01-01

    Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. This thesis tries to visualize the effects of a selection of technological countermeasures that have been proposed by researchers. These countermeasures: non-executable memo...

  7. Towards a translational model of panic attacks

    OpenAIRE

    Luiz Carlos Schenberg

    2010-01-01

    About 20 years ago, Deakin and Graeff proposed that whereas generalized anxiety disorder is produced by the overactivity of 5-HT excitatory projections from dorsal raphe nucleus to the areas of prefrontal cortex and amygdala which process distal threat, panic attacks are a dysfunction of 5-HT inhibitory projections from dorsal raphe nucleus to the dorsal periaqueductal gray matter, thereby releasing the responses to proximal threat, innate fear or anoxia. Besides, they suggested that the decr...

  8. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  9. An Analysis of Various Attacks in MANET

    OpenAIRE

    M.Udhayamoorthi; C. Senthilkumar; Dr S. Karthik; Dr. T.Kalaikumaran

    2014-01-01

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. According to the perspective of our paper, we try to connect the current status of computers era to adhoc networking. As adhoc networks has been unleashing several updated technologies, it is the most growing area in the field of networks in information and communication Engineering has ever seen .we start with area introduction, deeply reviewed about the various attacks es...

  10. Attacks and Counterattacks on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nusrat Fatema

    2013-12-01

    Full Text Available WSN is formed by autonomous nodes with partial memo ry, communication range, power, and bandwidth. Their occupation depends on inspecting corporal and environmental conditions and communing through a system and performing data processing. The applicat ion field is vast, comprising military, ecology, healthcare, home or commercial and require a highly secured communication. The paper analyses different types of attacks and counterattacks and provides so lutions for the WSN threats.

  11. Quantum Key Distribution against Trojan Horse Attacks

    Institute of Scientific and Technical Information of China (English)

    CAI Qing-Yu; LV Hua

    2007-01-01

    Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.

  12. Nonepileptic attack disorder among married women

    OpenAIRE

    Dhanaraj M; Rangaraj R; Arulmozhi T; Vengatesan A

    2005-01-01

    Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the...

  13. Securing iris recognition systems against masquerade attacks

    Science.gov (United States)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  14. NETWORK SECURITY: ATTACKS, TOOLS AND TECHNIQUES

    OpenAIRE

    Mhatre Suvidnya Shashikant; Potadar Devangi; Salvi Bhageshree

    2015-01-01

    Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network admini st rators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our network.

  15. Attack Detection By Clustering And Classification Approach

    Directory of Open Access Journals (Sweden)

    Priyanka J. Pathak, Prof. Snehlata Dongre

    2012-04-01

    Full Text Available Intrusion detection is a software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Security is becoming big issue for all networks. Hackers and intruders have made many successful attempts to bring down high profile company networks and web services. Intrusion Detection System (IDS is an important detection that is used as a countermeasure to preserve data integrity and system availability from attacks. The work is implemented in two phases, in first phase clustering by K-means is done and in next step of classification is done with k-nearest neighbours and decision trees. The objects are clustered or grouped based on the principle of maximizing the intra-class similarity and minimizing the interclass similarity. This paper proposes an approach which make the clusters of similar attacks and in next step of classification with K nearest neighbours and Decision trees it detect the attack types. This method is advantageous over single classifier as it detect better class than single classifier system.

  16. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  17. A Structured Multi-signature Scheme Against Forgery Attack

    Directory of Open Access Journals (Sweden)

    Wenjun Luo

    2011-12-01

    Full Text Available There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

  18. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  19. Machine Learning Methods for Attack Detection in the Smart Grid

    OpenAIRE

    Ozay, Mete; Esnaola, Inaki; Vural, Fatos T. Yarman; Kulkarni, Sanjeev R.; Poor, H. Vincent

    2015-01-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed appro...

  20. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  1. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  2. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  3. A Review of Man-in-the-Middle Attacks

    OpenAIRE

    Gangan, Subodh

    2015-01-01

    This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking.

  4. Vulnerability Assessment by Learning Attack Specifications in Graphs

    OpenAIRE

    Franqueira, Virginia N L; Lopes, Raul H. C.

    2007-01-01

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies to networks in general, including social networks and computer grid.

  5. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  6. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  7. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  8. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  9. WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Shree Om

    2011-01-01

    Full Text Available Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS attack. Due to its nature, the attack makes the source node send all the data packets to a Black-hole node that ends up dropping all the packets. The aim of this paper is to reflect light on the severe effects of a Black-hole attack in a Wireless Ad-hoc network and the drawbacks of the security mechanisms being used for the mitigation of this attack.

  10. Attack Graph-Based Risk Assessment and Optimisation Approach

    Directory of Open Access Journals (Sweden)

    Mohammed Alhomidi

    2014-06-01

    Full Text Available Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA. Each attack path is considered as an independent attack scenario from the source of attack to the target. Many such paths form the individuals in the evolutionary GA solution. The population-based strategy of a GA provides a natural way of exploring a large number of possible attack paths to find the paths that are most important. Thus unlike many other optimization solutions a range of solutions can be presented to a user of the methodology.

  11. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism...

  12. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...... and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  13. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  14. Explosive attack: Lessons learned in Seyed Al Shohada mosque attack, April 2008, Shiraz, Iran

    Directory of Open Access Journals (Sweden)

    Shahram Paydar

    2012-01-01

    Full Text Available Introduction: The threat of explosive attacks has become a worldwide problem. Bombing is the preferred method of attacks. These attacks result in specific physical and psychiatric trauma. In this paper, we present an epidemiologic description of the physical injuries of patients who survived the explosive attack in Seyed Al Shohada mosque April 2008 Shiraz, Iran. Materials and Methods: All medical records of the patients admitted at Shiraz Hospitals on April 2008 due to Seyed Al Shohada mosque bombing attacks, Shiraz, Iran, were reviewed. Results: A total of 202 patients were referred to the hospitals over 24 h following the terrorist attack. One hundred sixty-four patients were admitted for short periods of observation (<24 h. Thirty-eight patients needed more than 1 day of hospitalization. The mean age of the patients was 26.2 (range 2 to 51 years. One hundred thirty-five (66.8% patients were males. Twenty-six (12.8% were children. Burn was the most prevalent cause of admission. Five (13.5% patients needed chest tube insertion and eight (21% needed skin grafts due to burn. Overall, 12 patients expired (5%. Three (25% of them were children (2 and 6, and 11 years old. Mortality rate was significantly higher among the children than adults (P value <0.05. The most important cause of death was head trauma which was seen in five (41.6% of the expired patients followed by burn (including air way burn in four (33%, and internal bleeding in three (25%. Patients with head trauma had significantly a higher rate of mortality than other patients (P value <0.05. Discussion: Following a bombing attack, numerous victims were brought to the emergency unit suffering from a combination of multi-organ injuries caused by the blast, penetrating injuries caused by shrapnel and other debris, and burns. It is important for a physician to be familiar with the clinical features and treatments of explosive attacks victims. Early management of patients at the scene and

  15. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  16. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... can recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All...

  17. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Dekimpe, Marnik G.

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  18. Competitive reactions to advertising and promotion attacks.

    OpenAIRE

    Steenkamp, Jan-Benedict E.M.; Vincent R. Nijs; Hanssens, Dominique M; Dekimpe, Marnik G.

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  19. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  20. Toxicological issues after depleted uranium weapons attacked

    International Nuclear Information System (INIS)

    Depleted Uranium (DU) is a byproduct of the uranium enrichment for producing nuclear reactor or nuclear weapon. DU is used in the military as an armor-piercing projectile due to its hardness, strength, and density. A lot of DU weapons were fired in the Gulf War, and bring about critical environmental and internal contamination. Therefore, DU becomes suddenly a hot issue. Some toxicological problems after DU weapons attacked have been reviewed, which include features of internal DU contamination. Hazard of wound contamination and inhalation with insoluble uranium, and other urgent toxicological issues. The healthy effects of implanted with depleted uranium pellets were illustrated in particular

  1. Bobcat attack on a cottontail rabbit

    Science.gov (United States)

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  2. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property for the...

  3. Robustness of correlated networks against propagating attacks

    CERN Document Server

    Hasegawa, Takehisa; Nemoto, Koji

    2012-01-01

    We investigate robustness of correlated networks against propagating attacks modeled by a susceptible-infected-removed model. By Monte-Carlo simulations, we numerically determine the first critical infection rate, above which a global outbreak of disease occurs, and the second critical infection rate, above which disease disintegrates the network. Our result shows that correlated networks are robust compared to the uncorrelated ones, regardless of whether they are assortative or disassortative. This behavior is related to the layered network structure inevitably generated by a rewiring procedure we adopt to realize correlated networks.

  4. SQL Injection Attacks: Techniques and Protection Mechanisms

    Directory of Open Access Journals (Sweden)

    Santosh Soni

    2011-01-01

    Full Text Available When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.

  5. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    twisted polynomials from Ore rings as forgery polynomials. We show how to construct sparse forgery polynomials with full control over the sets of roots. We also achieve complete and explicit disjoint coverage of the key space by these polynomials. We furthermore leverage this new construction in an...... improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which is a...

  6. Enhancing network robustness for malicious attacks

    CERN Document Server

    Zeng, An

    2012-01-01

    In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. With a greedy algorithm, they found the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement ($R_{n}$), we propose a link-robustness index ($R_{l}$). We show that solely enhancing $R_{n}$ cannot guarantee the improvement of $R_{l}$. Moreover, the structure of $R_{l}$-optimized network is found to be entirely different from that of onion network. In order to design robust networks resistant to more realistic attack condition, we propose a hybrid greedy algorithm which takes both the $R_{n}$ and $R_{l}$ into account. We validate the robustness of our generated networks a...

  7. Drop attack during chest radiography: Case report

    International Nuclear Information System (INIS)

    Chest radiography is the first line of thoracic imaging performed in patients with thoracic diseases. It is probably the most frequently performed type of X-ray examination. It is recommended to be performed in the full upright position except where the patient's condition will not permit. This is because the erect technique allows full expansion of the lungs, prevents engorgement of pulmonary vessels and also helps in fluid level evaluation. However, little is reported on the negative effects associated with erect radiography. Herein, we present a case of drop attack during erect chest radiography. - Highlights: • Radiographers should be aware of the possibilities of drop attach during erect chest radiography. • A patient's determination to stand for chest radiograph may not always relate with the ability. • The causes of some drop attacks may be unknown. • Watching patients during radiographic exposure is essential. • Being alert and working very fast during erect chest examinations is important

  8. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  9. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  10. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-11-01

    Full Text Available The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

  11. Stealth-MITM DoS Attacks on Secure Channels

    CERN Document Server

    Herzberg, Amir

    2009-01-01

    We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack on IPsec, when deployed with a `small' anti-replay window, and analysis of `sufficient' window size. First amplifying attack on IPsec, when deployed with `sufficient' window size. This attack (as the previous) is realistic: attacker needs only to duplicate and speed-up few packets. We also suggest a solution designed to prevent the presented attacks, and to provide secure channel immune to degradation and other DoS attacks. Our solution involves changes (only) to the two gateway machines running IPsec. In addition to their practical importance, our results also raise the challenge of formally defining secure channels immune to DoS and degradation attacks, and p...

  12. An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy

    Directory of Open Access Journals (Sweden)

    Narasimha Shashidhar

    2015-07-01

    Full Text Available Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.

  13. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    Science.gov (United States)

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  14. The Impact of Imperfect Information on Network Attack

    CERN Document Server

    Melchionna, Andrew; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2014-01-01

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erd\\H{o}s-R\\'enyi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erd\\H{o}os-R\\'enyi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  15. Efficient Detection of Sybil attack Based on Cryptography in Vanet

    Directory of Open Access Journals (Sweden)

    Mina Rahbari

    2011-12-01

    Full Text Available Vehicular communications play a substantial role in providing safety transportation by means of safetymessage exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed keyinfrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular adhoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  16. Simulating Cyber-Attacks for Fun and Profit

    CERN Document Server

    Futoransky, Ariel; Orlicki, Jose; Sarraute, Carlos

    2010-01-01

    We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applications, protocols, users, etc. A novel characteristic of this tool is to simulate vulnerabilities (including 0-days) and exploits, allowing an attacker to compromise machines and use them as pivoting stones to continue the attack. A user can test and modify complex scenarios, with several interconnected networks, where the attacker has no initial connectivity with the objective of the attack. We give a concise description of this new technology, and its possible uses in the security research field, such as pentesting training, study of the impact of 0-days vulnerabilities, evaluation of security countermeasures, and risk...

  17. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Honglong Chen

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  18. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  19. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  20. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  1. Performance Analysis of Manet Before and After Black Hole Attack

    Directory of Open Access Journals (Sweden)

    Ms.Heena Bhalla

    2012-01-01

    Full Text Available A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks is the Black Hole Attack which absorbs all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper we simulated MANETs with and without Black Hole to study the effects of Black hole attack on network performance. Because of Black Hole Attack the average packet drop increased form 0.25% to 90.69% . The throughput of the network decreased 93.56% due to Black Hole effect.

  2. Efficient Detection of Sybil Attack Based on Cryptography in Vanet

    CERN Document Server

    Rahbari, Mina

    2011-01-01

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  3. Attacks on Web Based Software and Modelling Defence Mechanisms

    Directory of Open Access Journals (Sweden)

    D.R. Ingle

    2012-08-01

    Full Text Available The software life cycle was in use to develop the good software. Now a day’s the software development life cycle should incorporate the security features. Input Validation Attacks are one of the most wide spread forms of vulnerability on the Web application. Our main intention is to focuses on detection and prevention of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow by incorporating security in software development life cycle. We have introduced a novel approach of preclusion and uncovering of Input Validation Attacks. SQL Injection , Cross Site Scripting, A buffer overflow attacks, experimentations are made to do these attacks on various sides and the defense mechanism model is proposed to avoid these attacks on the code.

  4. Profiling cyber attackers using case-based reasoning

    OpenAIRE

    Kapetanakis, Stelios; Filippoupolitis, Avgoustinos; Loukas, George; Al Murayziq, Tariq Saad

    2014-01-01

    Computer security would arguably benefit from more information on the characteristics of the particular human attacker behind a security incident. Nevertheless, technical security mechanisms have always focused on the at- tack's characteristics rather than the attacker's. The latter is a challenging prob- lem, as relevant data cannot easily be found. We argue that the cyber traces left by a human attacker during an intrusion attempt can help towards building a profile of the particular person...

  5. Effectiveness and detection of denial of service attacks in Tor

    OpenAIRE

    Danner, Norman; DeFabbia-Kane, Sam; Krizanc, Danny; Liberatore, Marc

    2011-01-01

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the...

  6. Effectiveness and detection of denial of service attacks in Tor

    CERN Document Server

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    2011-01-01

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.

  7. ADTool: Security Analysis with Attack-Defense Trees (Extended Version)

    OpenAIRE

    Kordy, Barbara; Kordy, Piotr; Mauw, Sjouke; Schweitzer, Patrick

    2013-01-01

    The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack-defense trees. The main features of the ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of attack trees, protection trees and defense trees, which are all particular instances of attack-defense trees.

  8. Preparedness for mass-casualty attacks on public transportation

    OpenAIRE

    Holgersson, Annelie

    2016-01-01

    Background: Public transportation constitutes a vulnerable sector in modern day society with a high probability of generating mass casualties if attacked. By preparing for mass-casualty attacks (MCAs), response can become more effective and public transportation can become a less rewarding target. However, preparedness for attacks, much like response, implies resource constraints, and this dissertation pinpoints some major dilemmas that inhibit achieving preparedness for MCAs on public transp...

  9. Non-harmful insertion of data mimicking computer network attacks

    Science.gov (United States)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  10. The nocturnal panic attacks: polysomnographic features and comorbidities

    OpenAIRE

    Li, Yan-Lin; CHEN Guo-yan; LEI Ge-sheng; Yang, Ting; Chang-jun SU

    2013-01-01

    Background Panic disorder refers to the repeated or unexpected anxiety or panic attacks. It makes patients feel extreme pain. Although the episodes of most patients with panic disorder happen at daytime, the nocturnal panic attacks (NPA) are quite common. Paients pay more attention to NPA. Insomnia is more serious in patients with NPA than those patients with panic disorder attack at daytime. Many patients may occur anxiety and avoidance behavior after NPA. Patients are often afraid of sleep...

  11. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    OpenAIRE

    Mohammad Abdus Salam; Nayana Halemani

    2016-01-01

    Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and m...

  12. An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks

    CERN Document Server

    Avoine, Gildas

    2008-01-01

    Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate prover. We present an authentication protocol suited for RFID systems. Our solution is the first that prevents relay attacks without degrading the authentication security level: it minimizes the probability that the verifier accepts a fake proof of identity, whether or not a relay attack occurs.

  13. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  14. PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION

    Institute of Scientific and Technical Information of China (English)

    Zhao Shengmei; Li Fei; Zheng Baoyu

    2005-01-01

    A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.

  15. Trojan Horse attacks on Quantum Key Distribution systems

    OpenAIRE

    Gisin, Nicolas; Fasel, Sylvain; Kraus, Barbara; Zbinden, Hugo; Ribordy, Grégoire

    2005-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob’s system via the quantum channel, are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to th...

  16. Backside polishing detector: a new protection against backside attacks

    OpenAIRE

    Manich Bou, Salvador; Arumi Delgado, Daniel; Rodríguez Montañés, Rosa; Mujal Colell, Jordi; Hernández García, David

    2015-01-01

    Secure chips are in permanent risk of attacks. Physical attacks usually start removing part of the package and accessing the dice by different means: laser shots, electrical or electromagnetic probes, etc. Doing this from the backside of the chip gives some advantages since no metal layers interfere between the hacker and the signals of interest. The bulk silicon is thinned from hundreds to some tens of micrometers in order to improve the performance of the attack. In thi...

  17. Hybrid Approach to Detect SQLi Attacks and Evasion Techniques

    OpenAIRE

    Makiou, Abdelhamid; Begriche, Youcef; Serhrouchni, Ahmed

    2014-01-01

    —Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our ...

  18. Improving Web Application Firewalls to detect advanced SQL injection attacks

    OpenAIRE

    Makiou, Abdelhamid; Begriche, Youcef; Serhrouchni, Ahmed

    2014-01-01

    Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our m...

  19. Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2015-01-01

    Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation. This paper presents a generalized attack regime that uses jamming of secure and insecure measurements to greatly expand the scope of common 'hidden' and 'detectable' data injection attacks in literature. For 'hidden' attacks, it is shown that with jamming, t...

  20. CPM: Masking code pointers to prevent code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2013-01-01

    Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. By enforcing the correct semantics of code pointers, CPM thwarts attacks that modify code pointers to divert the application’s control flow. It does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. This paper reports on two prototype implementations on very distinct processor architec...