WorldWideScience

Sample records for evade complement attack

  1. Subversion of complement by hematophagous parasites

    OpenAIRE

    Schroeder, Hélène; Skelly, Patrick; Zipfel, Peter F.; Losson, Bertrand; Vanderplasschen, Alain

    2009-01-01

    The complement system is a crucial part of innate and adaptive immunity which exerts a significant evolutionary pressure on pathogens. It has selected for those pathogens, mainly micro-organisms but also parasites, that have evolved countermeasures. The characterization of how pathogens evade complement attack is a rapidly developing field of current research. In recent years, multiple complement evasion strategies have been characterized. In this review, we focus on complement escape mechani...

  2. Subversion of complement by hematophagous parasites.

    Science.gov (United States)

    Schroeder, Hélène; Skelly, Patrick J; Zipfel, Peter F; Losson, Bertrand; Vanderplasschen, Alain

    2009-01-01

    The complement system is a crucial part of innate and adaptive immunity which exerts a significant evolutionary pressure on pathogens. It has selected for those pathogens, mainly microorganisms but also parasites, that have evolved countermeasures. The characterization of how pathogens evade complement attack is a rapidly developing field of current research. In recent years, multiple complement evasion strategies have been characterized. In this review, we focus on complement escape mechanisms expressed by hematophagous parasites, a heterogeneous group of metazoan parasites that share the property of ingesting the whole blood of their host. Complement inhibition is crucial for parasite survival within the host tissue or to facilitate blood feeding. Finally, complement inhibition by hematophagous parasites may also contribute to their success as pathogen vectors.

  3. Pasteurella pneumotropica evades the human complement system by acquisition of the complement regulators factor H and C4BP.

    Directory of Open Access Journals (Sweden)

    Alfredo Sahagún-Ruiz

    Full Text Available Pasteurella pneumotropica is an opportunist Gram negative bacterium responsible for rodent pasteurellosis that affects upper respiratory, reproductive and digestive tracts of mammals. In animal care facilities the presence of P. pneumotropica causes severe to lethal infection in immunodeficient mice, being also a potential source for human contamination. Indeed, occupational exposure is one of the main causes of human infection by P. pneumotropica. The clinical presentation of the disease includes subcutaneous abscesses, respiratory tract colonization and systemic infections. Given the ability of P. pneumotropica to fully disseminate in the organism, it is quite relevant to study the role of the complement system to control the infection as well as the possible evasion mechanisms involved in bacterial survival. Here, we show for the first time that P. pneumotropica is able to survive the bactericidal activity of the human complement system. We observed that host regulatory complement C4BP and Factor H bind to the surface of P. pneumotropica, controlling the activation pathways regulating the formation and maintenance of C3-convertases. These results show that P. pneumotropica has evolved mechanisms to evade the human complement system that may increase the efficiency by which this pathogen is able to gain access to and colonize inner tissues where it may cause severe infections.

  4. The atherogenic bacterium Porphyromonas gingivalis evades circulating phagocytes by adhering to erythrocytes

    DEFF Research Database (Denmark)

    Belstrøm, Daniel; Holmstrup, Palle; Damgaard, Christian

    2011-01-01

    A relationship between periodontitis and coronary heart disease has been investigated intensively. A pathogenic role for the oral bacterium Porphyromonas gingivalis has been suggested for both diseases. We examined whether complement activation by P. gingivalis strain ATCC 33277 allows...... the bacterium to adhere to human red blood cells (RBCs) and thereby evade attack by circulating phagocytes. On incubation with normal human serum, the P. gingivalis strain efficiently fixed complement component 3 (C3). Incubation of bacteria with washed whole blood cells suspended in autologous serum resulted...... in a dose- and time-dependent adherence to RBCs. The adherence required functionally intact complement receptor 1 (CR1; also called CD35) on the RBCs and significantly inhibited the uptake of P. gingivalis by neutrophils and B cells within 1 min of incubation (by 64% and 51%, respectively...

  5. Complement Attack against Aspergillus and Corresponding Evasion Mechanisms

    Directory of Open Access Journals (Sweden)

    Cornelia Speth

    2012-01-01

    Full Text Available Invasive aspergillosis shows a high mortality rate particularly in immunocompromised patients. Perpetually increasing numbers of affected patients highlight the importance of a clearer understanding of interactions between innate immunity and fungi. Innate immunity is considered to be the most significant host defence against invasive fungal infections. Complement represents a crucial part of this first line defence and comprises direct effects against invading pathogens as well as bridging functions to other parts of the immune network. However, despite the potency of complement to attack foreign pathogens, the prevalence of invasive fungal infections is increasing. Two possible reasons may explain that phenomenon: First, complement activation might be insufficient for an effective antifungal defence in risk patients (due to, e.g., low complement levels, poor recognition of fungal surface, or missing interplay with other immune elements in immunocompromised patients. On the other hand, fungi may have developed evasion strategies to avoid recognition and/or eradication by complement. In this review, we summarize the most important interactions between Aspergillus and the complement system. We describe the various ways of complement activation by Aspergillus and the antifungal effects of the system, and also show proven and probable mechanisms of Aspergillus for complement evasion.

  6. Anopheles Midgut Epithelium Evades Human Complement Activity by Capturing Factor H from the Blood Meal

    Science.gov (United States)

    Khattab, Ayman; Barroso, Marta; Miettinen, Tiera; Meri, Seppo

    2015-01-01

    Hematophagous vectors strictly require ingesting blood from their hosts to complete their life cycles. Exposure of the alimentary canal of these vectors to the host immune effectors necessitates efficient counteractive measures by hematophagous vectors. The Anopheles mosquito transmitting the malaria parasite is an example of hematophagous vectors that within seconds can ingest human blood double its weight. The innate immune defense mechanisms, like the complement system, in the human blood should thereby immediately react against foreign cells in the mosquito midgut. A prerequisite for complement activation is that the target cells lack complement regulators on their surfaces. In this work, we analyzed whether human complement is active in the mosquito midgut, and how the mosquito midgut cells protect themselves against complement attack. We found that complement remained active for a considerable time and was able to kill microbes within the mosquito midgut. However, the Anopheles mosquito midgut cells were not injured. These cells were found to protect themselves by capturing factor H, the main soluble inhibitor of the alternative complement pathway. Factor H inhibited complement on the midgut cells by promoting inactivation of C3b to iC3b and preventing the activity of the alternative pathway amplification C3 convertase enzyme. An interference of the FH regulatory activity by monoclonal antibodies, carried to the midgut via blood, resulted in increased mosquito mortality and reduced fecundity. By using a ligand blotting assay, a putative mosquito midgut FH receptor could be detected. Thereby, we have identified a novel mechanism whereby mosquitoes can tolerate human blood. PMID:25679788

  7. Anopheles midgut epithelium evades human complement activity by capturing factor H from the blood meal.

    Directory of Open Access Journals (Sweden)

    Ayman Khattab

    2015-02-01

    Full Text Available Hematophagous vectors strictly require ingesting blood from their hosts to complete their life cycles. Exposure of the alimentary canal of these vectors to the host immune effectors necessitates efficient counteractive measures by hematophagous vectors. The Anopheles mosquito transmitting the malaria parasite is an example of hematophagous vectors that within seconds can ingest human blood double its weight. The innate immune defense mechanisms, like the complement system, in the human blood should thereby immediately react against foreign cells in the mosquito midgut. A prerequisite for complement activation is that the target cells lack complement regulators on their surfaces. In this work, we analyzed whether human complement is active in the mosquito midgut, and how the mosquito midgut cells protect themselves against complement attack. We found that complement remained active for a considerable time and was able to kill microbes within the mosquito midgut. However, the Anopheles mosquito midgut cells were not injured. These cells were found to protect themselves by capturing factor H, the main soluble inhibitor of the alternative complement pathway. Factor H inhibited complement on the midgut cells by promoting inactivation of C3b to iC3b and preventing the activity of the alternative pathway amplification C3 convertase enzyme. An interference of the FH regulatory activity by monoclonal antibodies, carried to the midgut via blood, resulted in increased mosquito mortality and reduced fecundity. By using a ligand blotting assay, a putative mosquito midgut FH receptor could be detected. Thereby, we have identified a novel mechanism whereby mosquitoes can tolerate human blood.

  8. Malaria parasite evasion of classical complement pathway attack

    DEFF Research Database (Denmark)

    Larsen, Mads Delbo; Ditlev, Sisse; Olmos, Rafael Bayarri

    2017-01-01

    of the protective antibodies that are gradually acquired in response to P. falciparum-IEs. Although this response is dominated by IgG1 and IgG3, complement-mediated attack following activation of the classical pathway does not appear to be a major effector mechanism. We hypothesized that this is related to the knob...... is that the knob-restricted expression of PfEMP1 on the IE surface may serve as a hitherto unappreciated immune evasion mechanism employed by P. falciparum parasites....

  9. Hijacking Complement Regulatory Proteins for Bacterial Immune Evasion.

    Science.gov (United States)

    Hovingh, Elise S; van den Broek, Bryan; Jongerius, Ilse

    2016-01-01

    The human complement system plays an important role in the defense against invading pathogens, inflammation and homeostasis. Invading microbes, such as bacteria, directly activate the complement system resulting in the formation of chemoattractants and in effective labeling of the bacteria for phagocytosis. In addition, formation of the membrane attack complex is responsible for direct killing of Gram-negative bacteria. In turn, bacteria have evolved several ways to evade complement activation on their surface in order to be able to colonize and invade the human host. One important mechanism of bacterial escape is attraction of complement regulatory proteins to the microbial surface. These molecules are present in the human body for tight regulation of the complement system to prevent damage to host self-surfaces. Therefore, recruitment of complement regulatory proteins to the bacterial surface results in decreased complement activation on the microbial surface which favors bacterial survival. This review will discuss recent advances in understanding the binding of complement regulatory proteins to the bacterial surface at the molecular level. This includes, new insights that have become available concerning specific conserved motives on complement regulatory proteins that are favorable for microbial binding. Finally, complement evasion molecules are of high importance for vaccine development due to their dominant role in bacterial survival, high immunogenicity and homology as well as their presence on the bacterial surface. Here, the use of complement evasion molecules for vaccine development will be discussed.

  10. More than just immune evasion: Hijacking complement by Plasmodium falciparum.

    Science.gov (United States)

    Schmidt, Christoph Q; Kennedy, Alexander T; Tham, Wai-Hong

    2015-09-01

    Malaria remains one of the world's deadliest diseases. Plasmodium falciparum is responsible for the most severe and lethal form of human malaria. P. falciparum's life cycle involves two obligate hosts: human and mosquito. From initial entry into these hosts, malaria parasites face the onslaught of the first line of host defence, the complement system. In this review, we discuss the complex interaction between complement and malaria infection in terms of hosts immune responses, parasite survival and pathogenesis of severe forms of malaria. We will focus on the role of complement receptor 1 and its associated polymorphisms in malaria immune complex clearance, as a mediator of parasite rosetting and as an entry receptor for P. falciparum invasion. Complement evasion strategies of P. falciparum parasites will also be highlighted. The sexual forms of the malaria parasites recruit the soluble human complement regulator Factor H to evade complement-mediated killing within the mosquito host. A novel evasion strategy is the deployment of parasite organelles to divert complement attack from infective blood stage parasites. Finally we outline the future challenge to understand the implications of these exploitation mechanisms in the interplay between successful infection of the host and pathogenesis observed in severe malaria. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. The membrane attack complex of the complement system is essential for rapid wallerian degeneration

    NARCIS (Netherlands)

    Ramaglia, Valeria; King, Rosalind Helen Mary; Nourallah, Michelle; Wolterman, Ruud; de Jonge, Rosalein; Ramkema, Marja; Vigar, Miriam Ann; van der Wetering, Sandra; Morgan, Brian Paul; Troost, Dirk; Baas, Frank

    2007-01-01

    The complement (C) system plays an important role in myelin breakdown during Wallerian degeneration (WD). The pathway and mechanism involved are, however, not clear. In a crush injury model of the sciatic nerve, we show that C6, necessary for the assembly of the membrane attack complex (MAC), is

  12. The membrane attack complex as an indicator of complement hyperactivation in type 2 diabetes mellitus

    OpenAIRE

    Elina Aleksandrovna Arakelova; Meri Robertovna Ovsepyan; Anna Surenovna Boyadzhyan; Arsen Artashesovich Arakelyan; Astkhik Artavazdovna Gevorkyan; Ashot Andreevich Mamikonyan

    2011-01-01

    Aim. Comparative analysis of the levels of the membrane attack complex (MAC) - an end product of complement activation, and of hemolytic activities of C1 and C3 complement components in sera of patients with diabetes mellitus 2 (DM2) and healthy subjects. Materials and methods. 37 DM2 patients (7 men, 26 women, mean age 58±9 years (M±б) and 37 healthy subjects without a family history of hereditary diabetes (17 men, 20 women, mean age 52±12 years). Serum MAC levels were measured by E...

  13. Complement evasion by Bordetella pertussis: implications for improving current vaccines.

    Science.gov (United States)

    Jongerius, Ilse; Schuijt, Tim J; Mooi, Frits R; Pinelli, Elena

    2015-04-01

    Bordetella pertussis causes whooping cough or pertussis, a highly contagious disease of the respiratory tract. Despite high vaccination coverage, reported cases of pertussis are rising worldwide and it has become clear that the current vaccines must be improved. In addition to the well-known protective role of antibodies and T cells during B. pertussis infection, innate immune responses such as the complement system play an essential role in B. pertussis killing. In order to evade this complement activation and colonize the human host, B. pertussis expresses several molecules that inhibit complement activation. Interestingly, one of the known complement evasion proteins, autotransporter Vag8, is highly expressed in the recently emerged B. pertussis isolates. Here, we describe the current knowledge on how B. pertussis evades complement-mediated killing. In addition, we compare this to complement evasion strategies used by other bacterial species. Finally, we discuss the consequences of complement evasion by B. pertussis on adaptive immunity and how identification of the bacterial molecules and the mechanisms involved in complement evasion might help improve pertussis vaccines.

  14. A mechanism of acquired resistance to complement-mediated lysis by Entamoeba histolytica.

    Science.gov (United States)

    Gutiérrez-Kobeh, L; Cabrera, N; Pérez-Montfort, R

    1997-04-01

    Some Entamoeba histolytica strains resist complement-mediated lysis by serum. Susceptible and resistant strains activate the complement system equivalently, but resistant amebas evade killing by membrane attack complexes. Our objective was to determine the mechanism by which trophozoites of E. histolytica resist lysis by human serum. Amebas were made resistant to lysis by incubation with increasing concentrations of normal human serum. The possibility that resistant cells ingest membrane attack complexes was explored by subcellular fractionation of susceptible and resistant trophozoites treated with sublytic concentrations of human serum containing radiolabeled C9. In both cases, most of the label was in the fractions containing plasma membrane. The susceptible strain consistently showed more label associated with these fractions than the resistant strain. Thus, the possibility that the membrane attack complexes were released to the medium was explored. Both resistant and susceptible trophozoites release to the medium similar amounts of material excluded by Sepharose CL-2B in the presence or absence of normal human serum. Labeled C9 elutes together with the main bulk of proteins from the medium: this indicates that it is not in vesicles or high molecular weight aggregates. Coincubation of susceptible amebas with lysates of resistant trophozoites confers resistance to susceptible cells within 30 min. Resistance to lysis by serum can also be acquired by susceptible amebas after coincubation with lysates from human erythrocytes or after feeding them with whole human red blood cells. Resistant but not susceptible trophozoites show intense immunofluorescent staining on their surface with anti-human erythrocytic membrane antibody. These results suggest that amebas acquire resistance to lysis by serum by incorporating into their membranes complement regulatory proteins.

  15. Complement activation and formation of the membrane attack complex on serogroup B Neisseria meningitidis in the presence or absence of serum bactericidal activity

    NARCIS (Netherlands)

    Drogari-Apiranthitou, M.; Kuijper, E. J.; Dekker, N. [=Nick; Dankert, J.

    2002-01-01

    Encapsulated meningococci are complement sensitive only in the presence of bactericidal antibodies by yet-unexplored mechanisms. The objective of this study was to investigate the involvement of major bacterial surface constituents on complement activation and membrane attack complex (MAC) formation

  16. The Surface-Exposed Protein SntA Contributes to Complement Evasion in Zoonotic Streptococcus suis.

    Science.gov (United States)

    Deng, Simin; Xu, Tong; Fang, Qiong; Yu, Lei; Zhu, Jiaqi; Chen, Long; Liu, Jiahui; Zhou, Rui

    2018-01-01

    Streptococcus suis is an emerging zoonotic pathogen causing streptococcal toxic shock like syndrome (STSLS), meningitis, septicemia, and even sudden death in human and pigs. Serious septicemia indicates this bacterium can evade the host complement surveillance. In our previous study, a functionally unknown protein SntA of S. suis has been identified as a heme-binding protein, and contributes to virulence in pigs. SntA can interact with the host antioxidant protein AOP2 and consequently inhibit its antioxidant activity. In the present study, SntA is identified as a cell wall anchored protein that functions as an important player in S. suis complement evasion. The C3 deposition and membrane attack complex (MAC) formation on the surface of sntA -deleted mutant strain Δ sntA are demonstrated to be significantly higher than the parental strain SC-19 and the complementary strain CΔ sntA . The abilities of anti-phagocytosis, survival in blood, and in vivo colonization of Δ sntA are obviously reduced. SntA can interact with C1q and inhibit hemolytic activity via the classical pathway. Complement activation assays reveal that SntA can also directly activate classical and lectin pathways, resulting in complement consumption. These two complement evasion strategies may be crucial for the pathogenesis of this zoonotic pathogen. Concerning that SntA is a bifunctional 2',3'-cyclic nucleotide 2'-phosphodiesterase/3'-nucleotidase in many species of Gram-positive bacteria, these complement evasion strategies may have common biological significance.

  17. Trypanosoma cruzi Evades the Complement System as an Efficient Strategy to Survive in the Mammalian Host: The Specific Roles of Host/Parasite Molecules and Trypanosoma cruzi Calreticulin

    Directory of Open Access Journals (Sweden)

    Galia Ramírez-Toloza

    2017-09-01

    Full Text Available American Trypanosomiasis is an important neglected reemerging tropical parasitism, infecting about 8 million people worldwide. Its agent, Trypanosoma cruzi, exhibits multiple mechanisms to evade the host immune response and infect host cells. An important immune evasion strategy of T. cruzi infective stages is its capacity to inhibit the complement system activation on the parasite surface, avoiding opsonizing, immune stimulating and lytic effects. Epimastigotes, the non-infective form of the parasite, present in triatomine arthropod vectors, are highly susceptible to complement-mediated lysis while trypomastigotes, the infective form, present in host bloodstream, are resistant. Thus T. cruzi susceptibility to complement varies depending on the parasite stage (amastigote, trypomastigotes or epimastigote and on the T. cruzi strain. To avoid complement-mediated lysis, T. cruzi trypomastigotes express on the parasite surface a variety of complement regulatory proteins, such as glycoprotein 58/68 (gp58/68, T. cruzi complement regulatory protein (TcCRP, trypomastigote decay-accelerating factor (T-DAF, C2 receptor inhibitor trispanning (CRIT and T. cruzi calreticulin (TcCRT. Alternatively, or concomitantly, the parasite captures components with complement regulatory activity from the host bloodstream, such as factor H (FH and plasma membrane-derived vesicles (PMVs. All these proteins inhibit different steps of the classical (CP, alternative (AP or lectin pathways (LP. Thus, TcCRP inhibits the CP C3 convertase assembling, gp58/68 inhibits the AP C3 convertase, T-DAF interferes with the CP and AP convertases assembling, TcCRT inhibits the CP and LP, CRIT confers ability to resist the CP and LP, FH is used by trypomastigotes to inhibit the AP convertases and PMVs inhibit the CP and LP C3 convertases. Many of these proteins have similar molecular inhibitory mechanisms. Our laboratory has contributed to elucidate the role of TcCRT in the host

  18. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  19. Streptococcus pneumoniae PspC Subgroup Prevalence in Invasive Disease and Differences in Contribution to Complement Evasion.

    Science.gov (United States)

    van der Maten, Erika; van den Broek, Bryan; de Jonge, Marien I; Rensen, Kim J W; Eleveld, Marc J; Zomer, Aldert L; Cremers, Amelieke J H; Ferwerda, Gerben; de Groot, Ronald; Langereis, Jeroen D; van der Flier, Michiel

    2018-04-01

    The pneumococcal capsular serotype is an important determinant of complement resistance and invasive disease potential, but other virulence factors have also been found to contribute. Pneumococcal surface protein C (PspC), a highly variable virulence protein that binds complement factor H to evade C3 opsonization, is divided into two subgroups: choline-bound subgroup I and LPxTG-anchored subgroup II. The prevalence of different PspC subgroups in invasive pneumococcal disease (IPD) and functional differences in complement evasion are unknown. The prevalence of PspC subgroups in IPD isolates was determined in a collection of 349 sequenced strains of Streptococcus pneumoniae isolated from adult patients. pspC deletion mutants and isogenic pspC switch mutants were constructed to study differences in factor H binding and complement evasion in relation to capsule thickness. Subgroup I pspC was far more prevalent in IPD isolates than subgroup II pspC The presence of capsule was associated with a greater ability of bound factor H to reduce complement opsonization. Pneumococcal subgroup I PspC bound significantly more factor H and showed more effective complement evasion than subgroup II PspC in isogenic encapsulated pneumococci. We conclude that variation in the PspC subgroups, independent of capsule serotypes, affects pneumococcal factor H binding and its ability to evade complement deposition. Copyright © 2018 American Society for Microbiology.

  20. CR2-mediated activation of the complement alternative pathway results in formation of membrane attack complexes on human B lymphocytes

    DEFF Research Database (Denmark)

    Nielsen, C H; Marquart, H V; Prodinger, W M

    2001-01-01

    of the CR1 binding site with the monoclonal antibody 3D9 also resulted in a minor reduction in MAC deposition, while FE8 and 3D9, in combination, markedly reduced deposition of both C3 fragments (91 +/- 5%) and C9 (95 +/- 3%). The kinetics of C3-fragment and MAC deposition, as well as the dependence of both......Normal human B lymphocytes activate the alternative pathway of complement via complement receptor type 2 (CR2, CD21), that binds hydrolysed C3 (iC3) and thereby promotes the formation of a membrane-bound C3 convertase. We have investigated whether this might lead to the generation of a C5...... convertase and consequent formation of membrane attack complexes (MAC). Deposition of C3 fragments and MAC was assessed on human peripheral B lymphocytes in the presence of 30% autologous serum containing 4.4 mM MgCl2/20 mM EGTA, which abrogates the classical pathway of complement without affecting...

  1. Identification and functional characterisation of Complement Regulator Acquiring Surface Protein-1 of serum resistant Borrelia garinii OspA serotype 4

    NARCIS (Netherlands)

    van Burgel, Nathalie D.; Kraiczy, Peter; Schuijt, Tim J.; Zipfel, Peter F.; van Dam, Alje P.

    2010-01-01

    B. burgdorferi sensu lato (sl) is the etiological agent of Lyme borreliosis in humans. Spirochetes have adapted themselves to the human immune system in many distinct ways. One important immune escape mechanism for evading complement activation is the binding of complement regulators Factor H (CFH)

  2. Pathogens' toolbox to manipulate human complement.

    Science.gov (United States)

    Fernández, Francisco J; Gómez, Sara; Vega, M Cristina

    2017-12-14

    The surveillance and pathogen fighting functions of the complement system have evolved to protect mammals from life-threatening infections. In turn, pathogens have developed complex molecular mechanisms to subvert, divert and evade the effector functions of the complement. The study of complement immunoevasion by pathogens sheds light on their infection drivers, knowledge that is essential to implement therapies. At the same time, complement evasion also acts as a discovery ground that reveals important aspects of how complement works under physiological conditions. In recent years, complex interrelationships between infection insults and the onset of autoimmune and complement dysregulation diseases have led to propose that encounters with pathogens can act as triggering factors for disease. The correct management of these diseases involves the recognition of their triggering factors and the development and administration of complement-associated molecular therapies. Even more recently, unsuspected proteins from pathogens have been shown to possess moonlighting functions as virulence factors, raising the possibility that behind the first line of virulence factors there be many more pathogen proteins playing secondary, helping and supporting roles for the pathogen to successfully establish infections. In an era where antibiotics have a progressively reduced effect on the management and control of infectious diseases worldwide, knowledge on the mechanisms of pathogenic invasion and evasion look more necessary and pressing than ever. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Mitigating Drive-By Download Attacks: Challenges and Open Problems

    Science.gov (United States)

    Egele, Manuel; Kirda, Engin; Kruegel, Christopher

    Malicious web sites perform drive-by download attacks to infect their visitors with malware. Current protection approaches rely on black- or white-listing techniques that are difficult to keep up-to-date. As todays drive-by attacks already employ encryption to evade network level detection we propose a series of techniques that can be implemented in web browsers to protect the user from such threats. In addition, we discuss challenges and open problems that these mechanisms face in order to be effective and efficient.

  4. Viral mimicry of the complement system

    Indian Academy of Sciences (India)

    The complement system is a potent innate immune mechanism consisting of cascades of proteins which are designed to fight against and annul intrusion of all the foreign pathogens. Although viruses are smaller in size and have relatively simple structure, they are not immune to complement attack. Thus, activation of the ...

  5. The Emerging Role of Complement Lectin Pathway in Trypanosomatids: Molecular Bases in Activation, Genetic Deficiencies, Susceptibility to Infection, and Complement System-Based Therapeutics

    Directory of Open Access Journals (Sweden)

    Ingrid Evans-Osses

    2013-01-01

    Full Text Available The innate immune system is evolutionary and ancient and is the pivotal line of the host defense system to protect against invading pathogens and abnormal self-derived components. Cellular and molecular components are involved in recognition and effector mechanisms for a successful innate immune response. The complement lectin pathway (CLP was discovered in 1990. These new components at the complement world are very efficient. Mannan-binding lectin (MBL and ficolin not only recognize many molecular patterns of pathogens rapidly to activate complement but also display several strategies to evade innate immunity. Many studies have shown a relation between the deficit of complement factors and susceptibility to infection. The recently discovered CLP was shown to be important in host defense against protozoan microbes. Although the recognition of pathogen-associated molecular patterns by MBL and Ficolins reveal efficient complement activations, an increase in deficiency of complement factors and diversity of parasite strategies of immune evasion demonstrate the unsuccessful effort to control the infection. In the present paper, we will discuss basic aspects of complement activation, the structure of the lectin pathway components, genetic deficiency of complement factors, and new therapeutic opportunities to target the complement system to control infection.

  6. Deletion of Crry and DAF on murine platelets stimulates thrombopoiesis and increases factor H-dependent resistance of peripheral platelets to complement attack.

    Science.gov (United States)

    Barata, Lidia; Miwa, Takashi; Sato, Sayaka; Kim, David; Mohammed, Imran; Song, Wen-Chao

    2013-03-15

    Complement receptor 1-related gene/protein y (Crry) and decay-accelerating factor (DAF) are two murine membrane C3 complement regulators with overlapping functions. Crry deletion is embryonically lethal whereas DAF-deficient mice are generally healthy. Crry(-/-)DAF(-/-) mice were viable on a C3(-/-) background, but platelets from such mice were rapidly destroyed when transfused into C3-sufficient mice. In this study, we used the cre-lox system to delete platelet Crry in DAF(-/-) mice and studied Crry/DAF-deficient platelet development in vivo. Rather than displaying thrombocytopenia, Pf4-Cre(+)-Crry(flox/flox) mice had normal platelet counts and their peripheral platelets were resistant to complement attack. However, chimera mice generated with Pf4-Cre(+)-Crry(flox/flox) bone marrows showed platelets from C3(-/-) but not C3(+/+) recipients to be sensitive to complement activation, suggesting that circulating platelets in Pf4-Cre(+)-Crry(flox/flox) mice were naturally selected in a complement-sufficient environment. Notably, Pf4-Cre(+)-Crry(flox/flox) mouse platelets became complement susceptible when factor H function was blocked. Examination of Pf4-Cre(+)-Crry(flox/flox) mouse bone marrows revealed exceedingly active thrombopoiesis. Thus, under in vivo conditions, Crry/DAF deficiency on platelets led to abnormal platelet turnover, but peripheral platelet count was compensated for by increased thrombopoiesis. Selective survival of Crry/DAF-deficient platelets aided by factor H protection and compensatory thrombopoiesis demonstrates the cooperation between membrane and fluid phase complement inhibitors and the body's ability to adaptively respond to complement regulator deficiencies.

  7. Further structural insights into the binding of complement factor H by complement regulator-acquiring surface protein 1 (CspA) of Borrelia burgdorferi

    International Nuclear Information System (INIS)

    Caesar, Joseph J. E.; Wallich, Reinhard; Kraiczy, Peter; Zipfel, Peter F.; Lea, Susan M.

    2013-01-01

    B. burgdorferi binds complement factor H using a dimeric surface protein, CspA (BbCRASP-1). Presented here is a new structure of CspA that suggests that there is a degree of flexibility between subunits which may have implications for complement regulator binding. Borrelia burgdorferi has evolved many mechanisms of evading the different immune systems across its range of reservoir hosts, including the capture and presentation of host complement regulators factor H and factor H-like protein-1 (FHL-1). Acquisition is mediated by a family of complement regulator-acquiring surface proteins (CRASPs), of which the atomic structure of CspA (BbCRASP-1) is known and shows the formation of a homodimeric species which is required for binding. Mutagenesis studies have mapped a putative factor H binding site to a cleft between the two subunits. Presented here is a new atomic structure of CspA which shows a degree of flexibility between the subunits which may be critical for factor H scavenging by increasing access to the binding interface and allows the possibility that the assembly can clamp around the bound complement regulators

  8. Complementing the sugar code: role of GAGs and sialic acid in complement regulation

    Directory of Open Access Journals (Sweden)

    Alex eLangford-Smith

    2015-02-01

    Full Text Available Sugar molecules play a vital role on both microbial and mammalian cells, where they are involved in cellular communication, govern microbial virulence and modulate host immunity and inflammatory responses. The complement cascade, as part of a host’s innate immune system, is a potent weapon against invading bacteria but has to be tightly regulated to prevent inappropriate attack and damage to host tissues. A number of complement regulators, such as factor H and properdin, interact with sugar molecules, such as glycosaminoglycans and sialic acid, on host and pathogen membranes and direct the appropriate complement response by either promoting the binding of complement activators or inhibitors. The binding of these complement regulators to sugar molecules can vary from location to location, due to their different specificities and because distinct structural and functional subpopulations of sugars are found in different human organs, such as the brain, kidney and eye. This review will cover recent studies that have provided important new insights into the role of glycosaminoglycans and sialic acid in complement regulation and how sugar recognition may be compromised in disease

  9. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  10. Evader Interdiction and Collateral Damage

    Energy Technology Data Exchange (ETDEWEB)

    Gutfraind, Alexander [Los Alamos National Laboratory

    2011-01-01

    In network interdiction problems, evaders (hostile agents or data packets) are moving through a network towards their targets and we wish to choose sensor placement locations in order to intercept them before they reach their destinations. Sensor locations should be chosen economically, balancing security gains with cost, including the inconvenience sensors inflict upon innocent travelers. We give optimal sensor allocation algorithms for several classes of special graphs and hardness and optimal approximation results for general graphs, including for deterministic or Markov chain-based and oblivious or reactive evaders. In a similar-sounding but much different problem setting posed by [10] where the innocent travelers can also be reactive, we again give optimal algorithms for special cases and hardness and (essentially) optimal approximation results on general graphs.

  11. Identification and functional characterisation of Complement Regulator Acquiring Surface Protein-1 of serum resistant Borrelia garinii OspA serotype 4

    Directory of Open Access Journals (Sweden)

    Zipfel Peter F

    2010-02-01

    Full Text Available Abstract Background B. burgdorferi sensu lato (sl is the etiological agent of Lyme borreliosis in humans. Spirochetes have adapted themselves to the human immune system in many distinct ways. One important immune escape mechanism for evading complement activation is the binding of complement regulators Factor H (CFH or Factor H-like protein1 (FHL-1 to Complement Regulator-Acquiring Surface Proteins (CRASPs. Results We demonstrate that B. garinii OspA serotype 4 (ST4 PBi resist complement-mediated killing by binding of FHL-1. To identify the primary ligands of FHL-1 four CspA orthologs from B. garinii ST4 PBi were cloned and tested for binding to human CFH and FHL-1. Orthologs BGA66 and BGA71 were found to be able to bind both complement regulators but with different intensities. In addition, all CspA orthologs were tested for binding to mammalian and avian CFH. Distinct orthologs were able to bind to CFH of different animal origins. Conclusions B. garinii ST4 PBi is able to evade complement killing and it can bind FHL-1 to membrane expressed proteins. Recombinant proteins BGA66 can bind FHL-1 and human CFH, while BGA71 can bind only FHL-1. All recombinant CspA orthologs from B. garinii ST4 PBi can bind CFH from different animal origins. This partly explains the wide variety of animals that can be infected by B. garinii.

  12. Pseudomonas aeruginosa alkaline protease blocks complement activation via the classical and lectin pathways.

    Science.gov (United States)

    Laarman, Alexander J; Bardoel, Bart W; Ruyken, Maartje; Fernie, Job; Milder, Fin J; van Strijp, Jos A G; Rooijakkers, Suzan H M

    2012-01-01

    The complement system rapidly detects and kills Gram-negative bacteria and supports bacterial killing by phagocytes. However, bacterial pathogens exploit several strategies to evade detection by the complement system. The alkaline protease (AprA) of Pseudomonas aeruginosa has been associated with bacterial virulence and is known to interfere with complement-mediated lysis of erythrocytes, but its exact role in bacterial complement escape is unknown. In this study, we analyzed how AprA interferes with complement activation and whether it could block complement-dependent neutrophil functions. We found that AprA potently blocked phagocytosis and killing of Pseudomonas by human neutrophils. Furthermore, AprA inhibited opsonization of bacteria with C3b and the formation of the chemotactic agent C5a. AprA specifically blocked C3b deposition via the classical and lectin pathways, whereas the alternative pathway was not affected. Serum degradation assays revealed that AprA degrades both human C1s and C2. However, repletion assays demonstrated that the mechanism of action for complement inhibition is cleavage of C2. In summary, we showed that P. aeruginosa AprA interferes with classical and lectin pathway-mediated complement activation via cleavage of C2.

  13. Deficiency of the complement regulator CD59a exacerbates Wallerian degeneration

    NARCIS (Netherlands)

    Ramaglia, Valeria; King, Rosalind Helen Mary; Morgan, Bryan Paul; Baas, Frank

    2009-01-01

    The complement system is implicated in Wallerian degeneration (WD). We have previously shown that the membrane attack complex (MAC) the terminal activation product of the complement cascade, mediates rapid axonal degradation and myelin clearance during WD after peripheral nerve injury. In this study

  14. Spontaneous complement activation on human B cells results in localized membrane depolarization and the clustering of complement receptor type 2 and C3 fragments

    DEFF Research Database (Denmark)

    Løbner, Morten; Leslie, Robert G Q; Prodinger, Wolfgang M

    2009-01-01

    While our previous studies have demonstrated that complement activation induced by complement receptors type 2 (CR2/CD21) and 1 (CR1/CD35) results in C3-fragment deposition and membrane attack complex (MAC) formation in human B cells, the consequences of these events for B-cell functions remain u...

  15. The hypervariable region of Streptococcus pyogenes M protein escapes antibody attack by antigenic variation and weak immunogenicity

    DEFF Research Database (Denmark)

    Lannergård, Jonas; Gustafsson, Caj Ulrik Mattias; Waldemarsson, Johan

    2011-01-01

    Sequence variation of antigenic proteins allows pathogens to evade antibody attack. The variable protein commonly includes a hypervariable region (HVR), which represents a key target for antibodies and is therefore predicted to be immunodominant. To understand the mechanism(s) of antibody evasion...

  16. Membrane attack complex of complement is not essential for immune mediated demyelination in experimental autoimmune neuritis.

    Science.gov (United States)

    Tran, Giang T; Hodgkinson, Suzanne J; Carter, Nicole M; Killingsworth, Murray; Nomura, Masaru; Verma, Nirupama D; Plain, Karren M; Boyd, Rochelle; Hall, Bruce M

    2010-12-15

    Antibody deposition and complement activation, especially membrane attack complex (MAC) formation are considered central for immune mediated demyelination. To examine the role of MAC in immune mediated demyelination, we studied experimental allergic neuritis (EAN) in Lewis rats deficient in complement component 6 (C6) that cannot form MAC. A C6 deficient Lewis (Lewis/C6-) strain of rats was bred by backcrossing the defective C6 gene, from PVG/C6- rats, onto the Lewis background. Lewis/C6- rats had the same C6 gene deletion as PVG/C6- rats and their sera did not support immune mediated haemolysis unless C6 was added. Active EAN was induced in Lewis and Lewis/C6- rats by immunization with bovine peripheral nerve myelin in complete Freund's adjuvant (CFA), and Lewis/C6- rats had delayed clinical EAN compared to the Lewis rats. Peripheral nerve demyelination in Lewis/C6- was also delayed but was similar in extent at the peak of disease. Compared to Lewis, Lewis/C6- nerves had no MAC deposition, reduced macrophage infiltrate and IL-17A, but similar T cell infiltrate and Th1 cytokine mRNA expression. ICAM-1 and P-selectin mRNA expression and immunostaining on vascular endothelium were delayed in Lewis C6- compared to Lewis rats' nerves. This study found that MAC was not required for immune mediated demyelination; but that MAC enhanced early symptoms and early demyelination in EAN, either by direct lysis or by sub-lytic induction of vascular endothelial expression of ICAM-1 and P-selectin. Copyright © 2010 Elsevier B.V. All rights reserved.

  17. The role of the complement system in diabetic nephropathy

    DEFF Research Database (Denmark)

    Flyvbjerg, Allan

    2017-01-01

    -threatening disease. An increasing body of evidence points toward a role of the complement system in the pathogenesis of diabetic nephropathy. For example, circulating levels of mannose-binding lectin (MBL), a pattern recognition molecule of the innate immune system, have emerged as a robust biomarker...... for the development and progression of this disease, and evidence suggests that MBL, H-ficolin, complement component C3 and the membrane attack complex might contribute to renal injury in the hyperglycaemic mileu. New approaches to modulate the complement system might lead to the development of new agents to prevent...

  18. Quantum Backaction Evading Measurement of Collective Mechanical Modes.

    Science.gov (United States)

    Ockeloen-Korppi, C F; Damskägg, E; Pirkkalainen, J-M; Clerk, A A; Woolley, M J; Sillanpää, M A

    2016-09-30

    The standard quantum limit constrains the precision of an oscillator position measurement. It arises from a balance between the imprecision and the quantum backaction of the measurement. However, a measurement of only a single quadrature of the oscillator can evade the backaction and be made with arbitrary precision. Here we demonstrate quantum backaction evading measurements of a collective quadrature of two mechanical oscillators, both coupled to a common microwave cavity. The work allows for quantum state tomography of two mechanical oscillators, and provides a foundation for macroscopic mechanical entanglement and force sensing beyond conventional quantum limits.

  19. Linear Pursuit Differential Game under Phase Constraint on the State of Evader

    Directory of Open Access Journals (Sweden)

    Askar Rakhmanov

    2016-01-01

    Full Text Available We consider a linear pursuit differential game of one pursuer and one evader. Controls of the pursuer and evader are subjected to integral and geometric constraints, respectively. In addition, phase constraint is imposed on the state of evader, whereas pursuer moves throughout the space. We say that pursuit is completed, if inclusion y(t1-x(t1∈M is satisfied at some t1>0, where x(t and y(t are states of pursuer and evader, respectively, and M is terminal set. Conditions of completion of pursuit in the game from all initial points of players are obtained. Strategy of the pursuer is constructed so that the phase vector of the pursuer first is brought to a given set, and then pursuit is completed.

  20. The membrane attack complex of complement contributes to plasmin-induced synthesis of platelet-activating factor by endothelial cells and neutrophils.

    Science.gov (United States)

    Lupia, Enrico; Del Sorbo, Lorenzo; Bergerone, Serena; Emanuelli, Giorgio; Camussi, Giovanni; Montrucchio, Giuseppe

    2003-08-01

    Thrombolytic agents, used to restore blood flow to ischaemic tissues, activate several enzymatic systems with pro-inflammatory effects, thus potentially contributing to the pathogenesis of ischaemia-reperfusion injury. Platelet-activating factor (PAF), a phospholipid mediator of inflammation, has been implicated in the pathogenesis of this process. We previously showed that the infusion of streptokinase (SK) induces the intravascular release of PAF in patients with acute myocardial infarction (AMI), and that cultured human endothelial cells (EC) synthesized PAF in response to SK and plasmin (PLN). In the present study, we investigated the role of the membrane attack complex (MAC) of complement in the PLN-induced synthesis of PAF. In vivo, we showed a correlation between the levels of soluble terminal complement components (sC5b-9) and the concentrations of PAF detected in blood of patients with AMI infused with SK. In vitro both EC and polymorphonuclear neutrophils (PMN), incubated in the presence of PLN and normal human serum, showed an intense staining for the MAC neoepitope, while no staining was detected when they were incubated with PLN in the presence of heat-inactivated normal human serum. Moreover, the insertion of MAC on EC and PMN plasmamembrane elicited the synthesis of PAF. In conclusion, our results elucidate the mechanisms involved in PAF production during the activation of the fibrinolytic system, showing a role for complement products in this setting. The release of PAF may increase the inflammatory response, thus limiting the beneficial effects of thrombolytic therapy. Moreover, it may have a pathogenic role in other pathological conditions, such as transplant rejection, tumoral angiogenesis, and septic shock, where fibrinolysis is activated.

  1. A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids

    Energy Technology Data Exchange (ETDEWEB)

    Hodge, Brian S [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Wu, Yifu [University of Akron; Wei, Jin [University of Akron

    2017-07-31

    Distributed Energy Resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. As most of these generators are geographically dispersed, dedicated communications investments for every generator are capital cost prohibitive. Real-time distributed communications middleware, which supervises, organizes and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs, allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the Quality of Experience (QoE) measures to complement the conventional Quality of Service (QoS) information to detect and mitigate the congestion attacks effectively. The simulation results illustrate the efficiency of our proposed communications middleware architecture.

  2. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  3. Ooperipäevad Saaremaal (II) / Tiiu Levald

    Index Scriptorium Estoniae

    Levald, Tiiu, 1940-

    2008-01-01

    21.-27. VII Saaremaa ooperipäevade raames toimunud üritustest - Carmen Tabori lavastatud Aino Kallase ja Tauno Pylkkäneni "Patseba Saaremaal" (esimene osa draama- ja teine ooperilavastus), Gershwini ooperist "Porgy ja Bess" ning 25. VII toimunud galakontserdist

  4. A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Yifu; Wei, Jin; Hodge, Bri-Mathias

    2017-05-24

    Distributed energy resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. Because most of these generators are geographically dispersed, dedicated communications investments for every generator are capital-cost prohibitive. Real-time distributed communications middleware - which supervises, organizes, and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs - allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the quality of experience measures to complement the conventional quality of service information to effectively detect and mitigate congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.

  5. A novel method for direct measurement of complement convertases activity in human serum.

    Science.gov (United States)

    Blom, A M; Volokhina, E B; Fransson, V; Strömberg, P; Berghard, L; Viktorelius, M; Mollnes, T E; López-Trascasa, M; van den Heuvel, L P; Goodship, T H; Marchbank, K J; Okroj, M

    2014-10-01

    Complement convertases are enzymatic complexes that play a central role in sustaining and amplification of the complement cascade. Impairment of complement function leads directly or indirectly to pathological conditions, including higher infection rate, kidney diseases, autoimmune- or neurodegenerative diseases and ischaemia-reperfusion injury. An assay for direct measurement of activity of the convertases in patient sera is not available. Existing assays testing convertase function are based on purified complement components and, thus, convertase formation occurs under non-physiological conditions. We designed a new assay, in which C5 blocking compounds enabled separation of the complement cascade into two phases: the first ending at the stage of C5 convertases and the second ending with membrane attack complex formation. The use of rabbit erythrocytes or antibody-sensitized sheep erythrocytes as the platforms for convertase formation enabled easy readout based on measurement of haemolysis. Thus, properties of patient sera could be studied directly regarding convertase activity and membrane attack complex formation. Another advantage of this assay was the possibility to screen for host factors such as C3 nephritic factor and other anti-complement autoantibodies, or gain-of-function mutations, which prolong the half-life of complement convertases. Herein, we present proof of concept, detailed description and validation of this novel assay. © 2014 British Society for Immunology.

  6. Complement System Part II: Role in Immunity

    Science.gov (United States)

    Merle, Nicolas S.; Noe, Remi; Halbwachs-Mecarelli, Lise; Fremeaux-Bacchi, Veronique; Roumenina, Lubka T.

    2015-01-01

    The complement system has been considered for a long time as a simple lytic cascade, aimed to kill bacteria infecting the host organism. Nowadays, this vision has changed and it is well accepted that complement is a complex innate immune surveillance system, playing a key role in host homeostasis, inflammation, and in the defense against pathogens. This review discusses recent advances in the understanding of the role of complement in physiology and pathology. It starts with a description of complement contribution to the normal physiology (homeostasis) of a healthy organism, including the silent clearance of apoptotic cells and maintenance of cell survival. In pathology, complement can be a friend or a foe. It acts as a friend in the defense against pathogens, by inducing opsonization and a direct killing by C5b–9 membrane attack complex and by triggering inflammatory responses with the anaphylatoxins C3a and C5a. Opsonization plays also a major role in the mounting of an adaptive immune response, involving antigen presenting cells, T-, and B-lymphocytes. Nevertheless, it can be also an enemy, when pathogens hijack complement regulators to protect themselves from the immune system. Inadequate complement activation becomes a disease cause, as in atypical hemolytic uremic syndrome, C3 glomerulopathies, and systemic lupus erythematosus. Age-related macular degeneration and cancer will be described as examples showing that complement contributes to a large variety of conditions, far exceeding the classical examples of diseases associated with complement deficiencies. Finally, we discuss complement as a therapeutic target. PMID:26074922

  7. The role of complement receptors type 1 (CR1, CD35) and 2 (CR2, CD21) in promoting C3 fragment deposition and membrane attack complex formation on normal peripheral human B cells

    DEFF Research Database (Denmark)

    Nielsen, Claus Henrik; Pedersen, Morten Løbner; Marquart, Hanne Vibeke Hansen

    2002-01-01

    Normal human B lymphocytes are known to activate the alternative pathway (AP) of complement, leading to C3-fragment deposition and membrane attack complex (MAC) formation. The process is mediated via complement receptor type 2 (CR2, CD21), with complement receptor type 1 (CR1, CD35) playing...... a subsidiary role. In this study, we examine the relative contributions of CR1 and CR2 to the deposition of C3 fragments and MAC on B lymphocytes under circumstances where all complement pathways are operational. C3-fragment deposition and MAC formation were assessed on human peripheral B lymphocytes...... in the presence of 30% autologous serum. Blocking the CR2 ligand-binding site with monoclonal antibody (mAb) FE8 resulted in significant reduction (37.9+/-11.9%) in C3-fragment deposition, whereas MAC formation was only marginally affected (12.1+/-22.2% reduction). Blocking the CR1 binding-site resulted...

  8. Täna algavad Eesti Muusika Päevad

    Index Scriptorium Estoniae

    2004-01-01

    Eesti Muusika Päevade raames toimunud üritustest 21. aprillini: ERSO sümfooniakontserdist Estonia kontserdisaalis, Jüri Reinvere radiofoonilise ooperi "Vastaskallas" esiettekandest Tallinna Linnateatri Hobuveski saalis, kontserdist Kunstihoone Vabaduse väljakul (esitusel Urmas Sisaski uus "Tähistaeva tsükkel" - "Eesti rahvataevas"), lastekontserdist "Kodumaine viis" Estonia kontserdisaalis

  9. Muusika : Jeremija nutulaulud palmipuudepühal. Jätkub "Musica Grande". Lihavõttetervitus Barcelonast. Rannap "Selges eesti helikeeles". Juba XIII trompetipäevad. III klavessiinipäevad / Jaan-Eik Tulve

    Index Scriptorium Estoniae

    Tulve, Jaan-Eik, 1967-

    2002-01-01

    Vox Clamantise kontsertidest Tartus ja Tallinnas. Jätkub sari "Musica Grande" kontsertidega Tartus ja Tallinnas pealkirjaga "Kontsertlik". Eestisse sõidab esinema üks Hispaania tippkoore Coral Cantiga Barcelonast. Rein Rannapi tänavusest suurprojektist, klaveriõhtust "Selges eesti helikeeles". 1. - 7. aprillini toimuvad EMA rahvusvahelised trompetipäevad. 4. - 7. aprillini korraldab Eesti Klavessiinisõprade Tsunft III klavessiinipäevad

  10. Genetic Association of the Porcine C9 Complement Component with Hemolytic Complement Activity

    Directory of Open Access Journals (Sweden)

    D. V. A. Khoa

    2015-09-01

    Full Text Available The complement system is a part of the natural immune regulation mechanism against invading pathogens. Complement activation from three different pathways (classical, lectin, and alternative leads to the formation of C5-convertase, an enzyme for cleavage of C5 into C5a and C5b, followed by C6, C7, C8, and C9 in membrane attack complex. The C9 is the last complement component of the terminal lytic pathway, which plays an important role in lysis of the target cells depending on its self-polymerization to form transmembrane channels. To address the association of C9 with traits related to disease resistance, the complete porcine C9 cDNA was comparatively sequenced to detect single nucleotide polymorphisms (SNPs in pigs of the breeds Hampshire (HS, Duroc (DU, Berlin miniature pig (BMP, German Landrace (LR, Pietrain (PIE, and Muong Khuong (Vietnamese potbelly pig. Genotyping was performed in 417 F2 animals of a resource population (DUMI: DU×BMP that were vaccinated with Mycoplasma hyopneumoniae, Aujeszky diseases virus and porcine respiratory and reproductive syndrome virus at 6, 14 and 16 weeks of age, respectively. Two SNPs were detected within the third exon. One of them has an amino acid substitution. The European porcine breeds (LR and PIE show higher allele frequency of these SNPs than Vietnamese porcine breed (MK. Association of the substitution SNP with hemolytic complement activity indicated statistically significant differences between genotypes in the classical pathway but not in the alternative pathway. The interactions between eight time points of measurement of complement activity before and after vaccinations and genotypes were significantly different. The difference in hemolytic complement activity in the both pathways depends on genotype, kind of vaccine, age and the interaction to the other complement components. These results promote the porcine C9 (pC9 as a candidate gene to improve general animal health in the future.

  11. XX rahvusvahelised trompetipäevad / Valdo Rüütelmaa

    Index Scriptorium Estoniae

    Rüütelmaa, Valdo

    2009-01-01

    17. märtsist kuni 5. aprillini Eesti Muusika- ja Teatriakadeemias toimunud rahvusvahelistest 20. trompetipäevadest, mille raames toimus 5. aprillil konkurss "Trompetitalendid 2009" . Trompetipäevade korraldaja Aavo Otsaga

  12. Relative Contribution of Cellular Complement Inhibitors CD59, CD46, and CD55 to Parainfluenza Virus 5 Inhibition of Complement-Mediated Neutralization

    Directory of Open Access Journals (Sweden)

    Yujia Li

    2018-04-01

    Full Text Available The complement system is a part of the innate immune system that viruses need to face during infections. Many viruses incorporate cellular regulators of complement activation (RCA to block complement pathways and our prior work has shown that Parainfluenza virus 5 (PIV5 incorporates CD55 and CD46 to delay complement-mediated neutralization. In this paper, we tested the role of a third individual RCA inhibitor CD59 in PIV5 interactions with complement pathways. Using a cell line engineered to express CD59, we show that small levels of functional CD59 are associated with progeny PIV5, which is capable of blocking assembly of the C5b-C9 membrane attack complex (MAC. PIV5 containing CD59 (PIV5-CD59 showed increased resistance to complement-mediated neutralization in vitro comparing to PIV5 lacking regulators. Infection of A549 cells with PIV5 and RSV upregulated CD59 expression. TGF-beta treatment of PIV5-infected cells also increased cell surface CD59 expression and progeny virions were more resistant to complement-mediated neutralization. A comparison of individual viruses containing only CD55, CD46, or CD59 showed a potency of inhibiting complement-mediated neutralization, which followed a pattern of CD55 > CD46 > CD59.

  13. Pärnus algavad homme Ungari kultuuripäevad / Teet Roossaar

    Index Scriptorium Estoniae

    Roossaar, Teet

    2005-01-01

    Ungari organist Miklos Teleki orelikontsertidest 3. sept. Eliisabeti kirikus ja 4. sept. Pärnu-Jaagupi kirikus ning Pärnu Linnaorkestri hooaja avakontserdist 4. sept. Pärnu kontserdimajas Ungari kultuuripäevade raames

  14. M. leprae components induce nerve damage by complement activation: identification of lipoarabinomannan as the dominant complement activator.

    Science.gov (United States)

    Bahia El Idrissi, Nawal; Das, Pranab K; Fluiter, Kees; Rosa, Patricia S; Vreijling, Jeroen; Troost, Dirk; Morgan, B Paul; Baas, Frank; Ramaglia, Valeria

    2015-05-01

    Peripheral nerve damage is the hallmark of leprosy pathology but its etiology is unclear. We previously identified the membrane attack complex (MAC) of the complement system as a key determinant of post-traumatic nerve damage and demonstrated that its inhibition is neuroprotective. Here, we determined the contribution of the MAC to nerve damage caused by Mycobacterium leprae and its components in mouse. Furthermore, we studied the association between MAC and the key M. leprae component lipoarabinomannan (LAM) in nerve biopsies of leprosy patients. Intraneural injections of M. leprae sonicate induced MAC deposition and pathological changes in the mouse nerve, whereas MAC inhibition preserved myelin and axons. Complement activation occurred mainly via the lectin pathway and the principal activator was LAM. In leprosy nerves, the extent of LAM and MAC immunoreactivity was robust and significantly higher in multibacillary compared to paucibacillary donors (p = 0.01 and p = 0.001, respectively), with a highly significant association between LAM and MAC in the diseased samples (r = 0.9601, p = 0.0001). Further, MAC co-localized with LAM on axons, pointing to a role for this M. leprae antigen in complement activation and nerve damage in leprosy. Our findings demonstrate that MAC contributes to nerve damage in a model of M. leprae-induced nerve injury and its inhibition is neuroprotective. In addition, our data identified LAM as the key pathogen associated molecule that activates complement and causes nerve damage. Taken together our data imply an important role of complement in nerve damage in leprosy and may inform the development of novel therapeutics for patients.

  15. Complement activation by ceramide transporter proteins.

    Science.gov (United States)

    Bode, Gerard H; Losen, Mario; Buurman, Wim A; Veerhuis, Robert; Molenaar, Peter C; Steinbusch, Harry W M; De Baets, Marc H; Daha, Mohamed R; Martinez-Martinez, Pilar

    2014-02-01

    C1q is the initiator of the classical complement pathway and, as such, is essential for efficient opsonization and clearance of pathogens, altered self-structures, and apoptotic cells. The ceramide transporter protein (CERT) and its longer splicing isoform CERTL are known to interact with extracellular matrix components, such as type IV collagen, and with the innate immune protein serum amyloid P. In this article, we report a novel function of CERT in the innate immune response. Both CERT isoforms, when immobilized, were found to bind the globular head region of C1q and to initiate the classical complement pathway, leading to activation of C4 and C3, as well as generation of the membrane attack complex C5b-9. In addition, C1q was shown to bind to endogenous CERTL on the surface of apoptotic cells. These results demonstrate the role of CERTs in innate immunity, especially in the clearance of apoptotic cells.

  16. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.

    Science.gov (United States)

    Rajivan, Prashanth; Gonzalez, Cleotilde

    2018-01-01

    Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in

  17. Optimal interdiction of unreactive Markovian evaders

    Energy Technology Data Exchange (ETDEWEB)

    Gutfraind, Alexander [Los Alamos National Laboratory; Hagberg, Aric [Los Alamos National Laboratory; Pan, Feng [Los Alamos National Laboratory

    2008-01-01

    The network interdiction problem arises in a wide variety of areas including military logistics, infectious disease control and counter-terrorism. In the classical formulation one is given a weighted network G(N, E) and the task is to find b nodes (or edges) whose removal would maximally increase the least-cost path from a source node s to a target node r. In practical applications. G represenLs a transportation or activity network; node/edge removal is done by an agent, the 'interdictor' against another agent the 'evader' who wants to traverse G from s to t along the least-cost route. Our work is motivated by cases in which both agents have bounded rationality: e.g. when the authorities set up road blocks to catch bank robbers, neither party can plot its actions with full information about the other. We introduce a novel model of network interdiction in which the motion of (possibly) several evaders i. described by a Markov pr cess on G.We further suppose that the evaden; do not respond to interdiction decisions because of time, knowledge or computational constraint . We prove that this interdiction problem is NP-hard, like the classical formulation, but unlike the classical problem the objective function is submodular. This implies that the solution could be approximated within 1-lie using a greedy algorithm. Exploiting submodularity again. we demonstrate that a 'priority' (or 'lazy') evaluation algorithm can improve performance by orders of magnitude. Taken together, the results bring closer realistic solutions to the interdiction problem on global-scale networks.

  18. Evaluating the Impact of Juice Filming Charging Attack in Practical Environments

    DEFF Research Database (Denmark)

    Meng, Weizhi; Lee, Wang; Liu, Zhe

    2018-01-01

    Nowadays, smartphones are widely adopted in people’s daily lives. With the increasing capability, phone charging has become a basic requirement and a large number of public charging facilitates are under construction for this purpose. However, public charging stations may open a hole for cyber-cr...... then for the first time investigate the impact of JFC attack under three practical scenarios. Our work aims to complement the state-of-the-art and stimulate more research in this area....... the whole charging period. Due to the potential damage of JFC attacks, there is a need to investigate its influence in practical scenarios. Motivated by this, in this work, we firstly conduct a large user survey with over 2500 participants about their awareness and attitude towards charging attacks. We......-criminals to launch various attacks, especially charging attacks, to steal phone user’s private information. Juice filming charging (JFC) attack is one such threat, which can refer users’ sensitive information from both Android OS and iOS devices, through automatically monitoring and recording phone screen during...

  19. Trichobothrial mediation of an aquatic escape response: Directional jumps by the fishing spider, Dolomedes triton, foil frog attacks

    Directory of Open Access Journals (Sweden)

    Robert B. Suter

    2003-07-01

    Full Text Available Fishing spiders (Pisauridae frequent the surfaces of ponds and streams and thereby expose themselves to predation by a variety of aquatic and semi-aquatic vertebrates. To assess the possibility that the impressive jumps of fishing spiders from the water surface function in evading attacks by frogs, attacks by bullfrogs (Rana catesbiana and green frogs (R. clamitans on Dolomedes triton were studied. Both the attack dynamics of the frogs and the evasive behaviors of the spiders were recorded at 250 frames per second. A freeze-dried bullfrog, propelled toward spiders with acceleration, posture, and position that approximated the natural attack posture and dynamics, was used to assess the spiders' behavior. Qualitatively, the spiders responded to these mock-attacks just as they had to attacks by live frogs: jumping (N=29 jumps, 56.9% of instances, rearing the legs nearest the attacking frog (N=15, 29.4%, or showing no visible response (N=7, 13.7%. Spiders that jumped always did so away (in the vertical plane from the attack (mean =137° vs. vertical at 90° or horizontally toward the frog at 0°. The involvement of the trichobothria (leg hairs sensitive to air movements, and the eyes as sensory mediators of the evasion response was assessed. Spiders with deactivated trichobothria were significantly impaired relative to intact and sham-deactivated spiders, and relative to spiders in total darkness. Thus, functional trichobothria, unlike the eyes, are both necessary and sufficient mediators of the evasion response. Measurements of air flow during frog attacks suggest that an exponential rise in flow velocity is the airborne signature of an attack.

  20. Tartu Kevadpäevad 2008 : Nädalajagu muusikat igale maitsele / Signe Tamberg

    Index Scriptorium Estoniae

    Tamberg, Signe

    2008-01-01

    Tartu Kevadpäevad 2008 muusikaprogrammis: 34. tudengilaulu võistlusest 29. apr. Tartu Sadamateatris, öölaulupeost 28. apr. Kassitoome orus, kontsertidest "Rokime!" 2. mail ja "Folgime" 3. mail Raekoja platsil

  1. Dynamics of human complement-mediated killing of Klebsiella pneumoniae.

    Science.gov (United States)

    Nypaver, Christina M; Thornton, Margaret M; Yin, Suellen M; Bracho, David O; Nelson, Patrick W; Jones, Alan E; Bortz, David M; Younger, John G

    2010-11-01

    With an in vitro system that used a luminescent strain of Klebsiella pneumoniae to assess bacterial metabolic activity in near-real-time, we investigated the dynamics of complement-mediated attack in healthy individuals and in patients presenting to the emergency department with community-acquired severe sepsis. A novel mathematical/statistical model was developed to simplify light output trajectories over time into two fitted parameters, the rate of complement activation and the delay from activation to the onset of killing. Using Factor B-depleted serum, the alternative pathway was found to be the primary bactericidal effector: In the absence of B, C3 opsonization as measured by flow cytometry did not progress and bacteria proliferated near exponentially. Defects in bacterial killing were easily demonstrable in patients with severe sepsis compared with healthy volunteers. In most patients with sepsis, the rate of activation was higher than in normal subjects but was associated with a prolonged delay between activation and bacterial killing (P < 0.05 for both). Theoretical modeling suggested that this combination of accentuated but delayed function should allow successful bacterial killing but with significantly greater complement activation. The use of luminescent bacteria allowed for the development of a novel and powerful tool for assessing complement immunology for the purposes of mechanistic study and patient evaluation.

  2. Yersinia enterocolitica serum resistance proteins YadA and ail bind the complement regulator C4b-binding protein.

    Directory of Open Access Journals (Sweden)

    Vesa Kirjavainen

    Full Text Available Many pathogens are equipped with factors providing resistance against the bactericidal action of complement. Yersinia enterocolitica, a Gram-negative enteric pathogen with invasive properties, efficiently resists the deleterious action of human complement. The major Y. enterocolitica serum resistance determinants include outer membrane proteins YadA and Ail. Lipopolysaccharide (LPS O-antigen (O-ag and outer core (OC do not contribute directly to complement resistance. The aim of this study was to analyze a possible mechanism whereby Y. enterocolitica could inhibit the antibody-mediated classical pathway of complement activation. We show that Y. enterocolitica serotypes O:3, O:8, and O:9 bind C4b-binding protein (C4bp, an inhibitor of both the classical and lectin pathways of complement. To identify the C4bp receptors on Y. enterocolitica serotype O:3 surface, a set of mutants expressing YadA, Ail, O-ag, and OC in different combinations was tested for the ability to bind C4bp. The studies showed that both YadA and Ail acted as C4bp receptors. Ail-mediated C4bp binding, however, was blocked by the O-ag and OC, and could be observed only with mutants lacking these LPS structures. C4bp bound to Y. enterocolitica was functionally active and participated in the factor I-mediated degradation of C4b. These findings show that Y. enterocolitica uses two proteins, YadA and Ail, to bind C4bp. Binding of C4bp could help Y. enterocolitica to evade complement-mediated clearance in the human host.

  3. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

    DEFF Research Database (Denmark)

    Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu

    2017-01-01

    ) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector...... that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500...... participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging...

  4. Eesti Suusapäevad Jay Peak´is / Peeter Teedla ; fotod: Peeter Teedla

    Index Scriptorium Estoniae

    Teedla, Peeter

    2006-01-01

    märtsikuu esimesel nädalalõpul idaranniku eestlaste suusapäevad, osavõtjaid 156, paljud perekondade ja väikeste lastega, organiseerijaks Kristin Raamot. Peeti murdmaasuusatamise - ja slaalomivõistlused

  5. Complement is activated in progressive multiple sclerosis cortical grey matter lesions.

    Science.gov (United States)

    Watkins, Lewis M; Neal, James W; Loveless, Sam; Michailidou, Iliana; Ramaglia, Valeria; Rees, Mark I; Reynolds, Richard; Robertson, Neil P; Morgan, B Paul; Howell, Owain W

    2016-06-22

    The symptoms of multiple sclerosis (MS) are caused by damage to myelin and nerve cells in the brain and spinal cord. Inflammation is tightly linked with neurodegeneration, and it is the accumulation of neurodegeneration that underlies increasing neurological disability in progressive MS. Determining pathological mechanisms at play in MS grey matter is therefore a key to our understanding of disease progression. We analysed complement expression and activation by immunocytochemistry and in situ hybridisation in frozen or formalin-fixed paraffin-embedded post-mortem tissue blocks from 22 progressive MS cases and made comparisons to inflammatory central nervous system disease and non-neurological disease controls. Expression of the transcript for C1qA was noted in neurons and the activation fragment and opsonin C3b-labelled neurons and glia in the MS cortical and deep grey matter. The density of immunostained cells positive for the classical complement pathway protein C1q and the alternative complement pathway activation fragment Bb was significantly increased in cortical grey matter lesions in comparison to control grey matter. The number of cells immunostained for the membrane attack complex was elevated in cortical lesions, indicating complement activation to completion. The numbers of classical (C1-inhibitor) and alternative (factor H) pathway regulator-positive cells were unchanged between MS and controls, whilst complement anaphylatoxin receptor-bearing microglia in the MS cortex were found closely apposed to cortical neurons. Complement immunopositive neurons displayed an altered nuclear morphology, indicative of cell stress/damage, supporting our finding of significant neurodegeneration in cortical grey matter lesions. Complement is activated in the MS cortical grey matter lesions in areas of elevated numbers of complement receptor-positive microglia and suggests that complement over-activation may contribute to the worsening pathology that underlies the

  6. Märtsipäevade valupisaraid peab lastele näitama / Anu Bollverk

    Index Scriptorium Estoniae

    Bollverk, Anu

    2009-01-01

    1949. aasta märtsiküüditamisele pühendatud mälestuspäevast Koeru kultuurimajas ning sealse huviteatri poolt ette kantud Herbert Lasti näidendist "Valupisarais märtsipäevad" (lavastajad Herbert Last ja Uno Aav)

  7. Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks

    DEFF Research Database (Denmark)

    Meng, Weizhi; Fei, Fei; Li, Wenjuan

    2017-01-01

    The increasingly high demand for smartphone charging in people’s daily lives has apparently encouraged much more public charging stations to be deployed in various places (e.g., shopping malls, airports). However, these public charging facilities may open a hole for cyber-criminals to infer private...... information and data from smartphone users. Juice filming charging (JFC) attack is a particular type of charging attacks, which is capable of stealing users’ sensitive information from both Android OS and iOS devices, through automatically monitoring and recording phone screen during the whole charging period...... one in collecting users’ information at large and extracting sensitive data with a higher accuracy. Our work aims to complement existing results and stimulate more efforts in defending smartphones against charging threats....

  8. Tsetse GmmSRPN10 has anti-complement activity and is important for successful establishment of trypanosome infections in the fly midgut.

    Directory of Open Access Journals (Sweden)

    Cher-Pheng Ooi

    2015-01-01

    Full Text Available The complement cascade in mammalian blood can damage the alimentary tract of haematophagous arthropods. As such, these animals have evolved their own repertoire of complement-inactivating factors, which are inadvertently exploited by blood-borne pathogens to escape complement lysis. Unlike the bloodstream stages, the procyclic (insect stage of Trypanosoma brucei is highly susceptible to complement killing, which is puzzling considering that a tsetse takes a bloodmeal every 2-4 days. In this study, we identified four tsetse (Glossina morsitans morsitans serine protease inhibitors (serpins from a midgut expressed sequence tag (EST library (GmmSRPN3, GmmSRPN5, GmmSRPN9 and GmmSRPN10 and investigated their role in modulating the establishment of a T. brucei infection in the midgut. Although not having evolved in a common blood-feeding ancestor, all four serpins have an active site sharing remarkable homology with the human complement C1-inhibitor serpin, SerpinG1. RNAi knockdown of individual GmmSRPN9 and GmmSRPN10 genes resulted in a significant decreased rate of infection by procyclic form T. brucei. Furthermore, recombinant GmmSRPN10 was both able to inhibit the activity of human complement-cascade serine proteases, C1s and Factor D, and to protect the in vitro killing of procyclic trypanosomes when incubated with complement-activated human serum. Thus, the secretion of serpins, which may be part of a bloodmeal complement inactivation system in tsetse, is used by procyclic trypanosomes to evade an influx of fresh trypanolytic complement with each bloodmeal. This highlights another facet of the complicated relationship between T. brucei and its tsetse vector, where the parasite takes advantage of tsetse physiology to further its chances of propagation and transmission.

  9. Tsetse GmmSRPN10 has anti-complement activity and is important for successful establishment of trypanosome infections in the fly midgut.

    Science.gov (United States)

    Ooi, Cher-Pheng; Haines, Lee R; Southern, Daniel M; Lehane, Michael J; Acosta-Serrano, Alvaro

    2015-01-01

    The complement cascade in mammalian blood can damage the alimentary tract of haematophagous arthropods. As such, these animals have evolved their own repertoire of complement-inactivating factors, which are inadvertently exploited by blood-borne pathogens to escape complement lysis. Unlike the bloodstream stages, the procyclic (insect) stage of Trypanosoma brucei is highly susceptible to complement killing, which is puzzling considering that a tsetse takes a bloodmeal every 2-4 days. In this study, we identified four tsetse (Glossina morsitans morsitans) serine protease inhibitors (serpins) from a midgut expressed sequence tag (EST) library (GmmSRPN3, GmmSRPN5, GmmSRPN9 and GmmSRPN10) and investigated their role in modulating the establishment of a T. brucei infection in the midgut. Although not having evolved in a common blood-feeding ancestor, all four serpins have an active site sharing remarkable homology with the human complement C1-inhibitor serpin, SerpinG1. RNAi knockdown of individual GmmSRPN9 and GmmSRPN10 genes resulted in a significant decreased rate of infection by procyclic form T. brucei. Furthermore, recombinant GmmSRPN10 was both able to inhibit the activity of human complement-cascade serine proteases, C1s and Factor D, and to protect the in vitro killing of procyclic trypanosomes when incubated with complement-activated human serum. Thus, the secretion of serpins, which may be part of a bloodmeal complement inactivation system in tsetse, is used by procyclic trypanosomes to evade an influx of fresh trypanolytic complement with each bloodmeal. This highlights another facet of the complicated relationship between T. brucei and its tsetse vector, where the parasite takes advantage of tsetse physiology to further its chances of propagation and transmission.

  10. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  11. Soluble form of membrane attack complex independently predicts mortality and cardiovascular events in patients with ST-elevation myocardial infarction treated with primary percutaneous coronary intervention

    DEFF Research Database (Denmark)

    Lindberg, Søren; Pedersen, Sune H; Mogelvang, Rasmus

    2012-01-01

    The complement system is an important mediator of inflammation, which plays a pivotal role in atherosclerosis and acute myocardial infarction (AMI). Animal studies suggest that activation of the complement cascade resulting in the formation of soluble membrane attack complex (sMAC), contributes...

  12. Evading Lyth bound in models of quintessential inflation

    International Nuclear Information System (INIS)

    Hossain, Md. Wali; Myrzakulov, R.; Sami, M.; Saridakis, Emmanuel N.

    2014-01-01

    Quintessential inflation refers to an attempt to unify inflation and late-time cosmic acceleration using a single scalar field. In this letter we consider two different classes of quintessential inflation, one of which is based upon a Lagrangian with non-canonical kinetic term k 2 (ϕ)∂ μ ϕ∂ μ ϕ and a steep exponential potential while the second class uses the concept of steep brane world inflation. We show that in both cases the Lyth bound can be evaded, despite the large tensor-to-scalar ratio of perturbations. The post-inflationary dynamics is consistent with nucleosynthesis constraint in these cases

  13. evad : [luuletused] / Philip Larkin ; inglise keelest tlk. Maarja Kangro

    Index Scriptorium Estoniae

    Larkin, Philip

    2007-01-01

    Sisu: Päevad ; Mitte midagi öelda ; See olgu värss ; Uurimus lugemisharjumustest ; Hommage valitsusele ; Vesi ; Vajakud ; Viige üks koju lastele ; Jutt voodis ; Kõrged aknad ; Sa jätkad elu ; Kui. Orig.: Days ; Nothing to be said ; This be the verse ; A study of reading habits ; Homage to a government ; Water ; Wants ; Take one home for the kiddies ; Talking in bed ; High windows ; Continuing to live ; If

  14. Pyoverdine, the Major Siderophore in Pseudomonas aeruginosa, Evades NGAL Recognition

    Directory of Open Access Journals (Sweden)

    Mary E. Peek

    2012-01-01

    Full Text Available Pseudomonas aeruginosa is the most common pathogen that persists in the cystic fibrosis lungs. Bacteria such as P. aeruginosa secrete siderophores (iron-chelating molecules and the host limits bacterial growth by producing neutrophil-gelatinase-associated lipocalin (NGAL that specifically scavenges bacterial siderophores, therefore preventing bacteria from establishing infection. P. aeruginosa produces a major siderophore known as pyoverdine, found to be important for bacterial virulence and biofilm development. We report that pyoverdine did not bind to NGAL, as measured by tryptophan fluorescence quenching, while enterobactin bound to NGAL effectively causing a strong response. The experimental data indicate that pyoverdine evades NGAL recognition. We then employed a molecular modeling approach to simulate the binding of pyoverdine to human NGAL using NGAL’s published crystal structures. The docking of pyoverdine to NGAL predicted nine different docking positions; however, neither apo- nor ferric forms of pyoverdine docked into the ligand-binding site in the calyx of NGAL where siderophores are known to bind. The molecular modeling results offer structural support that pyoverdine does not bind to NGAL, confirming the results obtained in the tryptophan quenching assay. The data suggest that pyoverdine is a stealth siderophore that evades NGAL recognition allowing P. aeruginosa to establish chronic infections in CF lungs.

  15. Bacteriophages use hypermodified nucleosides to evade host's defence systems

    DEFF Research Database (Denmark)

    Kot, Witold; Olsen, Nikoline S.; Carstens, Alexander Byth

    developed several strategies to evade these defence mechanisms. Ultimately, this led to the oldest and still running arms race - microorganisms vs. their molecular parasites. We here describe a remarkable new strategy used by the recently isolated Escherichia coli phage CAjan belonging to...... to investigate this mechanism in detail we have used several methods including direct plaque sequencing, restriction endonuclease analysis and CRISPR-Cas genome editing. Through generation of specific mutants, we were able to introduce a restriction sensitive phenotype in the CAjan bacteriophage providing new...

  16. Complement activation, endothelial dysfunction, insulin resistance and chronic heart failure

    DEFF Research Database (Denmark)

    Bjerre, M.; Kistorp, C.; Hansen, T.K.

    2010-01-01

    Objectives. Patients with chronic heart failure (CHF) have an exaggerated immune response, endothelial damage/dysfunction, and increased risk of diabetes mellitus (DM). The inter-relationship(s) between indices of complement activation (soluble membrane attack complex, sMAC), inflammation (hs...... to ischemic heart disease (IHD) as compared with CHF patients with non-ischemic ethiology (p = 0.02), but were not predictive of survival or progression of CHF. A moderate strong relation between sMAC and sEsel levels was found beta = 0.33 (p ... damaging of the heart tissue...

  17. Eesti Muusika Päevad 2000 : ECPNMi juhatus Tallinnas / Consuelo Diez ; interv. Evelin Kõrvits

    Index Scriptorium Estoniae

    Diez, Consuelo

    2000-01-01

    28.-30. apr. pidas Tallinnas aastakoosolekut ning külastas Eesti Muusika Päevade kontserte ECPNMi (European Conference of Promoters of New Music) juhatus. ECPNMi juhatuse liikmed räägivad uue muusika üritustest oma riikides, muljeid eesti muusika päevadelt

  18. Level of complement activity predicts cardiac dysfunction after acute myocardial infarction treated with primary percutaneous coronary intervention

    DEFF Research Database (Denmark)

    Haahr-Pedersen, Sune; Bjerre, Mette; Flyvbjerg, Allan

    2009-01-01

    BACKGROUND: The positive effect of reperfusion after ST-elevation myocardial infarction (STEMI) can be reduced by ischemic/reperfusion (I/R) injury.Mannose-binding-lectin (MBL) and soluble C5b-9 (membrane-attack-complex) are involved in complement-driven cell lysis and may play a role in human...... with increased risk of cardiac dysfunction in STEMI patients treated with pPCI, probably due to increased complement activity during the ischemic and reperfusion process. The predictive value of low peripheral plasma sC5b-9 may be explained by an accumulation and activation of sC5b-9 in the infarcted myocardium....

  19. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  20. Developmentally regulated expression by Trypanosoma cruzi of molecules that accelerate the decay of complement C3 convertases

    International Nuclear Information System (INIS)

    Rimoldi, M.T.; Sher, A.; Heiny, A.; Lituchy, A.; Hammer, C.H.; Joiner, K.

    1988-01-01

    The authors recently showed that culture-derived metacyclic trypomastigotes (CMT), but not epimastigotes (Epi), of the Miranda 99 strain of Trypanosoma cruzi evade lysis by the human alternative complement pathway because of inefficient binding of factor B to complement component C3b on the parasite surface. These results suggested that CMT and tissue-culture-derived trypomastigotes (TCT), which also activate the alternative pathway poorly, might produce a molecule capable of interfering with factor B binding to C3b. They now demonstrate that CMT and TCT lysates, as well as molecules spontaneously shed from CMT and TCT but not Epi, accelerate decay of 125 I-labeled factor Bb from the alternative-pathway C3 convertase (C3bBb) assembled on zymosan or Epi and also accelerate decay of the classical-pathway C3 convertase (C4b2a) on sheep erythrocytes. Parasites metabolically labeled with [ 35 S]methionine spontaneously shed a limited number of radioactive components, ranging in molecular mass from 86 to 155 kDa for trypomastigotes and 25 to 80 kDa for Epi. Decay-accelerating activity within supernatants is inactivated by papain and is coeluted with 35 S-containing polypeptides on FPLC anion-exchange chromatography, suggesting that the active constituents are protein molecules. Molecules with decay-accelerating activity may explain the developmentally regulated resistance to complement-mediated lysis in infective and vertebrate stages for T. cruzi life cycle

  1. Lübecki filmipäevad 1999 ja Thomas Manni ekraniseering 1923 / Lauri Kärk

    Index Scriptorium Estoniae

    Kärk, Lauri, 1954-

    1999-01-01

    4.-7. novembrini Lübeckis toimunud Põhjamaade filmipäevade 41. Nordische Filmtage huvitavamatest filmidest, nagu Thomas Manni "Buddenbrookide" ekraniseering 1923. aastast (režissöör Gerhard Lamprecht) ja Rasmus Gerlachi dokumentaal "Operaator Kaufman" Dziga Vertovist ja tema kahest, samuti kino alal tegutsenud vennast

  2. Eesti muusika päevad - üks kord aastas, kõigile / Jelena Gandshu

    Index Scriptorium Estoniae

    Gandshu, Jelena

    2008-01-01

    Muusikateadlased Jelena Gandshu ja Gerhard Lock, heliloojad Age Hirv ja Liis Jürgens 3.-10. aprillini toimunud Eesti muusika päevade kontsertidest: kinos Sõprus "Sensatsioon!!!", Kultuuritehases Polymer "Cellissimo", Estonia kontserdisaalis ERSO "Sümfoonilised hääled", Tallinna raekojas Mihkel Poll ja Oliver Kuusik, Katariina kirikus PaukenfEst, Nigulistes Jüri Reinvere autorikontsert. Järgneb

  3. Why Do Firms Evade Taxes? The Role of Information Sharing and Financial Sector Outreach

    NARCIS (Netherlands)

    Beck, T.H.L.; Lin, C.; Ma, Y.

    2010-01-01

    Informality is a wide-spread phenomenon across the globe. We show that firms in countries with better information sharing systems and greater financial sector outreach evade taxes to a lesser degree, an effect that is stronger for smaller firms, firms in smaller cities and towns, and firms in

  4. Escape and evade control policies for ensuring the physical security of nonholonomic, ground-based, unattended mobile sensor nodes

    Science.gov (United States)

    Mascarenas, David; Stull, Christopher; Farrar, Charles

    2011-06-01

    In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.

  5. Activation of the ficolin-lectin pathway during attacks of hereditary angioedema

    DEFF Research Database (Denmark)

    Csuka, Dorottya; Munthe-Fog, Lea; Hein, Estrid

    2014-01-01

    enrolled. We analyzed blood samples drawn during attacks, and obtained 35 samples from the same patients during symptom-free periods. The serum levels of ficolin-2, ficolin-3, MASP-2, ficolin-3/MASP-2 complex, C1-INH, and C4, as well as the extent of ficolin-3-mediated terminal complement complex (FCN3-TCC......) deposition, were measured using ELISA-based methods. RESULTS: Levels of MASP-2 and of the ficolin-3/MASP-2 complex were elevated (P TCC was lower (P TCC...

  6. An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Yifu; Mendis, Gihan J.; He, Youbiao; Wei, Jin; Hodge, Bri-Mathias

    2017-05-04

    In recent years, the increasing penetration of Distributed Energy Resources (DERs) has made an impact on the operation of the electric power systems. In the grid integration of DERs, data acquisition systems and communications infrastructure are crucial technologies to maintain system economic efficiency and reliability. Since most of these generators are relatively small, dedicated communications investments for every generator are capital cost prohibitive. Combining real-time attack-resilient communications middleware with Internet of Things (IoTs) technologies allows for the use of existing infrastructure. In our paper, we propose an intelligent communication middleware that utilizes the Quality of Experience (QoE) metrics to complement the conventional Quality of Service (QoS) evaluation. Furthermore, our middleware employs deep learning techniques to detect and defend against congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.

  7. Testing the ability of viral haemorrhagic septicaemia virus to evade the protective immune response induced in rainbow trout by DNA vaccination

    DEFF Research Database (Denmark)

    Sepulveda, Dagoberto; Lorenzen, Niels

    2013-01-01

    , this work aims to evaluate whether VHSV is able to evade the protective immune response induced by the DNA vaccination. Earlier studies have demonstrated that VHSV can evade the neutralizing effect of monoclonal antibodies by mutations in the glycoprotein gene. One approach of the present study is therefore...... to try to isolate VHSV variants which can escape the neutralizing activity of serum from fish immunized with the DNA vaccine. To do so, a highly pathogenic VHSV isolate (DK3592B) will be repeatedly passaged in fish cell cultures in the presence of neutralizing fish serum. Another approach comprises...

  8. CR2-mediated activation of the complement alternative pathway results in formation of membrane attack complexes on human B lymphocytes

    DEFF Research Database (Denmark)

    Nielsen, C H; Marquart, H V; Prodinger, W M

    2001-01-01

    the alternative pathway. Blockade of the CR2 ligand-binding site with the monoclonal antibody FE8 resulted in 56 +/- 13% and 71 +/- 9% inhibition of the C3-fragment and MAC deposition, respectively, whereas the monoclonal antibody HB135, directed against an irrelevant CR2 epitope, had no effect. Blockade......Normal human B lymphocytes activate the alternative pathway of complement via complement receptor type 2 (CR2, CD21), that binds hydrolysed C3 (iC3) and thereby promotes the formation of a membrane-bound C3 convertase. We have investigated whether this might lead to the generation of a C5...... processes on CR2, indicate that MAC formation is a consequence of alternative pathway activation....

  9. Trichinella spiralis Calreticulin Binds Human Complement C1q As an Immune Evasion Strategy.

    Science.gov (United States)

    Zhao, Limei; Shao, Shuai; Chen, Yi; Sun, Ximeng; Sun, Ran; Huang, Jingjing; Zhan, Bin; Zhu, Xinping

    2017-01-01

    As a multicellular parasitic nematode, Trichinella spiralis regulates host immune responses by producing a variety of immunomodulatory molecules to escape from host immune attack, but the mechanisms underlying the immune evasion are not well understood. Here, we identified that T. spiralis calreticulin ( Ts -CRT), a Ca 2+ -binding protein, facilitated T. spiralis immune evasion by interacting with the first component of human classical complement pathway, C1q. In the present study, Ts -CRT was found to be expressed on the surface of different developmental stages of T. spiralis as well as in the secreted products of adult and muscle larval worms. Functional analysis identified that Ts -CRT was able to bind to human C1q, resulting in the inhibition of C1q-initiated complement classical activation pathway reflected by reduced C4/C3 generation and C1q-dependent lysis of antibody-sensitized sheep erythrocytes. Moreover, recombinant Ts -CRT (r Ts -CRT) binding to C1q suppressed C1q-induced THP-1-derived macrophages chemotaxis and reduced monocyte-macrophages release of reactive oxygen intermediates (ROIs). Blocking Ts -CRT on the surface of newborn larvae (NBL) of T. spiralis with anti- Ts -CRT antibody increased the C1q-mediated adherence of monocyte-macrophages to larvae and impaired larval infectivity. All of these results suggest that T. spiralis -expressed Ts -CRT plays crucial roles in T. spiralis immune evasion and survival in host mostly by directly binding to host complement C1q, which not only reduces C1q-mediated activation of classical complement pathway but also inhibits the C1q-induced non-complement activation of macrophages.

  10. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  11. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  12. Characterization of shark complement factor I gene(s): genomic analysis of a novel shark-specific sequence.

    Science.gov (United States)

    Shin, Dong-Ho; Webb, Barbara M; Nakao, Miki; Smith, Sylvia L

    2009-07-01

    Complement factor I is a crucial regulator of mammalian complement activity. Very little is known of complement regulators in non-mammalian species. We isolated and sequenced four highly similar complement factor I cDNAs from the liver of the nurse shark (Ginglymostoma cirratum), designated as GcIf-1, GcIf-2, GcIf-3 and GcIf-4 (previously referred to as nsFI-a, -b, -c and -d) which encode 689, 673, 673 and 657 amino acid residues, respectively. They share 95% (shark-specific sequence between the leader peptide (LP) and the factor I membrane attack complex (FIMAC) domain. The cDNA sequences differ only in the size and composition of the shark-specific region (SSR). Sequence analysis of each SSR has identified within the region two novel short sequences (SS1 and SS2) and three repeat sequences (RS1-3). Genomic analysis has revealed the existence of three introns between the leader peptide and the FIMAC domain, tentatively designated intron 1, intron 2, and intron 3 which span 4067, 2293 and 2082bp, respectively. Southern blot analysis suggests the presence of a single gene copy for each cDNA type. Phylogenetic analysis suggests that complement factor I of cartilaginous fish diverged prior to the emergence of mammals. All four GcIf cDNA species are expressed in four different tissues and the liver is the main tissue in which expression level of all four is high. This suggests that the expression of GcIf isotypes is tissue-dependent.

  13. Complement Activation in Inflammatory Skin Diseases

    Directory of Open Access Journals (Sweden)

    Jenny Giang

    2018-04-01

    Full Text Available The complement system is a fundamental part of the innate immune system, playing a crucial role in host defense against various pathogens, such as bacteria, viruses, and fungi. Activation of complement results in production of several molecules mediating chemotaxis, opsonization, and mast cell degranulation, which can contribute to the elimination of pathogenic organisms and inflammation. Furthermore, the complement system also has regulating properties in inflammatory and immune responses. Complement activity in diseases is rather complex and may involve both aberrant expression of complement and genetic deficiencies of complement components or regulators. The skin represents an active immune organ with complex interactions between cellular components and various mediators. Complement involvement has been associated with several skin diseases, such as psoriasis, lupus erythematosus, cutaneous vasculitis, urticaria, and bullous dermatoses. Several triggers including auto-antibodies and micro-organisms can activate complement, while on the other hand complement deficiencies can contribute to impaired immune complex clearance, leading to disease. This review provides an overview of the role of complement in inflammatory skin diseases and discusses complement factors as potential new targets for therapeutic intervention.

  14. DO PENALTIES AND ENFORCEMENT MEASURES MAKE TAXPAYERS MORE COMPLIANT? THE VIEW OF AUSTRALIAN TAX EVADERS

    OpenAIRE

    Dr Ken Devos

    2013-01-01

    The tax compliance literature indicates that many factors, including, economic, social, psychological and demographic, impact upon the compliance behaviour of individual taxpayers. This study explores the relationship, if any, that exists between selected tax compliance and demographic variables and the compliance behaviour of Australian individual tax evaders. The study employed a mixed method research approach comprising both a survey and interviews. The findings revealed that tax law enfor...

  15. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  16. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  17. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  18. How type 1 fimbriae help Escherichia coli to evade extracellular antibiotics.

    Science.gov (United States)

    Avalos Vizcarra, Ima; Hosseini, Vahid; Kollmannsberger, Philip; Meier, Stefanie; Weber, Stefan S; Arnoldini, Markus; Ackermann, Martin; Vogel, Viola

    2016-01-05

    To survive antibiotics, bacteria use two different strategies: counteracting antibiotic effects by expression of resistance genes or evading their effects e.g. by persisting inside host cells. Since bacterial adhesins provide access to the shielded, intracellular niche and the adhesin type 1 fimbriae increases bacterial survival chances inside macrophages, we asked if fimbriae also influenced survival by antibiotic evasion. Combined gentamicin survival assays, flow cytometry, single cell microscopy and kinetic modeling of dose response curves showed that type 1 fimbriae increased the adhesion and internalization by macrophages. This was caused by strongly decreased off-rates and affected the number of intracellular bacteria but not the macrophage viability and morphology. Fimbriae thus promote antibiotic evasion which is particularly relevant in the context of chronic infections.

  19. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  20. CSF coccidioides complement fixation

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/003526.htm CSF coccidioides complement fixation test To use the sharing features on this page, please enable JavaScript. CSF coccidioides complement fixation is a test that checks ...

  1. Controlling the complement system in inflammation.

    Science.gov (United States)

    Kirschfink, M

    1997-12-01

    Inappropriate or excessive activation of the complement system can lead to harmful, potentially life-threatening consequences due to severe inflammatory tissue destruction. These consequences are clinically manifested in various disorders, including septic shock, multiple organ failure and hyperacute graft rejection. Genetic complement deficiencies or complement depletion have been proven to be beneficial in reducing tissue injury in a number of animal models of severe complement-dependent inflammation. It is therefore believed that therapeutic inhibition of complement is likely to arrest the process of certain diseases. Attempts to efficiently inhibit complement include the application of endogenous soluble complement inhibitors (C1-inhibitor, recombinant soluble complement receptor 1- rsCR1), the administration of antibodies, either blocking key proteins of the cascade reaction (e.g. C3, C5), neutralizing the action of the complement-derived anaphylatoxin C5a, or interfering with complement receptor 3 (CR3, CD18/11b)-mediated adhesion of inflammatory cells to the vascular endothelium. In addition, incorporation of membrane-bound complement regulators (DAF-CD55, MCP-CD46, CD59) has become possible by transfection of the correspondent cDNA into xenogeneic cells. Thereby, protection against complement-mediated inflammatory tissue damage could be achieved in various animal models of sepsis, myocardial as well as intestinal ischemia/reperfusion injury, adult respiratory distress syndrome, nephritis and graft rejection. Supported by results from first clinical trials, complement inhibition appears to be a suitable therapeutic approach to control inflammation. Current strategies to specifically inhibit complement in inflammation have been discussed at a recent meeting on the 'Immune Consequences of Trauma, Shock and Sepsis', held from March 4-8, 1997, in Munich, Germany. The Congress (chairman: E. Faist, Munich, Germany), which was held in close cooperation with various

  2. Nanomedicine and the complement paradigm.

    Science.gov (United States)

    Moghimi, S Moein; Farhangrazi, Z Shadi

    2013-05-01

    The role of complement in idiosyncratic reactions to nanopharmaceutical infusion is receiving increasing attention. We discuss this in relation to nanopharmaceutical development and the possible use of complement inhibitors to prevent related adverse reactions. We further call on initiation of genetic association studies to unravel the genetic basis of nanomedicine infusion-related adverse responses, since most of the polymorphic genes in the genome belong to the immune system. In this paper, idiosyncratic reactions based on complement activation are discussed in the context of newly available complement inhibitors. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. Mesenchymal stromal cells engage complement and complement receptor bearing innate effector cells to modulate immune responses.

    Directory of Open Access Journals (Sweden)

    Guido Moll

    Full Text Available Infusion of human third-party mesenchymal stromal cells (MSCs appears to be a promising therapy for acute graft-versus-host disease (aGvHD. To date, little is known about how MSCs interact with the body's innate immune system after clinical infusion. This study shows, that exposure of MSCs to blood type ABO-matched human blood activates the complement system, which triggers complement-mediated lymphoid and myeloid effector cell activation in blood. We found deposition of complement component C3-derived fragments iC3b and C3dg on MSCs and fluid-phase generation of the chemotactic anaphylatoxins C3a and C5a. MSCs bound low amounts of immunoglobulins and lacked expression of complement regulatory proteins MCP (CD46 and DAF (CD55, but were protected from complement lysis via expression of protectin (CD59. Cell-surface-opsonization and anaphylatoxin-formation triggered complement receptor 3 (CD11b/CD18-mediated effector cell activation in blood. The complement-activating properties of individual MSCs were furthermore correlated with their potency to inhibit PBMC-proliferation in vitro, and both effector cell activation and the immunosuppressive effect could be blocked either by using complement inhibitor Compstatin or by depletion of CD14/CD11b-high myeloid effector cells from mixed lymphocyte reactions. Our study demonstrates for the first time a major role of the complement system in governing the immunomodulatory activity of MSCs and elucidates how complement activation mediates the interaction with other immune cells.

  4. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  5. Complement Evasion by Pathogenic Leptospira.

    Science.gov (United States)

    Fraga, Tatiana Rodrigues; Isaac, Lourdes; Barbosa, Angela Silva

    2016-01-01

    Leptospirosis is a neglected infectious disease caused by spirochetes from the genus Leptospira . Pathogenic microorganisms, notably those which reach the blood circulation such as Leptospira , have evolved multiple strategies to escape the host complement system, which is important for innate and acquired immunity. Leptospira avoid complement-mediated killing through: (i) recruitment of host complement regulators; (ii) acquisition of host proteases that cleave complement proteins on the bacterial surface; and, (iii) secretion of proteases that inactivate complement proteins in the Leptospira surroundings. The recruitment of host soluble complement regulatory proteins includes the acquisition of Factor H (FH) and FH-like-1 (alternative pathway), C4b-binding protein (C4BP) (classical and lectin pathways), and vitronectin (Vn) (terminal pathway). Once bound to the leptospiral surface, FH and C4BP retain cofactor activity of Factor I in the cleavage of C3b and C4b, respectively. Vn acquisition by leptospires may result in terminal pathway inhibition by blocking C9 polymerization. The second evasion mechanism lies in plasminogen (PLG) binding to the leptospiral surface. In the presence of host activators, PLG is converted to enzymatically active plasmin, which is able to degrade C3b, C4b, and C5 at the surface of the pathogen. A third strategy used by leptospires to escape from complement system is the active secretion of proteases. Pathogenic, but not saprophytic leptospires, are able to secrete metalloproteases that cleave C3 (central complement molecule), Factor B (alternative pathway), and C4 and C2 (classical and lectin pathways). The purpose of this review is to fully explore these complement evasion mechanisms, which act together to favor Leptospira survival and multiplication in the host.

  6. Spear Phishing Attack Detection

    Science.gov (United States)

    2011-03-24

    be sufficiently evaded by encrypting the malware. A similar approach is used by Kolter et al. in [KoM04] and later in [KoM06], where they used data...MeM11] [Mes08] [MKK07] [Off10] [RaS02] [Rep09] J. Z. Kolter and M. A. Maloof. ―Learning to detect...York: ACM, 2004. J. Z. Kolter and M. A. Maloof. ―Learning to detect and classify malicious executables in the Wild,‖ The Journal of Machine Learning

  7. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  8. Complement Activation in Arterial and Venous Thrombosis is Mediated by Plasmin

    Directory of Open Access Journals (Sweden)

    Jonathan H. Foley

    2016-03-01

    Full Text Available Thrombus formation leading to vaso-occlusive events is a major cause of death, and involves complex interactions between coagulation, fibrinolytic and innate immune systems. Leukocyte recruitment is a key step, mediated partly by chemotactic complement activation factors C3a and C5a. However, mechanisms mediating C3a/C5a generation during thrombosis have not been studied. In a murine venous thrombosis model, levels of thrombin–antithrombin complexes poorly correlated with C3a and C5a, excluding a central role for thrombin in C3a/C5a production. However, clot weight strongly correlated with C5a, suggesting processes triggered during thrombosis promote C5a generation. Since thrombosis elicits fibrinolysis, we hypothesized that plasmin activates C5 during thrombosis. In vitro, the catalytic efficiency of plasmin-mediated C5a generation greatly exceeded that of thrombin or factor Xa, but was similar to the recognized complement C5 convertases. Plasmin-activated C5 yielded a functional membrane attack complex (MAC. In an arterial thrombosis model, plasminogen activator administration increased C5a levels. Overall, these findings suggest plasmin bridges thrombosis and the immune response by liberating C5a and inducing MAC assembly. These new insights may lead to the development of strategies to limit thrombus formation and/or enhance resolution.

  9. Complement fixation test to C burnetii

    Science.gov (United States)

    ... complement fixation test; Coxiella burnetii - complement fixation test; C burnetii - complement fixation test ... a specific foreign substance ( antigen ), in this case, C burnetii . Antibodies defend the body against bacteria, viruses, ...

  10. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  11. Noun complement clauses as referential modifiers

    Directory of Open Access Journals (Sweden)

    Carlos de Cuba

    2017-01-01

    Full Text Available A number of recent analyses propose that so-called noun complement clauses should be analyzed as a type of relative clause. In this paper, I present a number of complications for any analysis that equates noun complement clauses to relative clauses, and conclude that this type of analysis is on the wrong track. I present cross-linguistic evidence showing that the syntactic behavior of noun complement clauses does not pattern with relative clauses. Patterns of complementizer choice and complementizer drop as well as patterns involving main clause phenomena and extraction differ in the two constructions, which I argue is unexpected under a relative clause analysis that involves operator movement. Instead I present an alternative analysis in which I propose that the referentiality of a noun complement clause is linked to its syntactic behavior. Following recent work, I claim that referential clauses have a syntactically truncated left-periphery, and this truncation can account for the lack of main clause phenomena in noun complement clauses. I argue that the truncation analysis is also able to accommodate complementizer data patterns more easily than relative clause analyses that appeal to operator movement.

  12. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  13. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  14. The Epidermal Growth Factor Receptor Is a Regulator of Epidermal Complement Component Expression and Complement Activation

    DEFF Research Database (Denmark)

    Abu-Humaidan, Anas H A; Ananthoju, Nageshwar; Mohanty, Tirthankar

    2014-01-01

    The complement system is activated in response to tissue injury. During wound healing, complement activation seems beneficial in acute wounds but may be detrimental in chronic wounds. We found that the epidermal expression of many complement components was only increased to a minor extent in skin...

  15. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  16. Complement-coagulation cross-talk: a potential mediator of the physiological activation of complement by low pH

    Directory of Open Access Journals (Sweden)

    Hany Ibrahim Kenawy

    2015-05-01

    Full Text Available The complement system is a major constituent of the innate immune system. It not only bridges innate and adaptive arms of the immune system but also links the immune system with the coagulation system. Current understanding of the role of complement has extended far beyond fighting of infections, and now encompasses maintenance of homeostasis, tissue regeneration and pathophysiology of multiple diseases. It has been known for many years that complement activation is strongly pH sensitive, but only relatively recently has the physiological significance of this been appreciated. Most complement assays are carried out at the physiological pH 7.4. However, pH in some extracellular compartments, for example renal tubular fluid in parts of the tubule, and extracellular fluid at inflammation loci, is sufficiently acidic to activate complement. The exact molecular mechanism of this activation is still unclear, but possible cross talk between the contact system and complement may exist at low pH with subsequent complement activation. The current article reviews the published data on the effect of pH on the contact system and complement activity, the nature of the pH sensor molecules, and the clinical implications of these effects. Of particular interest is chronic kidney disease (CKD accompanied by metabolic acidosis, in which therapeutic alkalinisation of urine has been shown significantly to reduce tubular complement activation products, an effect which may have important implications for slowing progression of CKD.

  17. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  18. GLUCOCORTICOSTEROIDS' EFFECT UPON THE COMPLEMENT LEVEL

    Directory of Open Access Journals (Sweden)

    Voja Pavlovic

    2001-03-01

    Full Text Available The effect of high doses of cortisol upon the level of the overall complements'hemolytic activity and particular complements' components is studies. The experimentsinvolved guinea pigs of male sex of the body mass from 300 to 400 g, namelythose that have not been treated by anything so far. The doses of hydrocortisone(Hemofarm DD were also used for the experiment. The overall complements'activity was determined by testing the capabilities of a series of various solutions ofthe guinea pigs' serum to separate sheep erythrocytes that were made sensitive byrabbit anti-erythrocyte antibodies. The determination of the C1, C2, C3 and C4complements' components was done by the method of the quantitative diffusion ofthe radial type by using the Partigen blocks Behringwerke AG. The series comprised25 guinea pigs of male sex. The low cortisol level rapidly increase the overallhemolytic activity of the complements of the C1 est erase concentration. Along withthe cortisol dose increase the overall hemolytic complements' activity is dropping aswell as that of the C1, C2, C3 and C4 complements' components.

  19. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  20. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  1. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  2. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  3. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  4. Uudised : Üheteistkümnendad trompetipäevad. Eesti Muusikanõukogus. Tüüri "Motus I" Londonis / Kadri Ruudi

    Index Scriptorium Estoniae

    Ruudi, Kadri

    2000-01-01

    4.-15. apr. toimuvad EMA XI trompetipäevad. 14.-19. märtsil viibis Eestis IMC asepresident F. Müller-Heuser, 22. märtsil toimus EMN juhatuse koosolek. 19. märtsil andis Londoni South Bank Centre'is kontserdi P. Carneiro, kes tõi Inglismaal esiettekandele ka E.-S. Tüüri teose "Motus I"

  5. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  6. Parasitic Cape honeybee workers, Apis mellifera capensis, evade policing

    Science.gov (United States)

    Martin, Stephen J.; Beekman, Madeleine; Wossler, Theresa C.; Ratnieks, Francis L. W.

    2002-01-01

    Relocation of the Cape honeybee, Apis mellifera capensis, by bee-keepers from southern to northern South Africa in 1990 has caused widespread death of managed African honeybee, A. m. scutellata, colonies. Apis mellifera capensis worker bees are able to lay diploid, female eggs without mating by means of automictic thelytoky (meiosis followed by fusion of two meiotic products to restore egg diploidy), whereas workers of other honeybee subspecies are able to lay only haploid, male eggs. The A. m. capensis workers, which are parasitizing and killing A. m. scutellata colonies in northern South Africa, are the asexual offspring of a single, original worker in which the small amount of genetic variation observed is due to crossing over during meiosis (P. Kryger, personal communication). Here we elucidate two principal mechanisms underlying this parasitism. Parasitic A. m. capensis workers activate their ovaries in host colonies that have a queen present (queenright colonies), and they lay eggs that evade being killed by other workers (worker policing)-the normal fate of worker-laid eggs in colonies with a queen. This unique parasitism by workers is an instance in which a society is unable to control the selfish actions of its members.

  7. XY sex chromosome complement, compared with XX, in the CNS confers greater neurodegeneration during experimental autoimmune encephalomyelitis.

    Science.gov (United States)

    Du, Sienmi; Itoh, Noriko; Askarinam, Sahar; Hill, Haley; Arnold, Arthur P; Voskuhl, Rhonda R

    2014-02-18

    Women are more susceptible to multiple sclerosis (MS) and have more robust immune responses than men. However, men with MS tend to demonstrate a more progressive disease course than women, suggesting a disconnect between the severity of an immune attack and the CNS response to a given immune attack. We have previously shown in an MS model, experimental autoimmune encephalomyelitis, that autoantigen-sensitized XX lymph node cells, compared with XY, are more encephalitogenic. These studies demonstrated an effect of sex chromosomes in the induction of immune responses, but did not address a potential role of sex chromosomes in the CNS response to immune-mediated injury. Here, we examined this possibility using XX versus XY bone marrow chimeras reconstituted with a common immune system of one sex chromosomal type. We found that experimental autoimmune encephalomyelitis mice with an XY sex chromosome complement in the CNS, compared with XX, demonstrated greater clinical disease severity with more neuropathology in the spinal cord, cerebellum, and cerebral cortex. A candidate gene on the X chromosome, toll-like receptor 7, was then examined. Toll-like receptor 7 expression in cortical neurons was higher in mice with XY compared with mice with XX CNS, consistent with the known neurodegenerative role for toll-like receptor 7 in neurons. These results suggest that sex chromosome effects on neurodegeneration in the CNS run counter to effects on immune responses, and may bear relevance to the clinical enigma of greater MS susceptibility in women but faster disability progression in men. This is a demonstration of a direct effect of sex chromosome complement on neurodegeneration in a neurological disease.

  8. Induction of passive Heymann nephritis in complement component 6-deficient PVG rats.

    Science.gov (United States)

    Spicer, S Timothy; Tran, Giang T; Killingsworth, Murray C; Carter, Nicole; Power, David A; Paizis, Kathy; Boyd, Rochelle; Hodgkinson, Suzanne J; Hall, Bruce M

    2007-07-01

    Passive Heymann nephritis (PHN), a model of human membranous nephritis, is induced in susceptible rat strains by injection of heterologous antisera to rat renal tubular Ag extract. PHN is currently considered the archetypal complement-dependent form of nephritis, with the proteinuria resulting from sublytic glomerular epithelial cell injury induced by the complement membrane attack complex (MAC) of C5b-9. This study examined whether C6 and MAC are essential to the development of proteinuria in PHN by comparing the effect of injection of anti-Fx1A antisera into PVG rats deficient in C6 (PVG/C6(-)) and normal PVG rats (PVG/c). PVG/c and PVG/C6(-) rats developed similar levels of proteinuria at 3, 7, 14, and 28 days following injection of antisera. Isolated whole glomeruli showed similar deposition of rat Ig and C3 staining in PVG/c and PVG/C6(-) rats. C9 deposition was abundant in PVG/c but was not detected in PVG/C6(-) glomeruli, indicating C5b-9/MAC had not formed in PVG/C6(-) rats. There was also no difference in the glomerular cellular infiltrate of T cells and macrophages nor the size of glomerular basement membrane deposits measured on electron micrographs. To examine whether T cells effect injury, rats were depleted of CD8+ T cells which did not affect proteinuria in the early heterologous phase but prevented the increase in proteinuria associated with the later autologous phase. These studies showed proteinuria in PHN occurs without MAC and that other mechanisms, such as immune complex size, early complement components, CD4+ and CD8+ T cells, disrupt glomerular integrity and lead to proteinuria.

  9. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  10. Complement activation by Pseudomonas aeruginosa biofilms

    DEFF Research Database (Denmark)

    Jensen, E T; Kharazmi, A; Garred, P

    1993-01-01

    In chronic infections, such as the bronchopulmonary Pseudomonas aeruginosa infection in cystic fibrosis (CF) patients, bacteria persist despite an intact host immune defense and frequent antibiotic treatment. An important reason for the persistence of the bacteria is their capacity for the biofilm...... mode of growth. In this study we investigated the role of biofilms in activation of complement, a major contributor to the inflammatory process. Complement activation by P. aeruginosa was examined in a complement consumption assay, production of C3 and factor B conversion products assessed by crossed...... immuno-electrophoresis, C5a generation tested by a PMN chemotactic assay, and terminal complement complex formation measured by ELISA. Two of the four assays showed that P. aeruginosa grown in biofilm activated complement less than planktonic bacteria, and all assays showed that activation by intact...

  11. Material properties in complement activation

    DEFF Research Database (Denmark)

    Moghimi, S. Moein; Andersen, Alina Joukainen; Ahmadvand, Davoud

    2011-01-01

    activation differently and through different sensing molecules and initiation pathways. The importance of material properties in triggering complement is considered and mechanistic aspects discussed. Mechanistic understanding of complement events could provide rational approaches for improved material design...

  12. Complement factor H-related proteins CFHR2 and CFHR5 represent novel ligands for the infection-associated CRASP proteins of Borrelia burgdorferi.

    Directory of Open Access Journals (Sweden)

    Corinna Siegel

    2010-10-01

    Full Text Available One virulence property of Borrelia burgdorferi is its resistance to innate immunity, in particular to complement-mediated killing. Serum-resistant B. burgdorferi express up to five distinct complement regulator-acquiring surface proteins (CRASP which interact with complement regulator factor H (CFH and factor H-like protein 1 (FHL1 or factor H-related protein 1 (CFHR1. In the present study we elucidate the role of the infection-associated CRASP-3 and CRASP-5 protein to serve as ligands for additional complement regulatory proteins as well as for complement resistance of B. burgdorferi.To elucidate whether CRASP-5 and CRASP-3 interact with various human proteins, both borrelial proteins were immobilized on magnetic beads. Following incubation with human serum, bound proteins were eluted and separated by Glycine-SDS-PAGE. In addition to CFH and CFHR1, complement regulators CFHR2 and CFHR5 were identified as novel ligands for both borrelial proteins by employing MALDI-TOF. To further assess the contributions of CRASP-3 and CRASP-5 to complement resistance, a serum-sensitive B. garinii strain G1 which lacks all CFH-binding proteins was used as a valuable model for functional analyses. Both CRASPs expressed on the B. garinii outer surface bound CFH as well as CFHR1 and CFHR2 in ELISA. In contrast, live B. garinii bound CFHR1, CFHR2, and CFHR5 and only miniscute amounts of CFH as demonstrated by serum adsorption assays and FACS analyses. Further functional analysis revealed that upon NHS incubation, CRASP-3 or CRASP-5 expressing borreliae were killed by complement.In the absence of CFH and the presence of CFHR1, CFHR2 and CFHR5, assembly and integration of the membrane attack complex was not efficiently inhibited indicating that CFH in co-operation with CFHR1, CFHR2 and CFHR5 supports complement evasion of B. burgdorferi.

  13. Excretion of complement proteins and its activation marker C5b-9 in IgA nephropathy in relation to renal function

    Directory of Open Access Journals (Sweden)

    Onda Kisara

    2011-11-01

    Full Text Available Abstract Background Glomerular damage in IgA nephropathy (IgAN is mediated by complement activation via the alternative and lectin pathways. Therefore, we focused on molecules stabilizing and regulating the alternative pathway C3 convertase in urine which might be associated with IgAN pathogenesis. Methods Membrane attack complex (MAC, properdin (P, factor H (fH and Complement receptor type 1 (CR1 were quantified in urine samples from 71 patients with IgAN and 72 healthy controls. Glomerular deposition of C5, fH and P was assessed using an immunofluorescence technique and correlated with histological severity of IgAN and clinical parameters. Fibrotic changes and glomerular sclerosis were evaluated in renal biopsy specimens. Results Immunofluorescence studies revealed glomerular depositions of C5, fH and P in patients with IgAN. Urinary MAC, fH and P levels in IgAN patients were significantly higher than those in healthy controls (p Conclusions Complement activation occurs in the urinary space in IgAN and the measurement of levels of MAC and fH in the urine could be a useful indicator of renal injury in patients with IgAN.

  14. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  15. Peptide Inhibitor of Complement C1 (PIC1 Rapidly Inhibits Complement Activation after Intravascular Injection in Rats.

    Directory of Open Access Journals (Sweden)

    Julia A Sharp

    Full Text Available The complement system has been increasingly recognized to play a pivotal role in a variety of inflammatory and autoimmune diseases. Consequently, therapeutic modulators of the classical, lectin and alternative pathways of the complement system are currently in pre-clinical and clinical development. Our laboratory has identified a peptide that specifically inhibits the classical and lectin pathways of complement and is referred to as Peptide Inhibitor of Complement C1 (PIC1. In this study, we determined that the lead PIC1 variant demonstrates a salt-dependent binding to C1q, the initiator molecule of the classical pathway. Additionally, this peptide bound to the lectin pathway initiator molecule MBL as well as the ficolins H, M and L, suggesting a common mechanism of PIC1 inhibitory activity occurs via binding to the collagen-like tails of these collectin molecules. We further analyzed the effect of arginine and glutamic acid residue substitution on the complement inhibitory activity of our lead derivative in a hemolytic assay and found that the original sequence demonstrated superior inhibitory activity. To improve upon the solubility of the lead derivative, a pegylated, water soluble variant was developed, structurally characterized and demonstrated to inhibit complement activation in mouse plasma, as well as rat, non-human primate and human serum in vitro. After intravenous injection in rats, the pegylated derivative inhibited complement activation in the blood by 90% after 30 seconds, demonstrating extremely rapid function. Additionally, no adverse toxicological effects were observed in limited testing. Together these results show that PIC1 rapidly inhibits classical complement activation in vitro and in vivo and is functional for a variety of animal species, suggesting its utility in animal models of classical complement-mediated diseases.

  16. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  17. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  18. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  19. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  20. Complement-mediated solubilization of immune complexes. Solubilization inhibition and complement factor levels in SLE patients

    DEFF Research Database (Denmark)

    Baatrup, Gunnar; Petersen, Ivan; Kappelgaard, E

    1984-01-01

    Thirty-two of 36 serum samples from 19 SLE patients showed reduced capacity to mediate complement-dependent solubilization of immune complexes (IC). SLE patients with nephritis exerted the lowest complement-mediated solubilization capacity (CMSC) whereas sera from patients with inactive disease g...

  1. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  2. Complement anaphylatoxins as immune regulators in cancer.

    Science.gov (United States)

    Sayegh, Eli T; Bloch, Orin; Parsa, Andrew T

    2014-08-01

    The role of the complement system in innate immunity is well characterized. However, a recent body of research implicates the complement anaphylatoxins C3a and C5a as insidious propagators of tumor growth and progression. It is now recognized that certain tumors elaborate C3a and C5a and that complement, as a mediator of chronic inflammation and regulator of immune function, may in fact foster rather than defend against tumor growth. A putative mechanism for this function is complement-mediated suppression of immune effector cells responsible for immunosurveillance within the tumor microenvironment. This paradigm accords with models of immune dysregulation, such as autoimmunity and infectious disease, which have defined a pathophysiological role for abnormal complement signaling. Several types of immune cells express the cognate receptors for the complement anaphylatoxins, C3aR and C5aR, and demonstrate functional modulation in response to complement stimulation. In turn, impairment of antitumor immunity has been intimately tied to tumor progression in animal models of cancer. In this article, the literature was systematically reviewed to identify studies that have characterized the effects of the complement anaphylatoxins on the composition and function of immune cells within the tumor microenvironment. The search identified six studies based upon models of lymphoma and ovarian, cervical, lung, breast, and mammary cancer, which collectively support the paradigm of complement as an immune regulator in the tumor microenvironment. © 2014 The Authors. Cancer Medicine published by John Wiley & Sons Ltd.

  3. Complement Test

    Science.gov (United States)

    ... Salicylates Semen Analysis Serotonin Serum Free Light Chains Sex Hormone Binding Globulin (SHBG) Shiga toxin-producing Escherichia ... and forming complexes that respond to infections, non-self tissues (transplants), dead cells ... KJ. Complement determinations in human disease. Ann Allergy Asthma Immunol . 2004; ...

  4. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  5. Evading the pulsar constraints on the cosmic string tension in supergravity inflation

    Energy Technology Data Exchange (ETDEWEB)

    Kamada, Kohei [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Miyamoto, Yuhei [Tokyo Univ. (Japan). Dept. of Physics; Tokyo Univ. (JP). Research Center for the Early Universe (RESCEU); Yokoyama, Jun' ichi [Tokyo Univ. (JP). Research Center for the Early Universe (RESCEU); Tokyo Univ., Kashiwa, Chiba (JP). Inst. for the Physics and Mathematics of the Universe (IPMU)

    2012-04-15

    The cosmic string is a useful probe of the early Universe and may give us a clue to physics at high energy scales where any artificial particle accelerators cannot reach. Although one of the most promising tools is the cosmic microwave background, the constraint from gravitational waves is becoming so stringent that one may not hope to detect its signatures in the cosmic microwave background. In this paper, we construct a scenario that contains cosmic strings observable in the cosmic microwave background while evading the constraint imposed by the recent pulsar timing data. We argue that cosmic strings with relatively large tension are allowed by delaying the onset of the scaling regime. We also show that this scenario is naturally realized in the context of chaotic inflation in supergravity, where the phase transition is governed by the Hubble induced mass.

  6. Evading the pulsar constraints on the cosmic string tension in supergravity inflation

    International Nuclear Information System (INIS)

    Kamada, Kohei; Miyamoto, Yuhei; Yokoyama, Jun'ichi

    2012-04-01

    The cosmic string is a useful probe of the early Universe and may give us a clue to physics at high energy scales where any artificial particle accelerators cannot reach. Although one of the most promising tools is the cosmic microwave background, the constraint from gravitational waves is becoming so stringent that one may not hope to detect its signatures in the cosmic microwave background. In this paper, we construct a scenario that contains cosmic strings observable in the cosmic microwave background while evading the constraint imposed by the recent pulsar timing data. We argue that cosmic strings with relatively large tension are allowed by delaying the onset of the scaling regime. We also show that this scenario is naturally realized in the context of chaotic inflation in supergravity, where the phase transition is governed by the Hubble induced mass.

  7. Muusikamaailm : Arvo Pärdi uus teos. Telemanni päevad Magdeburgis. Uus orkester Soomes. Ingvar Lidholm 80. Auhindu ja preemiaid / Priit Kuusk

    Index Scriptorium Estoniae

    Kuusk, Priit, 1938-

    2001-01-01

    21. veebr. tuli Oxfordis maailmaesiettekandele A. Pärdi teos "Littlemore Tractus". Telemanni päevade raames toimuvast rahvusvahelisest kammeransamblite konkursist Magdeburgis. O. Mustonen asutas Helsingis uue orkestri. Lühidalt I.Lidholmi tegevusest ja loomingust. P. Norgaardile ja H. von Manen'ile antud autasust ja preemiast

  8. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  9. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  10. In Situ complement activation and T-cell immunity in leprosy spectrum: An immunohistological study on leprosy lesional skin.

    Science.gov (United States)

    Bahia El Idrissi, Nawal; Iyer, Anand M; Ramaglia, Valeria; Rosa, Patricia S; Soares, Cleverson T; Baas, Frank; Das, Pranab K

    2017-01-01

    Mycobacterium leprae (M. leprae) infection causes nerve damage and the condition worsens often during and long after treatment. Clearance of bacterial antigens including lipoarabinomannan (LAM) during and after treatment in leprosy patients is slow. We previously demonstrated that M. leprae LAM damages peripheral nerves by in situ generation of the membrane attack complex (MAC). Investigating the role of complement activation in skin lesions of leprosy patients might provide insight into the dynamics of in situ immune reactivity and the destructive pathology of M. leprae. In this study, we analyzed in skin lesions of leprosy patients, whether M. leprae antigen LAM deposition correlates with the deposition of complement activation products MAC and C3d on nerves and cells in the surrounding tissue. Skin biopsies of paucibacillary (n = 7), multibacillary leprosy patients (n = 7), and patients with erythema nodosum leprosum (ENL) (n = 6) or reversal reaction (RR) (n = 4) and controls (n = 5) were analyzed. The percentage of C3d, MAC and LAM deposition was significantly higher in the skin biopsies of multibacillary compared to paucibacillary patients (p = leprosy patients (r = 0.9578, pleprosy patients (p = leprosy patients, suggesting that inflammation driven by complement activation might contribute to nerve damage in the lesions of these patients. This should be regarded as an important factor in M. leprae nerve damage pathology.

  11. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  12. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  13. Possible role of complement activation in renal impairment in trichloroethylene-sensitized guinea pigs

    International Nuclear Information System (INIS)

    Yu, Jun-Feng; Leng, Jing; Shen, Tong; Zhou, Cheng-Fan; Xu, Hui; Jiang, Tao; Xu, Shu-Hai; Zhu, Qi-Xing

    2012-01-01

    Recent studies have revealed that trichloroethylene (TCE) can induce occupational medicamentosa-like dermatitis (OMLD) with multi-system injuries, including liver, kidney and skin injuries, which can subsequently cause multiple organ failure later. But the mechanism of immune dysfunction leading to organ injury was rarely clarified. The present study was initiated to analyze the influence of trichloroethylene on renal injury and study the relevant mechanism in guinea pigs. Guinea pig maximization test (GPMT) was carried out. Inflammation on the guinea pigs’ skin was scored. Kidney function, urine protein and ultra-structural change of kidney were determined by biochemical detection and electron microscope. Deposition of complement 3 and membrane attack complex (MAC, C5b-9) were determined by immunohistochemistry. Erythema and edema of skin impairment were observed in TCE sensitized groups, and sensitization rate was 63.16%. Through electron microscope, tubular epithelial cell mitochondrial swelling, vacuolar degeneration and atrophy of microvillus were observed in TCE sensitized groups. The parameters of urease and urinary protein elevated markedly, and a high degree of C3 and MAC deposition was found in the renal tubular epithelial cells in TCE sensitized groups. By demonstrating that TCE and its metabolites can cause the deposition of C3 and MAC in renal epithelial cells, we found that activated complement system may be the mechanism of the acceleration and the development of TCE-induced kidney disease.

  14. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  15. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  16. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  17. Dengue-Immune Humans Have Higher Levels of Complement-Independent Enhancing Antibody than Complement-Dependent Neutralizing Antibody.

    Science.gov (United States)

    Yamanaka, Atsushi; Konishi, Eiji

    2017-09-25

    Dengue is the most important arboviral disease worldwide. We previously reported that most inhabitants of dengue-endemic countries who are naturally immune to the disease have infection-enhancing antibodies whose in vitro activity does not decrease in the presence of complement (complement-independent enhancing antibodies, or CiEAb). Here, we compared levels of CiEAb and complement-dependent neutralizing antibodies (CdNAb) in dengue-immune humans. A typical antibody dose-response pattern obtained in our assay system to measure the balance between neutralizing and enhancing antibodies showed both neutralizing and enhancing activities depending on serum dilution factor. The addition of complement to the assay system increased the activity of neutralizing antibodies at lower dilutions, indicating the presence of CdNAb. In contrast, similar dose-response curves were obtained with and without complement at higher dilutions, indicating higher levels of CiEAb than CdNAb. For experimental support for the higher CiEAb levels, a cocktail of mouse monoclonal antibodies against dengue virus type 1 was prepared. The antibody dose-response curves obtained in this assay, with or without complement, were similar to those obtained with human serum samples when a high proportion of D1-V-3H12 (an antibody exhibiting only enhancing activity and thus a model for CiEAb) was used in the cocktail. This study revealed higher-level induction of CiEAb than CdNAb in humans naturally infected with dengue viruses.

  18. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  19. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  20. Complement anaphylatoxins as immune regulators in cancer

    OpenAIRE

    Sayegh, Eli T; Bloch, Orin; Parsa, Andrew T

    2014-01-01

    The role of the complement system in innate immunity is well characterized. However, a recent body of research implicates the complement anaphylatoxins C3a and C5a as insidious propagators of tumor growth and progression. It is now recognized that certain tumors elaborate C3a and C5a and that complement, as a mediator of chronic inflammation and regulator of immune function, may in fact foster rather than defend against tumor growth. A putative mechanism for this function is complement-mediat...

  1. Complement activation and inhibition: a delicate balance

    DEFF Research Database (Denmark)

    Sjöberg, A P; Trouw, L A; Blom, A M

    2009-01-01

    proteins, pentraxins, amyloid deposits, prions and DNA, all bind the complement activator C1q, but also interact with complement inhibitors C4b-binding protein and factor H. This contrasts to the interaction between C1q and immune complexes, in which case no inhibitors bind, resulting in full complement...

  2. conformational complexity of complement component C3

    NARCIS (Netherlands)

    Janssen, B.J.C.

    2007-01-01

    The complement system is an important part of the immune system and critical for the elimination of pathogens. In mammals the complement system consists of an intricate set of about 35 soluble and cell-surface plasma proteins. Central to complement is component C3, a large protein of 1,641 residues.

  3. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  4. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  5. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  6. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  7. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  8. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  9. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  10. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  11. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  12. Web Application Obfuscation '-WAFsEvasionFiltersalert(Obfuscation)-'

    CERN Document Server

    Heiderich, Mario; Heyes, Gareth; Lindsay, David

    2010-01-01

    Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new ty

  13. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  14. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  15. Plasma complement and vascular complement deposition in patients with coronary artery disease with and without inflammatory rheumatic diseases

    Science.gov (United States)

    2017-01-01

    Purpose Inflammatory rheumatic diseases (IRD) are associated with accelerated coronary artery disease (CAD), which may result from both systemic and vascular wall inflammation. There are indications that complement may be involved in the pathogenesis of CAD in Systemic Lupus Erythematosus (SLE) and Rheumatoid Arthritis (RA). This study aimed to evaluate the associations between circulating complement and complement activation products with mononuclear cell infiltrates (MCI, surrogate marker of vascular inflammation) in the aortic media and adventitia in IRDCAD and non-IRDCAD patients undergoing coronary artery bypass grafting (CABG). Furthermore, we compared complement activation product deposition patterns in rare aorta adventitial and medial biopsies from SLE, RA and non-IRD patients. Methods We examined plasma C3 (p-C3) and terminal complement complexes (p-TCC) in 28 IRDCAD (SLE = 3; RA = 25), 52 non-IRDCAD patients, and 32 IRDNo CAD (RA = 32) from the Feiring Heart Biopsy Study. Aortic biopsies taken from the CAD only patients during CABG were previously evaluated for adventitial MCIs. The rare aortic biopsies from 3 SLE, 3 RA and 3 non-IRDCAD were assessed for the presence of C3 and C3d using immunohistochemistry. Results IRDCAD patients had higher p-TCC than non-IRDCAD or IRDNo CAD patients (prheumatic disease, and, in particular, SLE with the complement system. Exaggerated systemic and vascular complement activation may accelerate CVD, serve as a CVD biomarker, and represent a target for new therapies. PMID:28362874

  16. Evading the top-quark mass bound at the Fermilab Tevatron: New signals for the top quark

    International Nuclear Information System (INIS)

    Mukhopadhyaya, B.; Nandi, S.

    1991-01-01

    If an SU(2)-singlet charge-2/3 quark exists, current data allow a wide range for the parameters of the 4x4 mixing matrix in which the usual ''hard-lepton'' signal of the top quark is suppressed. For a light Higgs boson, the top quark decays predominantly via the flavor-changing Yukawa interaction, thus evading the Fermilab Tevatron bounds on its mass. For a heavier Higgs boson, flavor-changing neutral-current decays become important, giving rise to anomalous Z-pair production, testable at the upgraded Tevetron, at the CERN Large Hardon Collider, and at the Superconducting Super Collider

  17. Inactivation of complement by Loxosceles reclusa spider venom.

    Science.gov (United States)

    Gebel, H M; Finke, J H; Elgert, K D; Cambell, B J; Barrett, J T

    1979-07-01

    Zymosan depletion of serum complement in guinea pigs rendered them highly resistant to lesion by Loxosceles reclusa spider venom. Guinea pigs deficient in C4 of the complement system are as sensitive to the venom as normal guinea pigs. The injection of 35 micrograms of whole recluse venom intradermally into guinea pigs lowered their complement level by 35.7%. Brown recluse spider venom in concentrations as slight as 0.02 micrograms protein/ml can totally inactivate one CH50 of guinea pig complement in vitro. Bee, scorpion, and other spider venoms had no influence on the hemolytic titer of complement. Fractionation of recluse spider venom by Sephadex G-200 filtration separated the complement-inactivating property of the venom into three major regions which could be distinguished on the basis of heat stability as well as size. None was neutralized by antivenom. Polyacrylamide gel electrophoresis of venom resolved the complement inactivators into five fractions. Complement inactivated by whole venom or the Sephadex fractions could be restored to hemolytic activity by supplements of fresh serum but not by heat-inactivated serum, pure C3, pure C5, or C3 and C5 in combination.

  18. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  19. Francisella tularensis Confronts the Complement System

    Directory of Open Access Journals (Sweden)

    Susan R. Brock

    2017-12-01

    Full Text Available Francisella tularensis has developed a number of effective evasion strategies to counteract host immune defenses, not the least of which is its ability to interact with the complement system to its own advantage. Following exposure of the bacterium to fresh human serum, complement is activated and C3b and iC3b can be found covalently attached to the bacterial surface. However, the lipopolysaccharide and capsule of the F. tularensis cell wall prevent complement-mediated lysis and endow the bacterium with serum resistance. Opsonization of F. tularensis with C3 greatly increases its uptake by human neutrophils, dendritic cells and macrophages. Uptake occurs by an unusual looping morphology in human macrophages. Complement receptor 3 is thought to play an important role in opsonophagocytosis by human macrophages, and signaling through this receptor can antagonize Toll-like receptor 2-initiated macrophage activation. Complement C3 also determines the survival of infected human macrophages and perhaps other cell types. C3-opsonization of F. tularensis subsp. tularensis strain SCHU S4 results in greatly increased death of infected human macrophages, which requires more than complement receptor engagement and is independent of the intracellular replication by the pathogen. Given its entry into the cytosol of host cells, F. tularensis has the potential for a number of other complement-mediated interactions. Studies on the uptake C3-opsonized adenovirus have suggested the existence of a C3 sensing system that initiates cellular responses to cytosolic C3b present on invading microbes. Here we propose that C3 peptides enter the cytosol of human macrophages following phagosome escape of F. tularensis and are recognized as intruding molecular patterns that signal host cell death. With the discovery of new roles for intracellular C3, a better understanding of tularemia pathogenesis is likely to emerge.

  20. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  1. Autocrine Effects of Tumor-Derived Complement

    Directory of Open Access Journals (Sweden)

    Min Soon Cho

    2014-03-01

    Full Text Available We describe a role for the complement system in enhancing cancer growth. Cancer cells secrete complement proteins that stimulate tumor growth upon activation. Complement promotes tumor growth via a direct autocrine effect that is partially independent of tumor-infiltrating cytotoxic T cells. Activated C5aR and C3aR signal through the PI3K/AKT pathway in cancer cells, and silencing the PI3K or AKT gene in cancer cells eliminates the progrowth effects of C5aR and C3aR stimulation. In patients with ovarian or lung cancer, higher tumoral C3 or C5aR mRNA levels were associated with decreased overall survival. These data identify a role for tumor-derived complement proteins in promoting tumor growth, and they therefore have substantial clinical and therapeutic implications.

  2. complement C3, Complement C4 and C-reactive protein

    African Journals Online (AJOL)

    ajl yemi

    2011-12-19

    Dec 19, 2011 ... (IL-6), E-selectin and P-selectin (Perlstein and Lee,. 2006). Studies have ... of cigarette smoke causes complement activation which is in turn ..... are decreased by long term smoking cessation in male smokers. Prevent. Med.

  3. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  4. Anti-complement activities of human breast-milk.

    Science.gov (United States)

    Ogundele, M O

    1999-08-01

    It has long been observed that the human milk possesses significant anti-inflammatory properties, while simultaneously protecting the infant against many intestinal and respiratory pathogens. There is, however, a paucity of information on the degree and extent of this anti-inflammatory activity. In the present study, the inhibitory effects of different fractions of human milk on serum complement activity were analysed. Colostrum and milk samples from healthy voluntary lactating donors at different postpartum ages were obtained and pooled normal human serum was used as source of complement in a modified CH50 assay. Inherent complement activity in human milk was also investigated by measuring the deposition of an activated C3 fragment on a serum-sensitive bacteria, and by haemolytic assays. Most whole- and defatted-milk samples consistently showed a dose-dependent inhibition of the serum complement activity. This inhibition was greater in mature milk compared to transitional milk samples. It was enhanced by inactivation of milk complement, and diminished by centrifugation of milk samples, which partly removed fat and larger protein components including casein micelles. Inherent complement activity in human milk was also demonstrated by haemolysis of sensitised sheep erythrocytes and deposition of C3 fragments on solid-phase bacteria. These activities were highest in the colostrum and gradually decreased as lactation proceeded. Several natural components abundant in the fluid phase of the human breast-milk have been shown to be inhibitors of complement activation in vitro. Their physiological significance probably reside in their ability to prevent inflammatory-induced tissue damage of the delicate immature gastrointestinal tract of the new-born as well as the mammary gland itself, which may arise from ongoing complement activation.

  5. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  6. Muusikamaailm : Festivalil Schwetzingenis. Ellingtoni sajandi tähistamine. Linz saab uue ooperimaja. Isaac Stern viiulita Saksamaal. Muusikapäevad Luksemburgis / Priit Kuusk

    Index Scriptorium Estoniae

    Kuusk, Priit, 1938-

    1999-01-01

    30. apr.-7. juunini toimuvast muusikafestivalist Schwetzingenis. D. Ellingtoni 100. sünniaastapäeva tähistamisest maailmas. Valmis Linzi uue ooperimaja planeering. I. Stern juhatas kümnepäevast seminari Kölni Kõrgema Muusikakooli juures. Rahvusvahelise Nüüdismuusika Ühingu (ISCM) iga-aastased maailma muusikapäevad toimuvad 2000. aastal Luksemburgis

  7. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  8. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  9. Does Host Complement Kill Borrelia burgdorferi within Ticks?

    OpenAIRE

    Rathinavelu, Sivaprakash; Broadwater, Anne; de Silva, Aravinda M.

    2003-01-01

    The Lyme disease spirochete, Borrelia burgdorferi, inhabits the gut lumen of the tick vector. At this location the spirochete is exposed to host blood when a tick feeds. We report here on studies that were done with normal and complement-deficient (C3-knockout) mice to determine if the host complement system killed spirochetes within the vector. We found that spirochete numbers within feeding nymphs were not influenced by complement, most likely because host complement was inactivated within ...

  10. Systemic complement activation in age-related macular degeneration.

    Directory of Open Access Journals (Sweden)

    Hendrik P N Scholl

    Full Text Available Dysregulation of the alternative pathway (AP of complement cascade has been implicated in the pathogenesis of age-related macular degeneration (AMD, the leading cause of blindness in the elderly. To further test the hypothesis that defective control of complement activation underlies AMD, parameters of complement activation in blood plasma were determined together with disease-associated genetic markers in AMD patients. Plasma concentrations of activation products C3d, Ba, C3a, C5a, SC5b-9, substrate proteins C3, C4, factor B and regulators factor H and factor D were quantified in patients (n = 112 and controls (n = 67. Subjects were analyzed for single nucleotide polymorphisms in factor H (CFH, factor B-C2 (BF-C2 and complement C3 (C3 genes which were previously found to be associated with AMD. All activation products, especially markers of chronic complement activation Ba and C3d (p<0.001, were significantly elevated in AMD patients compared to controls. Similar alterations were observed in factor D, but not in C3, C4 or factor H. Logistic regression analysis revealed better discriminative accuracy of a model that is based only on complement activation markers Ba, C3d and factor D compared to a model based on genetic markers of the complement system within our study population. In both the controls' and AMD patients' group, the protein markers of complement activation were correlated with CFH haplotypes.This study is the first to show systemic complement activation in AMD patients. This suggests that AMD is a systemic disease with local disease manifestation at the ageing macula. Furthermore, the data provide evidence for an association of systemic activation of the alternative complement pathway with genetic variants of CFH that were previously linked to AMD susceptibility.

  11. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  12. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  13. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  14. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  15. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  16. Complement and thrombosis in the antiphospholipid syndrome.

    Science.gov (United States)

    Oku, Kenji; Nakamura, Hiroyuki; Kono, Michihiro; Ohmura, Kazumasa; Kato, Masaru; Bohgaki, Toshiyuki; Horita, Tetsuya; Yasuda, Shinsuke; Amengual, Olga; Atsumi, Tatsuya

    2016-10-01

    The involvement of complement activation in the pathophysiology of antiphospholipid syndrome (APS) was first reported in murine models of antiphospholipid antibody (aPL)-related pregnancy morbidities. We previously reported that complement activation is prevalent and may function as a source of procoagulant cell activation in the sera of APS patients. Recently, autoantibodies against C1q, a component of complement 1, were reported to be correlated with complement activation in systemic lupus erythematosus. These antibodies target neoepitopes of deformed C1q bound to various molecules (i.e., anionic phospholipids) and induce accelerated complement activation. We found that anti-C1q antibodies are more frequently detected in primary APS patients than in control patients and in refractory APS patients with repeated thrombotic events. The titer of anti-C1q antibodies was significantly higher in refractory APS patients than in APS patients without flare. The binding of C1q to anionic phospholipids may be associated with the surge in complement activation in patients with anti-C1q antibodies when triggered by 'second-hit' biological stressors such as infection. Such stressors will induce overexpression of anionic phospholipids, with subsequent increases in deformed C1q that is targeted by anti-C1q antibodies. Copyright © 2016. Published by Elsevier B.V.

  17. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  18. Does host complement kill Borrelia burgdorferi within ticks?

    Science.gov (United States)

    Rathinavelu, Sivaprakash; Broadwater, Anne; de Silva, Aravinda M

    2003-02-01

    The Lyme disease spirochete, Borrelia burgdorferi, inhabits the gut lumen of the tick vector. At this location the spirochete is exposed to host blood when a tick feeds. We report here on studies that were done with normal and complement-deficient (C3-knockout) mice to determine if the host complement system killed spirochetes within the vector. We found that spirochete numbers within feeding nymphs were not influenced by complement, most likely because host complement was inactivated within the vector. The Lyme disease outer surface protein A (OspA) vaccine is a transmission-blocking vaccine that targets spirochetes in the vector. In experiments with mice hyperimmunized with OspA, complement was not required to kill spirochetes within nymphs and to block transmission from nymphs to the vaccinated host. However, host complement did enhance the ability of OspA antibody to block larvae from acquiring spirochetes. Thus, the effects of OspA antibody on nymphal transmission and larval acquisition appear to be based on different mechanisms.

  19. Hepatic macrophage complement receptor clearance function following injury.

    Science.gov (United States)

    Cuddy, B G; Loegering, D J; Blumenstock, F A; Shah, D M

    1986-03-01

    Previous work has demonstrated that in vivo hepatic macrophage complement receptor clearance function is depressed following thermal injury. The present study was carried out to determine if complement receptor function depression is associated with other states of depressed host defense. Hepatic complement receptor clearance function was determined from the hepatic uptake of rat erythrocytes coated with antierythrocyte IgM (EIgM) in rats. Receptor function was determined following cannulation of a carotid artery, laparotomy plus enterotomy, hemorrhagic shock, trauma, thermal injury, acute bacteremia, acute endotoxemia, and injection of erythrocyte stroma, gelatinized lipid emulsion, or colloidal carbon. Hepatic uptake of EIgM was depressed following each of these experimental interventions except arterial cannulation. This effect was shown not to be due to a decrease in hepatic blood flow or depletion of complement and was therefore due to a depression in hepatic macrophage complement receptor clearance function. Thus, impairment of hepatic macrophage complement receptor function is associated with several states of depressed host defense.

  20. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  1. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  2. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  3. [Renal risks of dietary complements: a forgotten cause].

    Science.gov (United States)

    Dori, Olympia; Humbert, Antoine; Burnier, Michel; Teta, Daniel

    2014-02-26

    The use of dietary complements like vitamins, minerals, trace elements, proteins, aminoacids and plant-derived agents is prevalent in the general population, in order to promote health and treat diseases. Dietary complements are considered as safe natural products and are easily available without prescription. However, these can lead to severe renal toxicity, especially in cases of unknown pre-existing chronic kidney disease (CKD). In particular, Chinese herbs including aristolochic acid, high doses of vitamine C, creatine and protein complements may lead to acute and chronic renal failure, sometimes irreversible. Dietary complement toxicity should be suspected in any case of unexplained renal impairement. In the case of pre-existing CKD, the use of potentially nephrotoxic dietary complements should be screened for.

  4. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  5. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  6. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  7. Peroxisome biogenesis disorders: identification of a new complementation group distinct from peroxisome-deficient CHO mutants and not complemented by human PEX 13

    NARCIS (Netherlands)

    Shimozawa, N.; Suzuki, Y.; Zhang, Z.; Imamura, A.; Tsukamoto, T.; Osumi, T.; Tateishi, K.; Okumoto, K.; Fujiki, Y.; Orii, T.; Barth, P. G.; Wanders, R. J.; Kondo, N.

    1998-01-01

    Ten complementation groups of generalized peroxisome biogenesis disorders (PBD), (excluding rhizomelic chondrodysplasia punctata) have been identified using complementation analysis. Four of the genes involved have been identified using two different methods of (1) genetic functional complementation

  8. Assembly and Regulation of the Membrane Attack Complex Based on Structures of C5b6 and sC5b9

    Directory of Open Access Journals (Sweden)

    Michael A. Hadders

    2012-03-01

    Full Text Available Activation of the complement system results in formation of membrane attack complexes (MACs, pores that disrupt lipid bilayers and lyse bacteria and other pathogens. Here, we present the crystal structure of the first assembly intermediate, C5b6, together with a cryo-electron microscopy reconstruction of a soluble, regulated form of the pore, sC5b9. Cleavage of C5 to C5b results in marked conformational changes, distinct from those observed in the homologous C3-to-C3b transition. C6 captures this conformation, which is preserved in the larger sC5b9 assembly. Together with antibody labeling, these structures reveal that complement components associate through sideways alignment of the central MAC-perforin (MACPF domains, resulting in a C5b6-C7-C8β-C8α-C9 arc. Soluble regulatory proteins below the arc indicate a potential dual mechanism in protection from pore formation. These results provide a structural framework for understanding MAC pore formation and regulation, processes important for fighting infections and preventing complement-mediated tissue damage.

  9. Force Dynamics of Verb Complementation

    Directory of Open Access Journals (Sweden)

    Jacek Woźny

    2015-12-01

    Full Text Available Force Dynamics of Verb Complementation The concepts of motion and force are both extensively discussed in cognitive linguistics literature. But they are discussed separately. The first usually in the context of ‘motion situations’ (Talmy, Slobin, Zlatev, the other as part of the Force Dynamics framework, which was developed by Talmy. The aim of this paper is twofold: first, to argue that the concepts of force and motion should not be isolated but considered as two inseparable parts of force-motion events. The second goal is to prove that the modified Force Dynamics (force-motion framework can be used for precise characterization of the verb complementation patterns. To this end, a random sample of 50 sentences containing the verb ‘went’ is analyzed, demonstrating the differences between the categories of intensive and intransitive complementation with respect to the linguistically coded parameters of force and motion.

  10. Protection by meningococcal outer membrane protein PorA-specific antibodies and a serogroup B capsular polysaccharide-specific antibody in complement-sufficient and C6-deficient infant rats.

    Science.gov (United States)

    Toropainen, Maija; Saarinen, Leena; Vidarsson, Gestur; Käyhty, Helena

    2006-05-01

    The relative contributions of antibody-induced complement-mediated bacterial lysis and antibody/complement-mediated phagocytosis to host immunity against meningococcal infections are currently unclear. Further, the in vivo effector functions of antibodies may vary depending on their specificity and Fc heavy-chain isotype. In this study, a mouse immunoglobulin G2a (mIgG2a) monoclonal antibody (MN12H2) to meningococcal outer membrane protein PorA (P1.16), its human IgG subclass derivatives (hIgG1 to hIgG4), and an mIgG2a monoclonal antibody (Nmb735) to serogroup B capsular polysaccharide (B-PS) were evaluated for passive protection against meningococcal serogroup B strain 44/76-SL (B:15:P1.7,16) in an infant rat infection model. Complement component C6-deficient (PVG/c-) rats were used to assess the importance of complement-mediated bacterial lysis for protection. The PorA-specific parental mIgG2a and the hIgG1 to hIgG3 derivatives all induced efficient bactericidal activity in vitro in the presence of human or infant rat complement and augmented bacterial clearance in complement-sufficient HsdBrlHan:WIST rats, while the hIgG4 was unable to do so. In C6-deficient PVG/c- rats, lacking complement-mediated bacterial lysis, the augmentation of bacterial clearance by PorA-specific mIgG2a and hIgG1 antibodies was impaired compared to that in the syngeneic complement-sufficient PVG/c+ rat strain. This was in contrast to the case for B-PS-specific mIgG2a, which conferred similar protective activity in both rat strains. These data suggest that while anti-B-PS antibody can provide protection in the infant rats without membrane attack complex formation, the protection afforded by anti-PorA antibody is more dependent on the activation of the whole complement pathway and subsequent bacterial lysis.

  11. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  12. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  13. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  14. Complement: Alive and Kicking Nanomedicines

    DEFF Research Database (Denmark)

    Andersen, Alina Joukainen; Hashemi, S.H.; Andresen, Thomas Lars

    2009-01-01

    Administration of liposome- and polymer-based clinical nanomedicines, as well as many other proposed multifunctional nanoparticles, often triggers hypersensitivity reactions without the involvement of IgE. These anaphylactic reactions are believed to be secondary to activation of the complement...... their procoagulant activity, and has the capacity to elicit non-lytic stimulatory responses from vascular endothelial cells. Here we discuss the molecular basis of complement activation by liposomes, including poly(ethylene glycol) coated vesicles, and other related lipid-based and phospholipid-poly(ethylene glycol...

  15. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  16. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  17. Complement elevation in spinal cord injury.

    Science.gov (United States)

    Rebhun, J; Botvin, J

    1980-05-01

    Laboratory studies revealed an elevated complement in 66% of patients with spinal cord injury. It is postulated that the activated complement may be a component of self-feeding immunological mechanism responsible for the failure of regeneration of a mature mammalian spinal cord. There was no evidence that such an injury had any effect on pre-existing atopy.

  18. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  19. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  20. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  1. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  2. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  3. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  4. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  5. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  6. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  7. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  8. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  9. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  10. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  11. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  12. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  13. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  14. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Complement pathways and meningococcal disease : diagnostic aspects

    DEFF Research Database (Denmark)

    Sjöholm, A G; Truedsson, L; Jensenius, Jens Christian

    2001-01-01

    Complement is an immunological effector system that bridges innate and acquired immunity in several ways. There is a striking association between susceptibility to meningococcal disease and various forms of complement deficiency (1,2). In defense against bacterial infection, the most important fu...

  16. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  17. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  18. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  19. Is complement good, bad, or both? New functions of the complement factors associated with inflammation mechanisms in the central nervous system.

    Science.gov (United States)

    Tahtouh, Muriel; Croq, Françoise; Lefebvre, Christophe; Pestel, Joël

    2009-09-01

    The complement system is well known as an enzyme cascade that helps to defend against infections. Indeed, this ancestral system bridges innate and adaptive immunity. Its implication in diseases of the central nervous system (CNS), has led to an increased number of studies. Complement activation in the CNS has been generally considered to contribute to tissue damage. However, recent studies suggest that complement may be neuroprotective, and can participate in maintenance and repair of the adult brain. Here, we will review this dual role of complement proteins and some of their functional interactions with part of the chemokine and cytokine network associated with the protection of CNS integrity.

  20. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  1. Surviving mousepox infection requires the complement system.

    Directory of Open Access Journals (Sweden)

    Elizabeth A Moulton

    2008-12-01

    Full Text Available Poxviruses subvert the host immune response by producing immunomodulatory proteins, including a complement regulatory protein. Ectromelia virus provides a mouse model for smallpox where the virus and the host's immune response have co-evolved. Using this model, our study investigated the role of the complement system during a poxvirus infection. By multiple inoculation routes, ectromelia virus caused increased mortality by 7 to 10 days post-infection in C57BL/6 mice that lack C3, the central component of the complement cascade. In C3(-/- mice, ectromelia virus disseminated earlier to target organs and generated higher peak titers compared to the congenic controls. Also, increased hepatic inflammation and necrosis correlated with these higher tissue titers and likely contributed to the morbidity in the C3(-/- mice. In vitro, the complement system in naïve C57BL/6 mouse sera neutralized ectromelia virus, primarily through the recognition of the virion by natural antibody and activation of the classical and alternative pathways. Sera deficient in classical or alternative pathway components or antibody had reduced ability to neutralize viral particles, which likely contributed to increased viral dissemination and disease severity in vivo. The increased mortality of C4(-/- or Factor B(-/- mice also indicates that these two pathways of complement activation are required for survival. In summary, the complement system acts in the first few minutes, hours, and days to control this poxviral infection until the adaptive immune response can react, and loss of this system results in lethal infection.

  2. Entamoeba histolytica and E. dispar trophozoites in the liver of hamsters: in vivo binding of antibodies and complement

    Directory of Open Access Journals (Sweden)

    Gomes Maria A

    2010-03-01

    inoculated with E. dispar. Conclusion Morphological and immunohistochemical results suggest that antibodies and complement are able to bind and destroy some trophozoites in the liver of experimentally infected hamsters, perhaps selecting the more resistant parasites which are responsible by progression of amoebic abscesses. The findings indicate that E. histolytica possesses an enhanced ability in vivo to evade the immune responses compared to E. dispar, although it also causes experimental hepatic lesions.

  3. Novel Evasion Mechanisms of the Classical Complement Pathway.

    Science.gov (United States)

    Garcia, Brandon L; Zwarthoff, Seline A; Rooijakkers, Suzan H M; Geisbrecht, Brian V

    2016-09-15

    Complement is a network of soluble and cell surface-associated proteins that gives rise to a self-amplifying, yet tightly regulated system with fundamental roles in immune surveillance and clearance. Complement becomes activated on the surface of nonself cells by one of three initiating mechanisms known as the classical, lectin, and alternative pathways. Evasion of complement function is a hallmark of invasive pathogens and hematophagous organisms. Although many complement-inhibition strategies hinge on hijacking activities of endogenous complement regulatory proteins, an increasing number of uniquely evolved evasion molecules have been discovered over the past decade. In this review, we focus on several recent investigations that revealed mechanistically distinct inhibitors of the classical pathway. Because the classical pathway is an important and specific mediator of various autoimmune and inflammatory disorders, in-depth knowledge of novel evasion mechanisms could direct future development of therapeutic anti-inflammatory molecules. Copyright © 2016 by The American Association of Immunologists, Inc.

  4. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  5. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  6. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  7. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  8. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  9. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  10. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  11. Hepatitis C virus NS3/4A protease inhibits complement activation by cleaving complement component 4.

    Directory of Open Access Journals (Sweden)

    Seiichi Mawatari

    Full Text Available BACKGROUND: It has been hypothesized that persistent hepatitis C virus (HCV infection is mediated in part by viral proteins that abrogate the host immune response, including the complement system, but the precise mechanisms are not well understood. We investigated whether HCV proteins are involved in the fragmentation of complement component 4 (C4, composed of subunits C4α, C4β, and C4γ, and the role of HCV proteins in complement activation. METHODS: Human C4 was incubated with HCV nonstructural (NS 3/4A protease, core, or NS5. Samples were separated by sodium dodecyl sulfate-polyacrylamide gel electrophoresis and then subjected to peptide sequencing. The activity of the classical complement pathway was examined using an erythrocyte hemolysis assay. The cleavage pattern of C4 in NS3/4A-expressing and HCV-infected cells, respectively, was also examined. RESULTS: HCV NS3/4A protease cleaved C4γ in a concentration-dependent manner, but viral core and NS5 did not. A specific inhibitor of NS3/4A protease reduced C4γ cleavage. NS3/4A protease-mediated cleavage of C4 inhibited classical pathway activation, which was abrogated by a NS3/4A protease inhibitor. In addition, co-transfection of cells with C4 and wild-type NS3/4A, but not a catalytic-site mutant of NS3/4A, produced cleaved C4γ fragments. Such C4 processing, with a concomitant reduction in levels of full-length C4γ, was also observed in HCV-infected cells expressing C4. CONCLUSIONS: C4 is a novel cellular substrate of the HCV NS3/4A protease. Understanding disturbances in the complement system mediated by NS3/4A protease may provide new insights into the mechanisms underlying persistent HCV infection.

  12. Interpain A, a cysteine proteinase from Prevotella intermedia, inhibits complement by degrading complement factor C3.

    Directory of Open Access Journals (Sweden)

    Michal Potempa

    2009-02-01

    Full Text Available Periodontitis is an inflammatory disease of the supporting structures of the teeth caused by, among other pathogens, Prevotella intermedia. Many strains of P. intermedia are resistant to killing by the human complement system, which is present at up to 70% of serum concentration in gingival crevicular fluid. Incubation of human serum with recombinant cysteine protease of P. intermedia (interpain A resulted in a drastic decrease in bactericidal activity of the serum. Furthermore, a clinical strain 59 expressing interpain A was more serum-resistant than another clinical strain 57, which did not express interpain A, as determined by Western blotting. Moreover, in the presence of the cysteine protease inhibitor E64, the killing of strain 59 by human serum was enhanced. Importantly, we found that the majority of P. intermedia strains isolated from chronic and aggressive periodontitis carry and express the interpain A gene. The protective effect of interpain A against serum bactericidal activity was found to be attributable to its ability to inhibit all three complement pathways through the efficient degradation of the alpha-chain of C3 -- the major complement factor common to all three pathways. P. intermedia has been known to co-aggregate with P. gingivalis, which produce gingipains to efficiently degrade complement factors. Here, interpain A was found to have a synergistic effect with gingipains on complement degradation. In addition, interpain A was able to activate the C1 complex in serum, causing deposition of C1q on inert and bacterial surfaces, which may be important at initial stages of infection when local inflammatory reaction may be beneficial for a pathogen. Taken together, the newly characterized interpain A proteinase appears to be an important virulence factor of P. intermedia.

  13. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  14. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  15. Complement receptor expression and activation of the complement cascade on B lymphocytes from patients with systemic lupus erythematosus (SLE)

    DEFF Research Database (Denmark)

    Marquart, H V; Svendsen, A; Rasmussen, J M

    1995-01-01

    It has previously been reported that the expression of the complement receptors, CR1 on erythrocytes and blood leucocytes and CR2 on B cells, is reduced in patients with SLE, and that the reduced expression of CR1 on erythrocytes is related to disease activity. We have earlier demonstrated...... that normal B cells are capable of activating the alternative pathway (AP) of complement in a CR2-dependent fashion. In this study we have investigated whether disturbances in this activity may be related to the altered phenotype of SLE B cells. Flow cytometry was used to measure expression of complement...

  16. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  17. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  18. Sequestration of host-CD59 as potential immune evasion strategy of Trichomonas vaginalis.

    Science.gov (United States)

    Ibáñez-Escribano, Alexandra; Nogal-Ruiz, Juan José; Pérez-Serrano, Jorge; Gómez-Barrio, Alicia; Escario, J Antonio; Alderete, J F

    2015-09-01

    Trichomonas vaginalis is known to evade complement-mediated lysis. Because the genome of T. vaginalis does not possess DNA sequence with homology to human protectin (CD59), a complement lysis restricting factor, we tested the hypothesis that host CD59 acquisition by T. vaginalis organisms mediates resistance to complement killing. This hypothesis was based on the fact that trichomonads are known to associate with host proteins. No CD59 was detected on the surface of T. vaginalis grown in serum-based medium using as probe anti-CD59 monoclonal antibody (MAb). We, therefore, infected mice intraperitoneally with live T. vaginalis, and trichomonads harvested from ascites were tested for binding of CD59. Immunofluorescence showed that parasites had surface CD59. Furthermore, as mouse erythrocytes (RBCs) possess membrane-associated CD59, and trichomonads use RBCs as a nutrient source, organisms were co-cultured with murine RBCs for one week. Parasites were shown to have detectable surface CD59. Importantly, live T. vaginalis with bound CD59 were compared with batch-grown parasites without surface-associated CD59 for sensitivity to complement in human serum. Trichomonads without surface-bound CD59 had a higher level of killing by complement than did parasites with surface CD59. These data show that host CD59 acquired onto the surface by live T. vaginalis may be an alternative mechanism for complement evasion. We describe a novel strategy by T. vaginalis consistent with host protein procurement by this parasite to evade the lytic action of complement. Copyright © 2015 Elsevier B.V. All rights reserved.

  19. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  20. Complement-Mediated Enhancement of Monocyte Adhesion to Endothelial Cells by HLA Antibodies, and Blockade by a Specific Inhibitor of the Classical Complement Cascade, TNT003

    Science.gov (United States)

    Valenzuela, Nicole M.; Thomas, Kimberly A.; Mulder, Arend; Parry, Graham C.; Panicker, Sandip; Reed, Elaine F.

    2017-01-01

    Background Antibody-mediated rejection (AMR) of most solid organs is characterized by evidence of complement activation and/or intragraft macrophages (C4d + and CD68+ biopsies). We previously demonstrated that crosslinking of HLA I by antibodies triggered endothelial activation and monocyte adhesion. We hypothesized that activation of the classical complement pathway at the endothelial cell surface by HLA antibodies would enhance monocyte adhesion through soluble split product generation, in parallel with direct endothelial activation downstream of HLA signaling. Methods Primary human aortic endothelial cells (HAEC) were stimulated with HLA class I antibodies in the presence of intact human serum complement. C3a and C5a generation, endothelial P-selectin expression, and adhesion of human primary and immortalized monocytes (Mono Mac 6) were measured. Alternatively, HAEC or monocytes were directly stimulated with purified C3a or C5a. Classical complement activation was inhibited by pretreatment of complement with an anti-C1s antibody (TNT003). Results Treatment of HAEC with HLA antibody and human complement increased the formation of C3a and C5a. Monocyte recruitment by human HLA antibodies was enhanced in the presence of intact human serum complement or purified C3a or C5a. Specific inhibition of the classical complement pathway using TNT003 or C1q-depleted serum significantly reduced adhesion of monocytes in the presence of human complement. Conclusions Despite persistent endothelial viability in the presence of HLA antibodies and complement, upstream complement anaphylatoxin production exacerbates endothelial exocytosis and leukocyte recruitment. Upstream inhibition of classical complement may be therapeutic to dampen mononuclear cell recruitment and endothelial activation characteristic of microvascular inflammation during AMR. PMID:28640789

  1. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  2. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  3. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  4. Variants in Complement Factor H and Complement Factor H-Related Protein Genes, CFHR3 and CFHR1, Affect Complement Activation in IgA Nephropathy.

    Science.gov (United States)

    Zhu, Li; Zhai, Ya-Ling; Wang, Feng-Mei; Hou, Ping; Lv, Ji-Cheng; Xu, Da-Min; Shi, Su-Fang; Liu, Li-Jun; Yu, Feng; Zhao, Ming-Hui; Novak, Jan; Gharavi, Ali G; Zhang, Hong

    2015-05-01

    Complement activation is common in patients with IgA nephropathy (IgAN) and associated with disease severity. Our recent genome-wide association study of IgAN identified susceptibility loci on 1q32 containing the complement regulatory protein-encoding genes CFH and CFHR1-5, with rs6677604 in CFH as the top single-nucleotide polymorphism and CFHR3-1 deletion (CFHR3-1∆) as the top signal for copy number variation. In this study, to explore the clinical effects of variation in CFH, CFHR3, and CFHR1 on IgAN susceptibility and progression, we enrolled two populations. Group 1 included 1178 subjects with IgAN and available genome-wide association study data. Group 2 included 365 subjects with IgAN and available clinical follow-up data. In group 1, rs6677604 was associated with mesangial C3 deposition by genotype-phenotype correlation analysis. In group 2, we detected a linkage between the rs6677604-A allele and CFHR3-1∆ and found that the rs6677604-A allele was associated with higher serum levels of CFH and lower levels of the complement activation split product C3a. Furthermore, CFH levels were positively associated with circulating C3 levels and negatively associated with mesangial C3 deposition. Moreover, serum levels of the pathogenic galactose-deficient glycoform of IgA1 were also associated with the degree of mesangial C3 deposition in patients with IgAN. Our findings suggest that genetic variants in CFH, CFHR3, and CFHR1 affect complement activation and thereby, predispose patients to develop IgAN. Copyright © 2015 by the American Society of Nephrology.

  5. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  6. In Situ complement activation and T-cell immunity in leprosy spectrum: An immunohistological study on leprosy lesional skin.

    Directory of Open Access Journals (Sweden)

    Nawal Bahia El Idrissi

    Full Text Available Mycobacterium leprae (M. leprae infection causes nerve damage and the condition worsens often during and long after treatment. Clearance of bacterial antigens including lipoarabinomannan (LAM during and after treatment in leprosy patients is slow. We previously demonstrated that M. leprae LAM damages peripheral nerves by in situ generation of the membrane attack complex (MAC. Investigating the role of complement activation in skin lesions of leprosy patients might provide insight into the dynamics of in situ immune reactivity and the destructive pathology of M. leprae. In this study, we analyzed in skin lesions of leprosy patients, whether M. leprae antigen LAM deposition correlates with the deposition of complement activation products MAC and C3d on nerves and cells in the surrounding tissue. Skin biopsies of paucibacillary (n = 7, multibacillary leprosy patients (n = 7, and patients with erythema nodosum leprosum (ENL (n = 6 or reversal reaction (RR (n = 4 and controls (n = 5 were analyzed. The percentage of C3d, MAC and LAM deposition was significantly higher in the skin biopsies of multibacillary compared to paucibacillary patients (p = <0.05, p = <0.001 and p = <0.001 respectively, with a significant association between LAM and C3d or MAC in the skin biopsies of leprosy patients (r = 0.9578, p< 0.0001 and r = 0.8585, p<0.0001 respectively. In skin lesions of multibacillary patients, MAC deposition was found on axons and co-localizing with LAM. In skin lesions of paucibacillary patients, we found C3d positive T-cells in and surrounding granulomas, but hardly any MAC deposition. In addition, MAC immunoreactivity was increased in both ENL and RR skin lesions compared to non-reactional leprosy patients (p = <0.01 and p = <0.01 respectively. The present findings demonstrate that complement is deposited in skin lesions of leprosy patients, suggesting that inflammation driven by complement activation might contribute to nerve damage in the lesions

  7. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  8. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  9. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  10. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  11. How Current Android Malware Seeks to Evade Automated Code Analysis

    OpenAIRE

    Rasthofer , Siegfried; Asrar , Irfan; Huber , Stephan; Bodden , Eric

    2015-01-01

    Part 4: Challenges of Security and Reliability; International audience; First we report on a new threat campaign, underway in Korea, which infected around 20,000 Android users within two months. The campaign attacked mobile users with malicious applications spread via different channels, such as email attachments or SMS spam. A detailed investigation of the Android malware resulted in the identification of a new Android malware family Android/BadAccents. The family represents current state-of...

  12. Identifying pathogenicity of human variants via paralog-based yeast complementation.

    Directory of Open Access Journals (Sweden)

    Fan Yang

    2017-05-01

    Full Text Available To better understand the health implications of personal genomes, we now face a largely unmet challenge to identify functional variants within disease-associated genes. Functional variants can be identified by trans-species complementation, e.g., by failure to rescue a yeast strain bearing a mutation in an orthologous human gene. Although orthologous complementation assays are powerful predictors of pathogenic variation, they are available for only a few percent of human disease genes. Here we systematically examine the question of whether complementation assays based on paralogy relationships can expand the number of human disease genes with functional variant detection assays. We tested over 1,000 paralogous human-yeast gene pairs for complementation, yielding 34 complementation relationships, of which 33 (97% were novel. We found that paralog-based assays identified disease variants with success on par with that of orthology-based assays. Combining all homology-based assay results, we found that complementation can often identify pathogenic variants outside the homologous sequence region, presumably because of global effects on protein folding or stability. Within our search space, paralogy-based complementation more than doubled the number of human disease genes with a yeast-based complementation assay for disease variation.

  13. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  14. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  15. Molecular characterization of the alpha subunit of complement component C8 (GcC8alpha) in the nurse shark (Ginglymostoma cirratum).

    Science.gov (United States)

    Aybar, Lydia; Shin, Dong-Ho; Smith, Sylvia L

    2009-09-01

    Target cell lysis by complement is achieved by the assembly and insertion of the membrane attack complex (MAC) composed of glycoproteins C5b through C9. The lytic activity of shark complement involves functional analogues of mammalian C8 and C9. Mammalian C8 is composed of alpha, beta, and gamma subunits. The subunit structure of shark C8 is not known. This report describes a 2341 nucleotide sequence that translates into a polypeptide of 589 amino acid residues, orthologue to mammalian C8alpha and has the same modular architecture with conserved cysteines forming the peptide bond backbone. The C8gamma-binding cysteine is conserved in the perforin-like domain. Hydrophobicity profile indicates the presence of hydrophobic residues essential for membrane insertion. It shares 41.1% and 47.4% identity with human and Xenopus C8alpha respectively. Southern blot analysis showed GcC8alpha exists as a single copy gene expressed in most tissues except the spleen with the liver being the main site of synthesis. Phylogenetic analysis places it in a clade with C8alpha orthologs and as a sister taxa to the Xenopus. 2009 Elsevier Ltd.

  16. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  17. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  18. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  20. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  1. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  2. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  3. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  4. The role of complement in the acquired immune response

    DEFF Research Database (Denmark)

    Nielsen, C H; Fischer, E M; Leslie, R G

    2000-01-01

    Studies over the past three decades have clearly established a central role for complement in the promotion of a humoral immune response. The primary function of complement, in this regard, is to opsonize antigen or immune complexes for uptake by complement receptor type 2 (CR2, CD21) expressed...... on B cells, follicular dendritic cells (FDC) and some T cells. A variety of mechanisms appear to be involved in complement-mediated promotion of the humoral response. These include: enhancement of antigen (Ag) uptake and processing by both Ag-specific and non-specific B cells for presentation...

  5. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  6. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  7. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  8. Assembly and activation of alternative complement components on endothelial cell-anchored ultra-large von Willebrand factor links complement and hemostasis-thrombosis.

    Directory of Open Access Journals (Sweden)

    Nancy A Turner

    Full Text Available Vascular endothelial cells (ECs express and release protein components of the complement pathways, as well as secreting and anchoring ultra-large von Willebrand factor (ULVWF multimers in long string-like structures that initiate platelet adhesion during hemostasis and thrombosis. The alternative complement pathway (AP is an important non-antibody-requiring host defense system. Thrombotic microangiopathies can be associated with defective regulation of the AP (atypical hemolytic-uremic syndrome or with inadequate cleavage by ADAMTS-13 of ULVWF multimeric strings secreted by/anchored to ECs (thrombotic thrombocytopenic purpura. Our goal was to determine if EC-anchored ULVWF strings caused the assembly and activation of AP components, thereby linking two essential defense mechanisms.We quantified gene expression of these complement components in cultured human umbilical vein endothelial cells (HUVECs by real-time PCR: C3 and C5; complement factor (CF B, CFD, CFP, CFH and CFI of the AP; and C4 of the classical and lectin (but not alternative complement pathways. We used fluorescent microscopy, monospecific antibodies against complement components, fluorescent secondary antibodies, and the analysis of >150 images to quantify the attachment of HUVEC-released complement proteins to ULVWF strings secreted by, and anchored to, the HUVECs (under conditions of ADAMTS-13 inhibition. We found that HUVEC-released C4 did not attach to ULVWF strings, ruling out activation of the classical and lectin pathways by the strings. In contrast, C3, FB, FD, FP and C5, FH and FI attached to ULVWF strings in quantitative patterns consistent with assembly of the AP components into active complexes. This was verified when non-functional FB blocked the formation of AP C3 convertase complexes (C3bBb on ULVWF strings.AP components are assembled and activated on EC-secreted/anchored ULVWF multimeric strings. Our findings provide one possible molecular mechanism for clinical

  9. Cyclosporine Induces Endothelial Cell Release of Complement-Activating Microparticles

    Science.gov (United States)

    Renner, Brandon; Klawitter, Jelena; Goldberg, Ryan; McCullough, James W.; Ferreira, Viviana P.; Cooper, James E.; Christians, Uwe

    2013-01-01

    Defective control of the alternative pathway of complement is an important risk factor for several renal diseases, including atypical hemolytic uremic syndrome. Infections, drugs, pregnancy, and hemodynamic insults can trigger episodes of atypical hemolytic uremic syndrome in susceptible patients. Although the mechanisms linking these clinical events with disease flares are unknown, recent work has revealed that each of these clinical conditions causes cells to release microparticles. We hypothesized that microparticles released from injured endothelial cells promote intrarenal complement activation. Calcineurin inhibitors cause vascular and renal injury and can trigger hemolytic uremic syndrome. Here, we show that endothelial cells exposed to cyclosporine in vitro and in vivo release microparticles that activate the alternative pathway of complement. Cyclosporine-induced microparticles caused injury to bystander endothelial cells and are associated with complement-mediated injury of the kidneys and vasculature in cyclosporine-treated mice. Cyclosporine-induced microparticles did not bind factor H, an alternative pathway regulatory protein present in plasma, explaining their complement-activating phenotype. Finally, we found that in renal transplant patients, the number of endothelial microparticles in plasma increases 2 weeks after starting tacrolimus, and treatment with tacrolimus associated with increased C3 deposition on endothelial microparticles in the plasma of some patients. These results suggest that injury-associated release of endothelial microparticles is an important mechanism by which systemic insults trigger intravascular complement activation and complement-dependent renal diseases. PMID:24092930

  10. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  11. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  12. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  13. Complement, a target for therapy in inflammatory and degenerative diseases.

    Science.gov (United States)

    Morgan, B Paul; Harris, Claire L

    2015-12-01

    The complement system is a key innate immune defence against infection and an important driver of inflammation; however, these very properties can also cause harm. Inappropriate or uncontrolled activation of complement can cause local and/or systemic inflammation, tissue damage and disease. Complement provides numerous options for drug development as it is a proteolytic cascade that involves nine specific proteases, unique multimolecular activation and lytic complexes, an arsenal of natural inhibitors, and numerous receptors that bind to activation fragments. Drug design is facilitated by the increasingly detailed structural understanding of the molecules involved in the complement system. Only two anti-complement drugs are currently on the market, but many more are being developed for diseases that include infectious, inflammatory, degenerative, traumatic and neoplastic disorders. In this Review, we describe the history, current landscape and future directions for anti-complement therapies.

  14. Complement in patients receiving maintenance hemodialysis: functional screening and quantitative analysis

    Directory of Open Access Journals (Sweden)

    Horikoshi Satoshi

    2010-12-01

    Full Text Available Abstract Background The complement system is vital for innate immunity and is implicated in the pathogenesis of inflammatory diseases and the mechanism of host defense. Complement deficiencies occasionally cause life-threatening diseases. In hemodialysis (HD patients, profiles on complement functional activity and deficiency are still obscure. The objectives of the present study were to measure the functional complement activities of the classical pathway (CP, lectin pathway (LP and alternative pathway (AP using a novel method and consequently to elucidate the rates of deficiencies among HD patients. Methods In the present study, 244 HD patients at one dialysis center and 204 healthy controls were enrolled. Functional complement activities were measured simultaneously using the Wielisa®-kit. The combination of the results of these three pathway activities allows us to speculate which candidate complement is deficient; subsequently, the deficient complement was determined. Results All three functional complement activities were significantly higher in the HD patients than in the control group (P ®-kit, 16 sera (8.8% with mannose-binding lectin (MBL deficiency, 1 serum (0.4% with C4 deficiency, 1 serum (0.4% with C9 deficiency, and 1 serum (0.4% with B deficiency were observed in the HD group, and 18 sera (8.8% with MBL deficiency and 1 serum (0.5% with B deficiency were observed in the control group. There were no significant differences in the 5-year mortality rate between each complement-deficient group and the complement-sufficient group among the HD patients. Conclusion This is the first report that profiles complement deficiencies by simultaneous measurement of functional activities of the three complement pathways in HD patients. Hemodialysis patients frequently suffer from infections or malignancies, but functional complement deficiencies do not confer additional risk of mortality.

  15. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  16. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  17. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  18. The complement inhibitor eculizumab in paroxysmal nocturnal hemoglobinuria.

    NARCIS (Netherlands)

    Hillmen, P.; Young, N.S.; Schubert, J.; Brodsky, R.A.; Socie, G.; Muus, P.; Roth, A.; Szer, J.; Elebute, M.O.; Nakamura, R.; Browne, P.; Risitano, A.M.; Hill, A.; Schrezenmeier, H.; Fu, C.L.; Maciejewski, J; Rollins, S.A.; Mojcik, C.F.; Rother, R.P.; Luzzatto, L.

    2006-01-01

    BACKGROUND: We tested the safety and efficacy of eculizumab, a humanized monoclonal antibody against terminal complement protein C5 that inhibits terminal complement activation, in patients with paroxysmal nocturnal hemoglobinuria (PNH). METHODS: We conducted a double-blind, randomized,

  19. Complement inhibitory proteins expression in placentas of thrombophilic women Complement inhibitory proteins expression in placentas of thrombophilic women

    Directory of Open Access Journals (Sweden)

    Przemysław Krzysztof Wirstlein

    2012-10-01

    Full Text Available Factors controlling complement activation appear to exert a protective effect on pregnancy. This is
    particularly important in women with thrombophilia. The aim of this study was to determine the transcript and
    protein levels of complement decay-accelerating factor (DAF and membrane cofactor protein (MCP in the
    placentas of women with acquired and inherited thrombophilia. Also, we assessed immunohistochemistry staining
    of inhibitors of the complement cascade, DAF and MCP proteins, in the placentas of thrombophilic women.
    Placentas were collected from eight women with inherited thrombophilia and ten with acquired thrombophilia.
    The levels of DAF and MCP transcripts were evaluated by qPCR, the protein level was evaluated by Western
    blot. We observed a higher transcript (p < 0.05 and protein (p < 0.001 levels of DAF and MCP in the placentas
    of thrombophilic women than in the control group. DAF and MCP were localized on villous syncytiotrophoblast
    membranes, but the assessment of staining in all groups did not differ. The observed higher expression level of
    proteins that control activation of complement control proteins is only seemingly contradictory to the changes
    observed for example in the antiphospholipid syndrome. However, given the hitherto known biochemical changes
    associated with thrombophilia, a mechanism in which increased expression of DAF and MCP in the placentas is
    an effect of proinflammatory cytokines, which accompanies thrombophilia, is probable.Factors controlling complement activation appear to exert a protective effect on pregnancy. This is
    particularly important in women with thrombophilia. The aim of this study was to determine the transcript and
    protein levels of complement decay-accelerating factor (DAF and membrane cofactor protein (MCP in the
    placentas of women with acquired and inherited thrombophilia. Also, we assessed immunohistochemistry

  20. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  1. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  2. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  3. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  4. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  5. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  6. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  7. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  8. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  9. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  10. The Complement System: A Prey of Trypanosoma cruzi

    Directory of Open Access Journals (Sweden)

    Kárita C. F. Lidani

    2017-04-01

    Full Text Available Trypanosoma cruzi is a protozoan parasite known to cause Chagas disease (CD, a neglected sickness that affects around 6–8 million people worldwide. Originally, CD was mainly found in Latin America but more recently, it has been spread to countries in North America, Asia, and Europe due the international migration from endemic areas. Thus, at present CD represents an important concern of global public health. Most of individuals that are infected by T. cruzi may remain in asymptomatic form all lifelong, but up to 40% of them will develop cardiomyopathy, digestive mega syndromes, or both. The interaction between the T. cruzi infective forms and host-related immune factors represents a key point for a better understanding of the physiopathology of CD. In this context, the complement, as one of the first line of host defense against infection was shown to play an important role in recognizing T. cruzi metacyclic trypomastigotes and in controlling parasite invasion. The complement consists of at least 35 or more plasma proteins and cell surface receptors/regulators, which can be activated by three pathways: classical (CP, lectin (LP, and alternative (AP. The CP and LP are mainly initiated by immune complexes or pathogen-associated molecular patterns (PAMPs, respectively, whereas AP is spontaneously activated by hydrolysis of C3. Once activated, several relevant complement functions are generated which include opsonization and phagocytosis of particles or microorganisms and cell lysis. An important step during T. cruzi infection is when intracellular trypomastigotes are release to bloodstream where they may be target by complement. Nevertheless, the parasite uses a sequence of events in order to escape from complement-mediated lysis. In fact, several T. cruzi molecules are known to interfere in the initiation of all three pathways and in the assembly of C3 convertase, a key step in the activation of complement. Moreover, T. cruzi promotes secretion

  11. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  12. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  13. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  14. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  15. Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students

    Science.gov (United States)

    Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E.

    2017-01-01

    The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…

  16. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  17. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  18. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  19. Complement factor H protects mice from ischemic acute kidney injury but is not critical for controlling complement activation by glomerular IgM.

    Science.gov (United States)

    Goetz, Lindsey; Laskowski, Jennifer; Renner, Brandon; Pickering, Matthew C; Kulik, Liudmila; Klawitter, Jelena; Stites, Erik; Christians, Uwe; van der Vlag, Johan; Ravichandran, Kameswaran; Holers, V Michael; Thurman, Joshua M

    2018-05-01

    Natural IgM binds to glomerular epitopes in several progressive kidney diseases. Previous work has shown that IgM also binds within the glomerulus after ischemia/reperfusion (I/R) but does not fully activate the complement system. Factor H is a circulating complement regulatory protein, and congenital or acquired deficiency of factor H is a strong risk factor for several types of kidney disease. We hypothesized that factor H controls complement activation by IgM in the kidney after I/R, and that heterozygous factor H deficiency would permit IgM-mediated complement activation and injury at this location. We found that mice with targeted heterozygous deletion of the gene for factor H developed more severe kidney injury after I/R than wild-type controls, as expected, but that complement activation within the glomeruli remained well controlled. Furthermore, mice that are unable to generate soluble IgM were not protected from renal I/R, even in the setting of heterozygous factor H deficiency. These results demonstrate that factor H is important for limiting injury in the kidney after I/R, but it is not critical for controlling complement activation by immunoglobulin within the glomerulus in this setting. IgM binds to glomerular epitopes after I/R, but it is not a significant source of injury. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Henipaviruses Employ a Multifaceted Approach to Evade the Antiviral Interferon Response

    Directory of Open Access Journals (Sweden)

    Megan L. Shaw

    2009-12-01

    Full Text Available Hendra and Nipah virus, which constitute the genus Henipavirus, are zoonotic paramyxoviruses that have been associated with sporadic outbreaks of severe disease and mortality in humans since their emergence in the late 1990s. Similar to other paramyxoviruses, their ability to evade the host interferon (IFN response is conferred by the P gene. The henipavirus P gene encodes four proteins; the P, V, W and C proteins, which have all been described to inhibit the antiviral response. Further studies have revealed that these proteins have overlapping but unique properties which enable the virus to block multiple signaling pathways in the IFN response. The best characterized of these is the JAK-STAT signaling pathway which is targeted by the P, V and W proteins via an interaction with the transcription factor STAT1. In addition the V and W proteins can both limit virus-induced induction of IFN but they appear to do this via distinct mechanisms that rely on unique sequences in their C-terminal domains. The ability to generate recombinant Nipah viruses now gives us the opportunity to determine the precise role for each of these proteins and address their contribution to pathogenicity. Additionally, the question of whether these multiple anti-IFN strategies are all active in the different mammalian hosts for henipaviruses, particularly the fruit bat reservoir, warrants further exploration.

  1. A vital role for complement in heart disease

    DEFF Research Database (Denmark)

    Lappegård, Knut T; Garred, Peter; Jonasson, Lena

    2014-01-01

    fibrillation often share risk factors both with coronary heart disease and heart failure, and there is some evidence implicating complement activation in atrial fibrillation. Moreover, Chagas heart disease, a protozoal infection, is an important cause of heart failure in Latin America, and the complement...

  2. Demand Heterogeneity and the Adoption of Platform Complements

    NARCIS (Netherlands)

    G.J. Rietveld (Joost); J.P. Eggers

    2016-01-01

    textabstractThis paper offers a demand-based theory of how platform maturity affects the adoption of platform complements. We argue that differences between early and late adopters of the platform include willingness to pay for the platform-and-complement bundle, risk preferences, preference for

  3. Novel roles of complement in renal diseases and their therapeutic consequences.

    Science.gov (United States)

    Wada, Takehiko; Nangaku, Masaomi

    2013-09-01

    The complement system functions as a part of the innate immune system. Inappropriate activation of the complement pathways has a deleterious effect on kidneys. Recent advances in complement research have provided new insights into the pathogenesis of glomerular and tubulointerstitial injury associated with complement activation. A new disease entity termed 'C3 glomerulopathy' has recently been proposed and is characterized by isolated C3 deposition in glomeruli without positive staining for immunoglobulins. Genetic and functional studies have demonstrated that several different mutations and disease variants, as well as the generation of autoantibodies, are potentially associated with its pathogenesis. The data from comprehensive analyses suggest that complement dysregulation can also be associated with hemolytic uremic syndrome and more common glomerular diseases, such as IgA nephropathy and diabetic kidney disease. In addition, animal studies utilizing genetically modified mice have begun to elucidate the molecular pathomechanisms associated with the complement system. From a diagnostic point of view, a noninvasive, MRI-based method for detecting C3 has recently been developed to serve as a novel tool for diagnosing complement-mediated kidney diseases. While novel therapeutic tools related to complement regulation are emerging, studies evaluating the precise roles of the complement system in kidney diseases will still be useful for developing new therapeutic approaches.

  4. Functional analysis of Ficolin-3 mediated complement activation

    DEFF Research Database (Denmark)

    Hein, Estrid; Honoré, Christian; Skjoedt, Mikkel-Ole

    2010-01-01

    Ficolin-3 mediated complement activation that could be applicable for research and clinical use. Bovine serum albumin (BSA) was acetylated (acBSA) and chosen as a solid phase ligand for Ficolins in microtiter wells. Binding of Ficolins on acBSA was evaluated, as was functional complement activation...... was applied to the samples that inhibited interference from the classical pathway due to the presence of anti-BSA antibodies in some sera. We describe a novel functional method for measuring complement activation mediated by Ficolin-3 in human serum up to the formation of TCC. The assay provides...

  5. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  6. Complement propriety and conspiracy in nanomedicine

    DEFF Research Database (Denmark)

    Moghimi, Seyed Moein

    2016-01-01

    The complement system is the first line of body's defense against intruders and it acts as a functional bridge between innate and adaptive arms of the immune system. This commentary examines the key roles of complement activation in response to nanomedicine administration, including nucleic acid...... complexes. These comprise beneficial (eg, adjuvanticity) as well as adverse effects (eg, infusion-related reactions). Pigs (and sheep) are often used as predictive models of nanomedicine-mediated infusion-related reactions in humans. The validity of these models in relation to human responses is questioned...

  7. Complement-mediated solubilization of immune complexes and their interaction with complement C3 receptors

    DEFF Research Database (Denmark)

    Petersen, Ivan; Baatrup, Gunnar; Jepsen, H H

    1985-01-01

    Some of the molecular events in the complement (C)-mediated solubilization of immune complexes (IC) have been clarified in recent years. The solubilization is primarily mediated by alternative C pathway proteins whereas factors in the classical pathway accelerate the process. Components of the me......Some of the molecular events in the complement (C)-mediated solubilization of immune complexes (IC) have been clarified in recent years. The solubilization is primarily mediated by alternative C pathway proteins whereas factors in the classical pathway accelerate the process. Components...... of the cellular localization, expression and structure of the C3 receptors, especially the C3b (CR1) receptor, has been considerably extended in the last few years, whereas our understanding of the physiological role of these receptors is still fragmentary. However, it is becoming increasingly evident...

  8. Structure of the extracellular portion of CD46 provides insights into its interactions with complement proteins and pathogens.

    Directory of Open Access Journals (Sweden)

    B David Persson

    2010-09-01

    Full Text Available The human membrane cofactor protein (MCP, CD46 is a central component of the innate immune system. CD46 protects autologous cells from complement attack by binding to complement proteins C3b and C4b and serving as a cofactor for their cleavage. Recent data show that CD46 also plays a role in mediating acquired immune responses, and in triggering autophagy. In addition to these physiologic functions, a significant number of pathogens, including select adenoviruses, measles virus, human herpes virus 6 (HHV-6, Streptococci, and Neisseria, use CD46 as a cell attachment receptor. We have determined the crystal structure of the extracellular region of CD46 in complex with the human adenovirus type 11 fiber knob. Extracellular CD46 comprises four short consensus repeats (SCR1-SCR4 that form an elongated structure resembling a hockey stick, with a long shaft and a short blade. Domains SCR1, SCR2 and SCR3 are arranged in a nearly linear fashion. Unexpectedly, however, the structure reveals a profound bend between domains SCR3 and SCR4, which has implications for the interactions with ligands as well as the orientation of the protein at the cell surface. This bend can be attributed to an insertion of five hydrophobic residues in a SCR3 surface loop. Residues in this loop have been implicated in interactions with complement, indicating that the bend participates in binding to C3b and C4b. The structure provides an accurate framework for mapping all known ligand binding sites onto the surface of CD46, thereby advancing an understanding of how CD46 acts as a receptor for pathogens and physiologic ligands of the immune system.

  9. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  10. Schur complements of matrices with acyclic bipartite graphs

    DEFF Research Database (Denmark)

    Britz, Thomas Johann; Olesky, D.D.; van den Driessche, P.

    2005-01-01

    Bipartite graphs are used to describe the generalized Schur complements of real matrices having nos quare submatrix with two or more nonzero diagonals. For any matrix A with this property, including any nearly reducible matrix, the sign pattern of each generalized Schur complement is shown to be ...

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  12. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  13. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  14. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  15. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  16. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  17. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  18. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  19. Complement and the control of HIV infection: an evolving story.

    Science.gov (United States)

    Frank, Michael M; Hester, Christopher; Jiang, Haixiang

    2014-05-01

    Thirty years ago, investigators isolated and later determined the structure of HIV-1 and its envelope proteins. Using techniques that were effective with other viruses, they prepared vaccines designed to generate antibody or T-cell responses, but they were ineffective in clinical trials. In this article, we consider the role of complement in host defense against enveloped viruses, the role it might play in the antibody response and why complement has not controlled HIV-1 infection. Complement consists of a large group of cell-bound and plasma proteins that are an integral part of the innate immune system. They provide a first line of defense against microbes and also play a role in the immune response. Here we review the studies of complement-mediated HIV destruction and the role of complement in the HIV antibody response. HIV-1 has evolved a complex defense to prevent complement-mediated killing reviewed here. As part of these studies, we have discovered that HIV-1 envelope, on administration into animals, is rapidly broken down into small peptides that may prove to be very inefficient at provident the type of antigenic stimulation that leads to an effective immune response. Improving complement binding and stabilizing envelope may improve the vaccine response.

  20. Complementation analysis of ataxia-telangiectasia

    International Nuclear Information System (INIS)

    Jaspers, N.G.; Painter, R.B.; Paterson, M.C.; Kidson, C.; Inoue, T.

    1985-01-01

    In a number of laboratories genetic analysis of ataxia-telangiectasia (AT) has been performed by studying the expression of the AT phenotype in fused somatic cells or mixtures of cell-free extracts from different patients. Complementation of the defective response to ionizing radiation was observed frequently, considering four different parameters for radiosensitivity in AT. The combined results from studies on cultured fibroblasts or lymphoblastoid cells from 17 unrelated families revealed the presence of at least four and possibly nine complementation groups. These findings suggest that there is an extensive genetic heterogeneity in AT. More extensive studies are needed for an integration of these data and to provide a set of genetically characterized cell strains for future research of the AT genetic defect

  1. The lectin pathway of complement

    DEFF Research Database (Denmark)

    Ballegaard, Vibe Cecilie Diederich; Haugaard, Anna Karen; Garred, P

    2014-01-01

    The pattern recognition molecules of the lectin complement pathway are important components of the innate immune system with known functions in host-virus interactions. This paper summarizes current knowledge of how these intriguing molecules, including mannose-binding lectin (MBL), Ficolin-1, -2......-1, -2 and -3 and CL-11 could have similar functions in HIV infection as the ficolins have been shown to play a role in other viral infections, and CL-11 resembles MBL and the ficolins in structure and binding capacity.......The pattern recognition molecules of the lectin complement pathway are important components of the innate immune system with known functions in host-virus interactions. This paper summarizes current knowledge of how these intriguing molecules, including mannose-binding lectin (MBL), Ficolin-1, -2...

  2. Complement: a key system for immune surveillance and homeostasis.

    Science.gov (United States)

    Ricklin, Daniel; Hajishengallis, George; Yang, Kun; Lambris, John D

    2010-09-01

    Nearly a century after the significance of the human complement system was recognized, we have come to realize that its functions extend far beyond the elimination of microbes. Complement acts as a rapid and efficient immune surveillance system that has distinct effects on healthy and altered host cells and foreign intruders. By eliminating cellular debris and infectious microbes, orchestrating immune responses and sending 'danger' signals, complement contributes substantially to homeostasis, but it can also take action against healthy cells if not properly controlled. This review describes our updated view of the function, structure and dynamics of the complement network, highlights its interconnection with immunity at large and with other endogenous pathways, and illustrates its multiple roles in homeostasis and disease.

  3. Genomic resources for a unique, low-virulence Babesia taxon from China

    Directory of Open Access Journals (Sweden)

    Guiquan Guan

    2016-10-01

    Full Text Available Abstract Background Babesiosis is a socioeconomically important tick-borne disease of animals (including humans caused by haemoprotozoan parasites. The severity of babesiosis relates to host and parasite factors, particularly virulence/pathogenicity. Although Babesia bovis is a particularly pathogenic species of cattle, there are species of Babesia of ruminants that have limited pathogenicity. For instance, the operational taxonomic unit Babesia sp. Xinjiang (abbreviated here as Bx of sheep from China is substantially less virulent/pathogenic than B. bovis is in cattle. Although the reason for this distinctiveness is presently unknown, it is possible that Bx has a reduced ability to adhere to cells or evade/suppress immune responses, which might relate to particular proteins, such as the variant erythrocyte surface antigens (VESAs. Results We sequenced and annotated the 8.4 Mb nuclear draft genome of Bx and compared it with those of B. bovis and B. bigemina by synteny analysis; we also investigated the genetic relationship of Bx with selected Babesia species and related apicomplexans for which genomic datasets are available, and explored the VESA complement in Bx. Conclusions The availability of the Bx genome now provides unique opportunities to elucidate aspects of the molecular biology, biochemistry and physiology of Bx, and to explore the reason(s for its limited virulence and/or apparent ability to evade immune attack by the host animal. Moreover, the present genomic resource and an in vitro culture system for Bx raises the prospect of establishing a functional genomic platform to explore essential genes as new intervention targets against babesiosis.

  4. Genomic resources for a unique, low-virulence Babesia taxon from China.

    Science.gov (United States)

    Guan, Guiquan; Korhonen, Pasi K; Young, Neil D; Koehler, Anson V; Wang, Tao; Li, Youquan; Liu, Zhijie; Luo, Jianxun; Yin, Hong; Gasser, Robin B

    2016-10-27

    Babesiosis is a socioeconomically important tick-borne disease of animals (including humans) caused by haemoprotozoan parasites. The severity of babesiosis relates to host and parasite factors, particularly virulence/pathogenicity. Although Babesia bovis is a particularly pathogenic species of cattle, there are species of Babesia of ruminants that have limited pathogenicity. For instance, the operational taxonomic unit Babesia sp. Xinjiang (abbreviated here as Bx) of sheep from China is substantially less virulent/pathogenic than B. bovis is in cattle. Although the reason for this distinctiveness is presently unknown, it is possible that Bx has a reduced ability to adhere to cells or evade/suppress immune responses, which might relate to particular proteins, such as the variant erythrocyte surface antigens (VESAs). We sequenced and annotated the 8.4 Mb nuclear draft genome of Bx and compared it with those of B. bovis and B. bigemina by synteny analysis; we also investigated the genetic relationship of Bx with selected Babesia species and related apicomplexans for which genomic datasets are available, and explored the VESA complement in Bx. The availability of the Bx genome now provides unique opportunities to elucidate aspects of the molecular biology, biochemistry and physiology of Bx, and to explore the reason(s) for its limited virulence and/or apparent ability to evade immune attack by the host animal. Moreover, the present genomic resource and an in vitro culture system for Bx raises the prospect of establishing a functional genomic platform to explore essential genes as new intervention targets against babesiosis.

  5. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  6. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  7. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  8. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  9. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  10. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  11. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  12. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  13. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  14. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  15. Plasma complement biomarkers distinguish multiple sclerosis and neuromyelitis optica spectrum disorder.

    Science.gov (United States)

    Hakobyan, Svetlana; Luppe, Sebastian; Evans, David Rs; Harding, Katharine; Loveless, Samantha; Robertson, Neil P; Morgan, B Paul

    2017-06-01

    Multiple sclerosis (MS) and neuromyelitis optica spectrum disorder (NMOSD) are autoimmune inflammatory demyelinating diseases of the central nervous system. Although distinguished by clinicoradiological and demographic features, early manifestations can be similar complicating management. Antibodies against aquaporin-4 support the diagnosis of NMOSD but are negative in some patients. Therefore, there is unmet need for biomarkers that enable early diagnosis and disease-specific intervention. We investigated whether plasma complement proteins are altered in MS and NMOSD and provide biomarkers that distinguish these diseases. Plasma from 54 NMOSD, 40 MS and 69 control donors was tested in multiplex assays measuring complement activation products and proteins. Using logistic regression, we tested whether combinations of complement analytes distinguished NMOSD from controls and MS. All activation products were elevated in NMOSD compared to either control or MS. Four complement proteins (C1inh, C1s, C5 and FH) were higher in NMOSD compared to MS or controls. A model comprising C1inh and terminal complement complex (TCC) distinguished NMOSD from MS (area under the curve (AUC): 0.98), while C1inh and C5 distinguished NMOSD from controls (AUC: 0.94). NMOSD is distinguished from MS by plasma complement biomarkers. Selected complement analytes enable differential diagnosis. Findings support trials of anti-complement therapies in NMOSD.

  16. Protective function of complement against alcohol-induced rat liver damage.

    Science.gov (United States)

    Bykov, Igor L; Väkevä, Antti; Järveläinen, Harri A; Meri, Seppo; Lindros, Kai O

    2004-11-01

    The complement system can promote tissue damage or play a homeostatic role in the clearance and disposal of damaged tissue. We assessed the role of the terminal complement pathway in alcohol-induced liver damage in complement C6 (C6-/-) genetically deficient rats. C6-/- and corresponding C6+/+ rats were continuously exposed to ethanol by feeding ethanol-supplemented liquid diet for six weeks. Liver samples were analyzed for histopathology and complement component deposition by immunofluorescence microscopy. Prostaglandin E receptors and cytokine mRNA levels were analyzed by RT-PCR and plasma cytokines by ELISA. Deposition of complement components C1, C3, C8 and C9 was observed in C6+/+ rats, but not in C6-/- animals. The histopathological changes, the liver weight increase and the elevation of the plasma pro-/anti-inflammatory TNF-alpha/IL-10 ratio were, on the other hand, more marked in C6-/- rats. Furthermore, ethanol enhanced the hepatic mRNA expression of the prostaglandin E receptors EP2R and EP4R exclusively in the C6-/- rats. Our results indicate that a deficient terminal complement pathway predisposes to tissue injury and promotes a pro-inflammatory cytokine response. This suggests that an intact complement system has a protective function in the development of alcoholic liver damage.

  17. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  18. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  19. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  20. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  1. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  2. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  3. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  4. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  5. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  6. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  7. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  8. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  9. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  10. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  11. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  12. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  13. Assessing reprogramming by chimera formation and tetraploid complementation.

    Science.gov (United States)

    Li, Xin; Xia, Bao-long; Li, Wei; Zhou, Qi

    2015-01-01

    Pluripotent stem cells can be evaluated by pluripotent markers expression, embryoid body aggregation, teratoma formation, chimera contribution and even more, tetraploid complementation. Whether iPS cells in general are functionally equivalent to normal ESCs is difficult to establish. Here, we present the detailed procedure for chimera formation and tetraploid complementation, the most stringent criterion, to assessing pluripotency.

  14. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  15. Defining the complement biomarker profile of c3 glomerulopathy

    DEFF Research Database (Denmark)

    Zhang, Yuzhou; Nester, Carla M; Martin, Bertha

    2014-01-01

    BACKGROUND AND OBJECTIVES: C3 glomerulopathy (C3G) applies to a group of renal diseases defined by a specific renal biopsy finding: a dominant pattern of C3 fragment deposition on immunofluorescence. The primary pathogenic mechanism involves abnormal control of the alternative complement pathway......, although a full description of the disease spectrum remains to be determined. This study sought to validate and define the association of complement dysregulation with C3G and to determine whether specific complement pathway abnormalities could inform disease definition. DESIGN, SETTING, PARTICIPANTS......, & MEASUREMENTS: This study included 34 patients with C3G (17 with C3 glomerulonephritis [C3GN] and 17 with dense deposit disease [DDD]) diagnosed between 2008 and 2013 selected from the C3G Registry. Control samples (n=100) were recruited from regional blood drives. Nineteen complement biomarkers were assayed...

  16. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  17. Site-targeted complement inhibition by a complement receptor 2-conjugated inhibitor (mTT30) ameliorates post-injury neuropathology in mouse brains.

    Science.gov (United States)

    Rich, Megan C; Keene, Chesleigh N; Neher, Miriam D; Johnson, Krista; Yu, Zhao-Xue; Ganivet, Antoine; Holers, V Michael; Stahel, Philip F

    2016-03-23

    Intracerebral complement activation after severe traumatic brain injury (TBI) leads to a cascade of neuroinflammatory pathological sequelae that propagate host-mediated secondary brain injury and adverse outcomes. There are currently no specific pharmacological agents on the market to prevent or mitigate the development of secondary cerebral insults after TBI. A novel chimeric CR2-fH compound (mTT30) provides targeted inhibition of the alternative complement pathway at the site of tissue injury. This experimental study was designed to test the neuroprotective effects of mTT30 in a mouse model of closed head injury. The administration of 500 μg mTT30 i.v. at 1 h, 4 h and 24 h after head injury attenuated complement C3 deposition in injured brains, reduced the extent of neuronal cell death, and decreased post-injury microglial activation, compared to vehicle-injected placebo controls. These data imply that site-targeted alternative pathway complement inhibition may represent a new promising therapeutic avenue for the future management of severe TBI. Copyright © 2016. Published by Elsevier Ireland Ltd.

  18. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  19. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  20. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  1. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  2. Complement modulation of T cell immune responses during homeostasis and disease.

    Science.gov (United States)

    Clarke, Elizabeth V; Tenner, Andrea J

    2014-11-01

    The complement system is an ancient and critical effector mechanism of the innate immune system as it senses, kills, and clears infectious and/or dangerous particles and alerts the immune system to the presence of the infection and/or danger. Interestingly, an increasing number of reports have demonstrated a clear role for complement in the adaptive immune system as well. Of note, a number of recent studies have identified previously unknown roles for complement proteins, receptors, and regulators in T cell function. Here, we will review recent data demonstrating the influence of complement proteins C1q, C3b/iC3b, C3a (and C3aR), and C5a (and C5aR) and complement regulators DAF (CD55) and CD46 (MCP) on T cell function during homeostasis and disease. Although new concepts are beginning to emerge in the field of complement regulation of T cell function, future experiments should focus on whether complement is interacting directly with the T cell or is having an indirect effect on T cell function via APCs, the cytokine milieu, or downstream complement activation products. Importantly, the identification of the pivotal molecular pathways in the human systems will be beneficial in the translation of concepts derived from model systems to therapeutic targeting for treatment of human disorders. © 2014 Society for Leukocyte Biology.

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  4. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  5. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  6. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  7. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  8. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  9. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  10. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  11. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  12. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  13. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  14. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  15. The paralogous salivary anti-complement proteins IRAC I and IRAC II encoded by Ixodes ricinus ticks have broad and complementary inhibitory activities against the complement of different host species.

    Science.gov (United States)

    Schroeder, Hélène; Daix, Virginie; Gillet, Laurent; Renauld, Jean-Christophe; Vanderplasschen, Alain

    2007-02-01

    Several observations suggest that inhibition of the host complement alternative pathway by Ixodes tick saliva is crucial to achieve blood feeding. We recently described two paralogous anti-complement proteins called Ixodes ricinus anti-complement (IRAC) proteins I and II co-expressed in I. ricinus salivary glands. Phylogenetic analyses suggested that these sequences were diversifying by a process of positive Darwinian selection, possibly leading to molecules with different biological properties. In the present study, we tested the hypothesis that each paralogue may have different inhibitory activities against the complement of different natural host species, thereby contributing to broaden the host range of I. ricinus ticks. IRAC I and IRAC II were tested against the complement of eight I. ricinus natural host species (six mammals and two birds). The results demonstrate that IRAC I and IRAC II have broad and complementary inhibition activities against the complement of different host species. This report is the first description of paralogous anti-complement molecules encoded by a pathogen with broad and complementary inhibitory activities against the complement of different host species.

  16. Role of complement in porphyrin-induced photosensitivity

    International Nuclear Information System (INIS)

    Lim, H.W.; Gigli, I.

    1981-01-01

    Addition of porphyrins to sera of guinea pigs in vitro, followed by irradiation with 405 nm light, resulted in dose-dependent inhibitions of hemolytic activity of complement. With guinea pig as an animal model, we also found that systemically administered porphyrins, followed by irradiation with 405 nm light, resulted in dose-dependent inhibition of CH50 in vivo. The erythrocytes from porphyrin-treated guinea pigs showed an increased susceptibility to hemolysis induced by 405 nm irradiation in vitro. Clinical changes in these animals were limited to light-exposed areas and consisted of erythema, crusting, and delayed growth of hair. Histologically, dermal edema, dilation of blood vessels, and infiltration of mononuclear and polymorphonuclear cells were observed. Guinea pigs irradiated with ultraviolet-B developed erythema, but had no alteration of their complement profiles. It is suggested that complement products may play a specific role in the pathogenesis of the cutaneous lesions of some porphyrias

  17. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  18. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  19. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  20. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  1. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  2. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  3. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  4. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  5. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  6. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  7. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  8. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  9. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  10. A potent complement factor C3 specific nanobody inhibiting multiple functions in the alternative pathway of human and murine complement.

    Science.gov (United States)

    Jensen, Rasmus K; Pihl, Rasmus; Gadeberg, Trine A F; Jensen, Jan K; Andersen, Kasper R; Thiel, Steffen; Laursen, Nick S; Andersen, Gregers Rom

    2018-03-01

    The complement system is a complex, carefully regulated proteolytic cascade for which suppression of aberrant activation is of increasing clinical relevance and inhibition of the complement alternative pathway is a subject of intense research. Here, we describe the nanobody hC3Nb1 that binds to multiple functional states of C3 with sub-nanomolar affinity. The nanobody causes a complete shutdown of alternative pathway activity in human and murine serum when present in concentrations comparable to C3, and hC3Nb1 is shown to prevent both proconvertase assembly as well as binding of the C3 substrate to C3 convertases. Our crystal structure of the C3b-hC3Nb1 complex and functional experiments demonstrate that proconvertase formation is blocked by steric hindrance between the nanobody and an Asn-linked glycan on complement factor B. In addition, hC3Nb1 is shown to prevent factor H binding to C3b rationalizing its inhibition of factor I activity. Our results identify hC3Nb1 as a versatile, inexpensive, and powerful inhibitor of the alternative pathway in both human and murine in vitro model systems of complement activation. Published under license by The American Society for Biochemistry and Molecular Biology, Inc.

  11. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  12. Complement in the Initiation and Evolution of Rheumatoid Arthritis

    Science.gov (United States)

    Holers, V. Michael; Banda, Nirmal K.

    2018-01-01

    The complement system is a major component of the immune system and plays a central role in many protective immune processes, including circulating immune complex processing and clearance, recognition of foreign antigens, modulation of humoral and cellular immunity, removal of apoptotic and dead cells, and engagement of injury resolving and tissue regeneration processes. In stark contrast to these beneficial roles, however, inadequately controlled complement activation underlies the pathogenesis of human inflammatory and autoimmune diseases, including rheumatoid arthritis (RA) where the cartilage, bone, and synovium are targeted. Recent studies of this disease have demonstrated that the autoimmune response evolves over time in an asymptomatic preclinical phase that is associated with mucosal inflammation. Notably, experimental models of this disease have demonstrated that each of the three major complement activation pathways plays an important role in recognition of injured joint tissue, although the lectin and amplification pathways exhibit particularly impactful roles in the initiation and amplification of damage. Herein, we review the complement system and focus on its multi-factorial role in human patients with RA and experimental murine models. This understanding will be important to the successful integration of the emerging complement therapeutics pipeline into clinical care for patients with RA. PMID:29892280

  13. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  14. Activation of the classical pathway of complement by tobacco glycoprotein (TGP).

    Science.gov (United States)

    Koethe, S M; Nelson, K E; Becker, C G

    1995-07-15

    Tobacco glycoprotein (TGP), a polyphenol-rich glycoprotein isolated from tobacco leaves, activates the classical complement pathway through a mechanism that appears to involve direct interaction with C1q. A binding site on C1q for TGP can be localized by competitive inhibition with DNA to a region located in the junction between the collagen-like and globular regions of the molecule. A protein with activity similar to TGP has also been isolated from cigarette smoke condensate (TGP-S); it shares a binding site on C1q with TGP and has similar functional activity, with the exception that complement activation does not proceed to formation of a C3 cleaving enzyme. The ability of TGP and TGP-S to activate complement can be partially duplicated using polyphenols associated with tobacco leaf and smoke, i.e., chlorogenic acid and rutin. These polyphenols also compete with TGP for a binding site on immobilized C1q, suggesting that the polyphenol portion of TGP is critical for activation of complement. These results provide an additional mechanism for complement activation by cigarette products that, in vivo, could result in a localized complement depletion, generation of biologically active complement cleavage products, and initiation of an inflammatory response.

  15. Molecular and expression analysis of complement component C5 in the nurse shark (Ginglymostoma cirratum) and its predicted functional role.

    Science.gov (United States)

    Graham, Matthew; Shin, Dong-Ho; Smith, Sylvia L

    2009-07-01

    We present the complete cDNA sequence of shark (Ginglymostoma cirratum) pro-C5 and its molecular characterization with a descriptive analysis of the structural elements necessary for its potential functional role as a potent mediator of inflammation (fragment C5a) and initiator molecule (fragment C5b) for the assembly of the membrane attack complex (MAC) upon activation by C5 convertase. In mammals the three complement activation cascades, the classical, alternative and lectin pathways, converge at the activation of C3, a pivotal complement protein. It is, however, the subsequent activation of the next complement component, C5, which is the focal point at which the initiation of the terminal lytic pathway takes place and involves the stepwise assembly of the MAC. The effector cytolytic function of complement occurs with the insertion of MAC into target membranes causing dough-nut like holes and cell leakage. The lytic activity of shark complement results in structurally similar holes in target membranes suggesting the assembly of a shark MAC that likely involves a functional analogue of C5. The composition of shark MAC remains unresolved and to date conclusive evidence has been lacking for shark C5. The gene has not been cloned nor has the serum protein been characterized for any elasmobranch species. This report is the first to confirm the presence of C5 homologue in the shark. GcC5 is remarkably similar to human C5 in overall structure and domain arrangement. The GcC5 cDNA measured 5160-bp with 5' and 3' UTRs of 35 bp and 79 bp, respectively. Structural analysis of the derived protein sequence predicts a molecule that is a two-chain structure which lacks a thiolester bond and contains a C5 convertase cleavage site indicating that activation will generate two peptides, akin to C5b and C5a. The putative GcC5 molecule also contains the C-terminal C345C/Netrin module that characterizes C3, C4 and C5. Multiple alignment of deduced amino acid sequences shows that GcC5

  16. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  17. Evasion Mechanisms Used by Pathogens to Escape the Lectin Complement Pathway

    DEFF Research Database (Denmark)

    Rosbjerg, Anne; Genster, Ninette; Pilely, Katrine

    2017-01-01

    The complement system is a crucial defensive network that protects the host against invading pathogens. It is part of the innate immune system and can be initiated via three pathways: the lectin, classical and alternative activation pathway. Overall the network compiles a group of recognition...... the level of activity. The result is a pro-inflammatory response meant to combat foreign microbes. Microbial elimination is, however, not a straight forward procedure; pathogens have adapted to their environment by evolving a collection of evasion mechanisms that circumvent the human complement system....... Complement evasion strategies features different ways of exploiting human complement proteins and moreover features different pathogen-derived proteins that interfere with the normal processes. Accumulated, these mechanisms target all three complement activation pathways as well as the final common part...

  18. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    Science.gov (United States)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  19. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  20. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  1. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  2. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  3. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  4. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  5. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  6. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  7. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  8. Influence of complement on neutrophil extracellular trap release induced by bacteria

    DEFF Research Database (Denmark)

    Palmer, Lisa Joanne; Damgaard, Christian; Holmstrup, Palle

    2016-01-01

    by Staphylococcus aureus and three oral bacteria: Actinomyces viscosus, Aggregatibacter actinomycetemcomitans and Fusobacterium nucleatum subsp. vincettii. Material and Methods Bacteria-stimulated NET release from the neutrophils of healthy donors was measured fluorometrically. Various complement containing...... In conclusion, complement opsonization promotes NET release induced by a variety of bacteria, including A. actinomycetemcomitans, and CR1 plays a dominant role in the process. Complement consumption or deficiency may compromise NETosis induced by some bacterial species, including A. actinomycetemcomitans....... Within biofilms, the complement-inactivating abilities of some bacteria may protect other species against NETosis, while these are more vulnerable when adopting a planktonic lifestyle....

  9. The complement system and its role in the pathogenesis of periodontitis

    DEFF Research Database (Denmark)

    Damgaard, Christian; Holmstrup, Palle; Van Dyke, Thomas E.

    2015-01-01

    Periodontitis is a highly prevalent inflammatory disease in tooth supporting tissues, induced by bacteria growing in a biofilm on tooth surfaces. Components of the complement system are present in the periodontal tissue and the system is activated in periodontitis. Continuous complement activation...... and modulation by bacteria within the biofilm in periodontal pockets, however, may enhance local tissue destruction, providing the biofilm with both essential nutrients and space to grow. A more profound understanding of the mechanisms involved in complement-derived tissue degradation may facilitate...... with an emphasis on interaction of complement with bacteria from periodontitis-associated biofilm....

  10. The C-type lectin of the aggrecan G3 domain activates complement.

    Directory of Open Access Journals (Sweden)

    Camilla Melin Fürst

    Full Text Available Excessive complement activation contributes to joint diseases such as rheumatoid arthritis and osteoarthritis during which cartilage proteins are fragmented and released into the synovial fluid. Some of these proteins and fragments activate complement, which may sustain inflammation. The G3 domain of large cartilage proteoglycan aggrecan interacts with other extracellular matrix proteins, fibulins and tenascins, via its C-type lectin domain (CLD and has important functions in matrix organization. Fragments containing G3 domain are released during normal aggrecan turnover, but increasingly so in disease. We now show that the aggrecan CLD part of the G3 domain activates the classical and to a lesser extent the alternative pathway of complement, via binding of C1q and C3, respectively. The complement control protein (CCP domain adjacent to the CLD showed no effect on complement initiation. The binding of C1q to G3 depended on ionic interactions and was decreased in D2267N mutant G3. However, the observed complement activation was attenuated due to binding of complement inhibitor factor H to CLD and CCP domains. This was most apparent at the level of deposition of terminal complement components. Taken together our observations indicate aggrecan CLD as one factor involved in the sustained inflammation of the joint.

  11. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  12. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    Science.gov (United States)

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  13. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

    OpenAIRE

    Haydar Teymourlouei

    2015-01-01

    It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such t...

  14. Complement Involvement in Periodontitis: Molecular Mechanisms and Rational Therapeutic Approaches.

    Science.gov (United States)

    Hajishengallis, George; Maekawa, Tomoki; Abe, Toshiharu; Hajishengallis, Evlambia; Lambris, John D

    2015-01-01

    The complement system is a network of interacting fluid-phase and cell surface-associated molecules that trigger, amplify, and regulate immune and inflammatory signaling pathways. Dysregulation of this finely balanced network can destabilize host-microbe homeostasis and cause inflammatory tissue damage. Evidence from clinical and animal model-based studies suggests that complement is implicated in the pathogenesis of periodontitis, a polymicrobial community-induced chronic inflammatory disease that destroys the tooth-supporting tissues. This review discusses molecular mechanisms of complement involvement in the dysbiotic transformation of the periodontal microbiome and the resulting destructive inflammation, culminating in loss of periodontal bone support. These mechanistic studies have additionally identified potential therapeutic targets. In this regard, interventional studies in preclinical models have provided proof-of-concept for using complement inhibitors for the treatment of human periodontitis.

  15. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  16. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  17. F(ab'2 antibody fragments against Trypanosoma cruzi calreticulin inhibit its interaction with the first component of human complement

    Directory of Open Access Journals (Sweden)

    LORENA AGUILAR

    2005-01-01

    Full Text Available Trypanosoma cruzi calreticulin (TcCRT, described in our laboratory, retains several important functional features from its vertebrate homologues. We have shown that recombinant TcCRT inhibits the human complement system when it binds to the collagenous portion of C1q. The generation of classical pathway convertases and membrane attack complexes is thus strongly inhibited. In most T. cruzi-infected individuals, TcCRT is immunogenic and mediates the generation of specific antibodies. By reverting the C1q / TcCRT interaction, a parasite immune evasion strategy, these antibodies contribute to the host / parasite equilibrium. In an in vitro correlate of this situation, we show that the C1q / TcCRT interaction is inhibited by F(ab'2 polyclonal anti-TcCRT IgG fragments. It is therefore feasible that in infected humans anti-TcCRT antibodies participate in reverting an important parasite strategy aimed at inhibiting the classical complement pathway. Thus, membrane-bound TcCRT interacts with the collagenous portion C1q, and this C1q is recognized by the CD91-bound host cell CRT, thus facilitating parasite internalization. Based on our in vitro results, it could be proposed that the in vivo interaction between TcCRT and vertebrate C1q could be inhibited by F(ab'2 fragments anti-rTcCRT or against its S functional domain, thus interfering with the internalization process

  18. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  19. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  20. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  1. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  2. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  3. The Role of Complement Inhibition in Thrombotic Angiopathies and Antiphospholipid Syndrome

    Science.gov (United States)

    Erkan, Doruk; Salmon, Jane E.

    2016-01-01

    Antiphospholipid syndrome (APS) is characterized by thrombosis (arterial, venous, small vessel) and/or pregnancy morbidity occurring in patients with persistently positive antiphospholipid antibodies (aPL). Catastrophic APS is the most severe form of the disease, characterized by multiple organ thromboses occurring in a short period and commonly associated with thrombotic microangiopathy (TMA). Similar to patients with complement regulatory gene mutations developing TMA, increased complement activation on endothelial cells plays a role in hypercoagulability in aPL-positive patients. In mouse models of APS, activation of the complement is required and interaction of complement (C) 5a with its receptor C5aR leads to aPL-induced inflammation, placental insufficiency, and thrombosis. Anti-C5 antibody and C5aR antagonist peptides prevent aPL-mediated pregnancy loss and thrombosis in these experimental models. Clinical studies of anti-C5 monoclonal antibody in aPL-positive patients are limited to a small number of case reports. Ongoing and future clinical studies of complement inhibitors will help determine the role of complement inhibition in the management of aPL-positive patients. PMID:27020721

  4. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  5. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  6. Guilty as charged: all available evidence implicates complement's role in fetal demise.

    Science.gov (United States)

    Girardi, Guillermina

    2008-03-01

    Appropriate complement inhibition is an absolute requirement for normal pregancy. Uncontrolled complement activation in the maternal-fetal interface leads to fetal death. Here we show that complement activation is a crucial and early mediator of pregnancy loss in two different mouse models of pregnancy loss. Using a mouse model of fetal loss and growth restriction (IUGR) induced by antiphospholipid antibodies (aPL), we examined the role of complement activation in fetal loss and IUGR. We found that C5a-C5aR interaction and neutrophils are key mediators of fetal injury. Treatment with heparin, the standard therapy for pregnant patients with aPL, prevents complement activation and protects mice from pregnancy complications induced by aPL, and anticoagulants that do not inhibit complement do not protect pregnancies. In an antibody-independent mouse model of spontaneous miscarriage and IUGR (CBA/JxDBA/2) we also identified C5a as an essential mediator. Complement activation caused dysregulation of the angiogenic factors required for normal placental development. In CBA/JxDBA/2 mice, we observed inflammatory infiltrates in placentas, functional deficiency of free vascular endothelial growth factor (VEGF), elevated levels of soluble VEGF receptor-1 (sVEGFR-1, also known as sFlt-1; a potent anti-angiogenic molecule), and defective placental development. Inhibition of complement activation blocked the increase in sVEGFR-1 and rescued pregnancies. Our studies in antibody-dependent and antibody-independent models of pregnancy complications identified complement activation as the key mediator of damage and will allow development of new interventions to prevent pregnancy loss and IUGR.

  7. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  8. Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

    Directory of Open Access Journals (Sweden)

    Chunming Zhang

    2018-01-01

    Full Text Available The advanced persistent distributed denial-of-service (APDDoS attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are both proved. The influences of the model’s parameters on attacked equilibrium are discussed. Eventually, the main conclusions of the theoretical analysis are examined through computer simulations.

  9. Complementing xeroderma pigmentosum fibroblasts restore biological activity to UV-damaged DNA

    International Nuclear Information System (INIS)

    Day, R.S. III; Kraemer, K.H.; Robbins, J.H.

    1975-01-01

    UV survival curves of adenovirus 2 using fused complementing xeroderma pigmentosum fibroblast strains as virus hosts showed a component with an inactivation slope identical to that given by normal cells. This component was not observed when the fibroblasts were not fused or when fusions involved strains in the same complementing group. Extrapolation to zero dose indicated that three percent of the viral plaque-forming units had infected cells capable of normal repair; this suggested that three percent of the cells were complementing heterokaryons. Thus, heterokaryons formed from xeroderma pigmentosum fibroblasts belonging to different complementation groups are as capable of restoring biological activity to UV-damaged adenovirus 2 as are normal cells

  10. A potent complement factor C3 specific nanobody inhibiting multiple functions in the alternative pathway of human and murine complement

    DEFF Research Database (Denmark)

    Jensen, Rasmus K; Pihl, Rasmus; Gadeberg, Trine A F

    2018-01-01

    The complement system is a complex, carefully regulated proteolytic cascade for which suppression of aberrant activation is of increasing clinical relevance and inhibition of the complement alternative pathway is a subject of intense research. Here, we describe the nanobody hC3Nb1 that binds...... to multiple functional states of C3 with sub-nanomolar affinity. The nanobody causes a complete shutdown of alternative pathway activity in human and murine serum when present in concentrations comparable to C3, and hC3Nb1 is shown to prevent both proconvertase assembly as well as binding of the C3 substrate...... to C3 convertases. Our crystal structure of the C3b-hC3Nb1 complex and functional experiments demonstrate that proconvertase formation is blocked by steric hindrance between the nanobody and an Asn-linked glycan on complement factor B. In addition, hC3Nb1 is shown to prevent factor H binding to C3b...

  11. Specificity of EIA immunoassay for complement factor Bb testing.

    Science.gov (United States)

    Pavlov, Igor Y; De Forest, Nikol; Delgado, Julio C

    2011-01-01

    During the alternative complement pathway activation, factor B is cleaved in two fragments, Ba and Bb. Concentration of those fragments is about 2 logs lower than of factor B present in the blood, which makes fragment detection challenging because of potential cross-reactivity. Lack of information on Bb assay cross-reactivity stimulated the authors to investigate this issue. We ran 109 healthy donor EDTA plasmas and 80 sera samples with both factor B immunodiffusion (The Binding Site) and Quidel Bb EIA assays. During the study it was shown that physiological concentrations of gently purified factor B demonstrated approximately 0.15% cross-reactivity in the Quidel Bb EIA assay. We also observed that Bb concentration in serum is higher than in plasma due to complement activation during clot formation which let us use sera as samples representing complement activated state. Our study demonstrated that despite the potential 0.15% cross-reactivity between endogenous factor B and cleaved Bb molecule, measuring plasma concentrations of factor Bb is adequate to evaluate the activation of the alternative complement pathway.

  12. Complement inhibitors for age-related macular degeneration.

    Science.gov (United States)

    Williams, Michael A; McKay, Gareth J; Chakravarthy, Usha

    2014-01-15

    Given the relatively high prevalence of age-related macular degeneration (AMD) and the increased incidence of AMD as populations age, the results of trials of novel treatments are awaited with much anticipation. The complement cascade describes a series of proteolytic reactions occurring throughout the body that generate proteins with a variety of roles including the initiation and promotion of immune reactions against foreign materials or micro-organisms. The complement cascade is normally tightly regulated, but much evidence implicates complement overactivity in AMD and so it is a logical therapeutic target in the treatment of AMD. To assess the effects and safety of complement inhibitors in the prevention or treatment of advanced AMD. We searched CENTRAL (which contains the Cochrane Eyes and Vision Group Trials Register) (The Cochrane Library 2013, Issue 11), Ovid MEDLINE, Ovid MEDLINE In-Process and Other Non-Indexed Citations, Ovid MEDLINE Daily, Ovid OLDMEDLINE (January 1946 to November 2013), EMBASE (January 1980 to November 2013), Allied and Complementary Medicine Database (AMED) (January 1985 to November 2013), Latin American and Caribbean Literature on Health Sciences (LILACS) (January 1982 to November 2013), OpenGrey (System for Information on Grey Literature in Europe) (www.opengrey.eu/), Web of Science Conference Proceedings Citation Index - Science (CPCI-S) (January 1990 to November 2013), the metaRegister of Controlled Trials (mRCT) (www.controlled-trials.com), ClinicalTrials.gov (www.clinicaltrials.gov) and the WHO International Clinical Trials Registry Platform (ICTRP) (www.who.int/ictrp/search/en). We did not use any date or language restrictions in the electronic searches for trials. We last searched the electronic databases on 21 November 2013. We also performed handsearching of proceedings, from 2012 onwards, of meetings and conferences of specific professional organisations. We planned to include randomised controlled trials (RCTs) with

  13. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Science.gov (United States)

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  14. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  15. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  16. Effects of radiographic contrast media on the serum complement system

    International Nuclear Information System (INIS)

    Tirone, P.; Boldrini, E.

    1983-01-01

    The authors explored the activation of the complement system produced by a nonionic organic iodine compound, namely iopamidol, which is proposed as a contrast medium for radiographic examination by intravenous and intra-arterial injection. The study was conducted in vitro versus established ionic contrasts (diatrizoate, iothalamate, acetrizoate) and a nonionic compound (metrizamide). The adopted experimental model was the immunohemolytic detector system, in which the immune complex consisted of goat erythrocytes sensitized with the corresponding antibody (hemolysin), and complement (C') was supplied by guinea pig serum. All the products caused complement activation. The results show that nonionic contrast media produce less activation of the complement system than the traditional ionic contrast. Thus the use of nonionic contrast for radiological procedures necessitating the introduction of contrast material into the blood compartment would imply a reduced risk of anaphylactoid reactions. (orig.)

  17. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  18. Development of Cyber-attack Risk Assessment Model for Nuclear Power Plants

    International Nuclear Information System (INIS)

    Park, Jong Woo; Lee, Seung Jun

    2017-01-01

    In this work, a risk evaluation method to identify significant cyber-attack scenarios and important components which should be defensed was proposed based on the probabilistic safety assessment (PSA) method which is widely used for evaluating risk of NPPs. NPPs adopting digital systems have been facing the risk of cyber-attacks. To develop efficient and reasonable defense strategy, it is required to identify significant cyber-attack scenarios and important components because there are huge number of critical digital assets in an NPP. By evaluating the risk of cyber-attack, the risk-informed defense strategies against cyber-attack could be suggested. In this work, the method to identify important cyber-attack scenarios and to evaluate the quantitative risk caused by cyber-attacks was proposed. For a future study, more feasible scenarios will be analyzed and additional modifications will be made in the model if necessary.

  19. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  20. Genetic, molecular and functional analyses of complement factor I deficiency

    DEFF Research Database (Denmark)

    Nilsson, S.C.; Trouw, L.A.; Renault, N.

    2009-01-01

    Complete deficiency of complement inhibitor factor I (FI) results in secondary complement deficiency due to uncontrolled spontaneous alternative pathway activation leading to susceptibility to infections. Current genetic examination of two patients with near complete FI deficiency and three patie...

  1. Randomized Prediction Games for Adversarial Machine Learning.

    Science.gov (United States)

    Rota Bulo, Samuel; Biggio, Battista; Pillai, Ignazio; Pelillo, Marcello; Roli, Fabio

    In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different

  2. Guinea pig complement potently measures vibriocidal activity of human antibodies in response to cholera vaccines.

    Science.gov (United States)

    Kim, Kyoung Whun; Jeong, Soyoung; Ahn, Ki Bum; Yang, Jae Seung; Yun, Cheol-Heui; Han, Seung Hyun

    2017-12-01

    The vibriocidal assay using guinea pig complement is widely used for the evaluation of immune responses to cholera vaccines in human clinical trials. However, it is unclear why guinea pig complement has been used over human complement in the measurement of vibriocidal activity of human sera and there have not been comparison studies for the use of guinea pig complement over those from other species. Therefore, we comparatively investigated the effects of complements derived from human, guinea pig, rabbit, and sheep on vibriocidal activity. Complements from guinea pig, rabbit, and human showed concentration-dependent vibriocidal activity in the presence of quality control serum antibodies. Of these complements, guinea pig complement was the most sensitive and effective over a wide concentration range. When the vibriocidal activity of complements was measured in the absence of serum antibodies, human, sheep, and guinea pig complements showed vibriocidal activity up to 40-fold, 20-fold, and 1-fold dilution, respectively. For human pre- and post-vaccination sera, the most potent vibriocidal activity was observed when guinea pig complement was used. In addition, the highest fold-increases between pre- and post- vaccinated sera were obtained with guinea pig complement. Furthermore, human complement contained a higher amount of V. cholerae- and its lipopolysaccharide-specific antibodies than guinea pig complement. Collectively, these results suggest that guinea pig complements are suitable for vibriocidal assays due to their high sensitivity and effectiveness to human sera.

  3. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  4. Virulence of Group A Streptococci Is Enhanced by Human Complement Inhibitors

    DEFF Research Database (Denmark)

    Ermert, David; Shaughnessy, Jutamas; Joeris, Thorsten

    2015-01-01

    Streptococcus pyogenes, also known as Group A Streptococcus (GAS), is an important human bacterial pathogen that can cause invasive infections. Once it colonizes its exclusively human host, GAS needs to surmount numerous innate immune defense mechanisms, including opsonization by complement and c...... in studies of GAS pathogenesis and for developing vaccines and therapeutics that rely on human complement activation for efficacy.......Streptococcus pyogenes, also known as Group A Streptococcus (GAS), is an important human bacterial pathogen that can cause invasive infections. Once it colonizes its exclusively human host, GAS needs to surmount numerous innate immune defense mechanisms, including opsonization by complement...... and consequent phagocytosis. Several strains of GAS bind to human-specific complement inhibitors, C4b-binding protein (C4BP) and/or Factor H (FH), to curtail complement C3 (a critical opsonin) deposition. This results in diminished activation of phagocytes and clearance of GAS that may lead to the host being...

  5. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Directory of Open Access Journals (Sweden)

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  6. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    Science.gov (United States)

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  7. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    . CONCLUSION: These findings are consistent with variable involvement of different brain regions during a migraine attack. The variable occurrence of nausea, and phonophobia in conjunction with photophobia, both defining features of migraine, may be an important consideration in designing clinical studies......BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  8. Classical Complement Pathway Activation in the Kidneys of Women With Preeclampsia.

    Science.gov (United States)

    Penning, Marlies; Chua, Jamie S; van Kooten, Cees; Zandbergen, Malu; Buurma, Aletta; Schutte, Joke; Bruijn, Jan Anthonie; Khankin, Eliyahu V; Bloemenkamp, Kitty; Karumanchi, S Ananth; Baelde, Hans

    2015-07-01

    A growing body of evidence suggests that complement dysregulation plays a role in the pathogenesis of preeclampsia. The kidney is one of the major organs affected in preeclampsia. Because the kidney is highly susceptible to complement activation, we hypothesized that preeclampsia is associated with renal complement activation. We performed a nationwide search for renal autopsy material in the Netherlands using a computerized database (PALGA). Renal tissue was obtained from 11 women with preeclampsia, 25 pregnant controls, and 14 nonpregnant controls with hypertension. The samples were immunostained for C4d, C1q, mannose-binding lectin, properdin, C3d, C5b-9, IgA, IgG, and IgM. Preeclampsia was significantly associated with renal C4d-a stable marker of complement activation-and the classical pathway marker C1q. In addition, the prevalence of IgM was significantly higher in the kidneys of the preeclamptic women. No other complement markers studied differed between the groups. Our findings in human samples were validated using a soluble fms-like tyrosine kinase 1 mouse model of preeclampsia. The kidneys in the soluble fms-like tyrosine kinase 1-injected mice had significantly more C4 deposits than the control mice. The association between preeclampsia and renal C4d, C1q, and IgM levels suggests that the classical complement pathway is involved in the renal injury in preeclampsia. Moreover, our finding that soluble fms-like tyrosine kinase 1-injected mice develop excess C4 deposits indicates that angiogenic dysregulation may play a role in complement activation within the kidney. We suggest that inhibiting complement activation may be beneficial for preventing the renal manifestations of preeclampsia. © 2015 American Heart Association, Inc.

  9. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    Science.gov (United States)

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  10. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  11. TCPL: A Defense against wormhole attacks in wireless sensor networks

    International Nuclear Information System (INIS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-01-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  12. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  13. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  14. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  15. Evasion Mechanisms Used by Pathogens to Escape the Lectin Complement Pathway

    DEFF Research Database (Denmark)

    Rosbjerg, Anne; Genster, Ninette; Pilely, Katrine

    2017-01-01

    the level of activity. The result is a pro-inflammatory response meant to combat foreign microbes. Microbial elimination is, however, not a straight forward procedure; pathogens have adapted to their environment by evolving a collection of evasion mechanisms that circumvent the human complement system....... Complement evasion strategies features different ways of exploiting human complement proteins and moreover features different pathogen-derived proteins that interfere with the normal processes. Accumulated, these mechanisms target all three complement activation pathways as well as the final common part...... of the cascade. This review will cover the currently known lectin pathway evasion mechanisms and give examples of pathogens that operate these to increase their chance of invasion, survival and dissemination....

  16. Low-Rate DDoS Attack Detection Using Expectation of Packet Size

    Directory of Open Access Journals (Sweden)

    Lu Zhou

    2017-01-01

    Full Text Available Low-rate Distributed Denial-of-Service (low-rate DDoS attacks are a new challenge to cyberspace, as the attackers send a large amount of attack packets similar to normal traffic, to throttle legitimate flows. In this paper, we propose a measurement—expectation of packet size—that is based on the distribution difference of the packet size to distinguish two typical low-rate DDoS attacks, the constant attack and the pulsing attack, from legitimate traffic. The experimental results, obtained using a series of real datasets with different times and different tolerance factors, are presented to demonstrate the effectiveness of the proposed measurement. In addition, extensive experiments are performed to show that the proposed measurement can detect the low-rate DDoS attacks not only in the short and long terms but also for low packet rates and high packet rates. Furthermore, the false-negative rates and the adjudication distance can be adjusted based on the detection sensitivity requirements.

  17. Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack

    International Nuclear Information System (INIS)

    Wang Wei-Long; Gao Ming; Ma Zhi

    2015-01-01

    Passive Faraday-mirror (PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure (POVM) operators plays an important role in this attack. In this paper, we propose a simple scheme to implement the POVM in PFM attack on an Faraday–Michelson quantum cryptography system. Since the POVM can not be implemented directly with previous methods, in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first, without changing the attacking effect by calculation. Based on the methods proposed by Ahnert and Payne, the linear-optical setup for implementing the POVM operators is derived. At last, the complete setup for realizing the PFM attack is presented with all parameters. Furthermore, our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup. (paper)

  18. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  19. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    Science.gov (United States)

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  20. Complement-mediated tumour growth: implications for cancer nanotechnology and nanomedicines

    DEFF Research Database (Denmark)

    Moghimi, S. M.; Andresen, Thomas Lars

    2009-01-01

    The recent unexpected observation that complement activation helps turnout growth and progression has an important bearing on the future development of cancer nanomedicines for site-specific tumour targeting as these entities are capable of triggering complement. These issues are discussed and su...

  1. Evasion Mechanisms Used by Pathogens to Escape the Lectin Complement Pathway.

    Science.gov (United States)

    Rosbjerg, Anne; Genster, Ninette; Pilely, Katrine; Garred, Peter

    2017-01-01

    The complement system is a crucial defensive network that protects the host against invading pathogens. It is part of the innate immune system and can be initiated via three pathways: the lectin, classical and alternative activation pathway. Overall the network compiles a group of recognition molecules that bind specific patterns on microbial surfaces, a group of associated proteases that initiates the complement cascade, and a group of proteins that interact in proteolytic complexes or the terminal pore-forming complex. In addition, various regulatory proteins are important for controlling the level of activity. The result is a pro-inflammatory response meant to combat foreign microbes. Microbial elimination is, however, not a straight forward procedure; pathogens have adapted to their environment by evolving a collection of evasion mechanisms that circumvent the human complement system. Complement evasion strategies features different ways of exploiting human complement proteins and moreover features different pathogen-derived proteins that interfere with the normal processes. Accumulated, these mechanisms target all three complement activation pathways as well as the final common part of the cascade. This review will cover the currently known lectin pathway evasion mechanisms and give examples of pathogens that operate these to increase their chance of invasion, survival and dissemination.

  2. The complement system at the embryo implantation site: friend or foe?

    Directory of Open Access Journals (Sweden)

    Roberta eBulla

    2012-03-01

    Full Text Available An inflammatory-like process and vascular remodeling represent the main changes that occur in decidua in the early phase of pregnancy. These changes are partly induced by trophoblast cells that colonize the decidua and are also contributed by the complement system. C1q is one of the component components produced at feto-maternal interface that serves an important function in placental development. Decidual endothelial cells synthesize and express C1q on the cell surface where it acts as a molecular bridge between endovascular trophoblast and endothelial cells. C1q is also produced by extravillous trophoblast and is used to favor trophoblast migration through the decidua. C7 is another component produced and expressed on the membrane of endothelial cells and is involved in the control of the proinflammatory effect of the terminal complement complex. Defective expression of C1q by trophoblast is associated with impaired trophoblast invasion of decidua and may have important implications in pregnancy disorders such as preeclampsia characterized by reduced vascular remodeling. Local control of complement activation by several complement regulators including cell-bound C7 is critical to prevent complement-mediated tissue damage as suggested by recent data showing an association of preeclampsia with mutations in the genes encoding for some complement regulators.

  3. Acute Systolic Heart Failure Associated with Complement-Mediated Hemolytic Uremic Syndrome

    Directory of Open Access Journals (Sweden)

    John L. Vaughn

    2015-01-01

    Full Text Available Complement-mediated hemolytic uremic syndrome (otherwise known as atypical HUS is a rare disorder of uncontrolled complement activation that may be associated with heart failure. We report the case of a 49-year-old female with no history of heart disease who presented with microangiopathic hemolytic anemia, thrombocytopenia, and acute kidney injury. Given her normal ADAMSTS13 activity, evidence of increased complement activation, and renal biopsy showing evidence of thrombotic microangiopathy, she was diagnosed with complement-mediated HUS. She subsequently developed acute hypoxemic respiratory failure secondary to pulmonary edema requiring intubation and mechanical ventilation. A transthoracic echocardiogram showed evidence of a Takotsubo cardiomyopathy with an estimated left ventricular ejection fraction of 20%, though ischemic cardiomyopathy could not be ruled out. Treatment was initiated with eculizumab. After several failed attempts at extubation, she eventually underwent tracheotomy. She also required hemodialysis to improve her uremia and hypervolemia. After seven weeks of hospitalization and five doses of eculizumab, her renal function and respiratory status improved, and she was discharged in stable condition on room air and independent of hemodialysis. Our case illustrates a rare association between acute systolic heart failure and complement-mediated HUS and highlights the potential of eculizumab in stabilizing even the most critically-ill patients with complement-mediated disease.

  4. Fault attacks, injection techniques and tools for simulation

    NARCIS (Netherlands)

    Piscitelli, R.; Bhasin, S.; Regazzoni, F.

    2015-01-01

    Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide

  5. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  6. Von Neumann algebras as complemented subspaces of B(H)

    DEFF Research Database (Denmark)

    Christensen, Erik; Wang, Liguang

    2014-01-01

    Let M be a von Neumann algebra of type II1 which is also a complemented subspace of B( H). We establish an algebraic criterion, which ensures that M is an injective von Neumann algebra. As a corollary we show that if M is a complemented factor of type II1 on a Hilbert space H, then M is injective...

  7. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    Science.gov (United States)

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  8. Securing SQL server protecting your database from attackers

    CERN Document Server

    Cherry, Denny

    2015-01-01

    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practic

  9. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  10. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  11. Defending majority voting systems against a strategic attacker

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Ben Haim, Hanoch

    2013-01-01

    Voting systems used in technical and tactical decision making in pattern recognition and target detection, data handling, signal processing, distributed and secure computing etc. are considered. A maxmin two period game is analyzed where the defender first protects and chooses units for participation in voting. The attacker thereafter attacks a subset of units. It is shown that when the defender protects all the voting units, the optimal number of units chosen for voting is either one or the maximal possible odd number. When the defender protects only the units chosen for voting, the optimal number of chosen units increases with the defender resource superiority (i.e., more resources than the attacker) and with probability of providing correct output by any unit. The system success probability always increases in the total number of voting units, the defender–attacker resource ratio, and the probability that each voting unit produces a correct output. The system success probability increases in the attacker–defender contest intensity if the defender achieves per-unit resource superiority, and otherwise decreases in the contest intensity. The presented model and enumerative algorithm allow obtaining optimal voting system defense strategy for any combination of parameters: total number of units, attack and defense resources, unit success probability and contest intensity.

  12. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  13. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  14. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  15. Breaking down the complement system: a review and update on novel therapies.

    Science.gov (United States)

    Reddy, Yuvaram N V; Siedlecki, Andrew M; Francis, Jean M

    2017-03-01

    The complement system represents one of the more primitive forms of innate immunity. It has increasingly been found to contribute to pathologies in the native and transplanted kidney. We provide a concise review of the physiology of the complement cascade, and discuss current and upcoming complement-based therapies. Current agents in clinical use either bind to complement components directly or prevent complement from binding to antibodies affixed to the endothelial surface. These include C1 esterase inhibitors, anti-C5 mAbs, anti-CD20 mAbs, and proteasome inhibitors. Treatment continues to show efficacy in the atypical hemolytic uremic syndrome and antibody-mediated rejection. Promising agents not currently available include CCX168, TP10, AMY-101, factor D inhibitors, coversin, and compstatin. Several new trials are targeting complement inhibition to treat antineutrophilic cystoplasmic antibody (ANCA)-associated vasculitis, C3 glomerulopathy, thrombotic microangiopathy, and IgA nephropathy. New agents for the treatment of the atypical hemolytic uremic syndrome are also in development. Complement-based therapies are being considered for targeted therapy in the atypical hemolytic uremic syndrome and antibody-mediated rejection, C3 glomerulopathy, and ANCA-associated vasculitis. A few agents are currently in use as orphan drugs. A number of other drugs are in clinical trials and, overall, are showing promising preliminary results.

  16. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  17. REAL-TIME INTELLIGENT MULTILAYER ATTACK CLASSIFICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    T. Subbhulakshmi

    2014-01-01

    Full Text Available Intrusion Detection Systems (IDS takes the lion’s share of the current security infrastructure. Detection of intrusions is vital for initiating the defensive procedures. Intrusion detection was done by statistical and distance based methods. A threshold value is used in these methods to indicate the level of normalcy. When the network traffic crosses the level of normalcy then above which it is flagged as anomalous. When there are occurrences of new intrusion events which are increasingly a key part of system security, the statistical techniques cannot detect them. To overcome this issue, learning techniques are used which helps in identifying new intrusion activities in a computer system. The objective of the proposed system designed in this paper is to classify the intrusions using an Intelligent Multi Layered Attack Classification System (IMLACS which helps in detecting and classifying the intrusions with improved classification accuracy. The intelligent multi layered approach contains three intelligent layers. The first layer involves Binary Support Vector Machine classification for detecting the normal and attack. The second layer involves neural network classification to classify the attacks into classes of attacks. The third layer involves fuzzy inference system to classify the attacks into various subclasses. The proposed IMLACS can be able to detect an intrusion behavior of the networks since the system contains a three intelligent layer classification and better set of rules. Feature selection is also used to improve the time of detection. The experimental results show that the IMLACS achieves the Classification Rate of 97.31%.

  18. How regional non-proliferation arrangements complement international verification

    International Nuclear Information System (INIS)

    Carlson, J.

    1999-01-01

    This presentation focuses on international verification in the form of IAEA Safeguards, and discusses the relationship between IAEA safeguards and the relevant regional arrangements, both the existing and the future. For most States the political commitment against acquisition of nuclear weapons has been carefully reached and strongly held. Their observance of treaty commitments does not depend on the deterrent effect of verification activities. Safeguards serve to assist States who recognise it is in their own interest to demonstrate their compliance to others. Thus safeguards are a vital confidence building measure in their own right, as well as being a major complement to the broader range of international confidence building measures. Safeguards can both complement other confidence building measures and in turn be complemented by them. Within consideration of how it could work it is useful to consider briefly current developments of IAEA safeguards, i.e. existing regional arrangements and nuclear weapon free zones

  19. Simulating Cyber-Attacks for Fun and Profit

    OpenAIRE

    Futoransky, Ariel; Miranda, Fernando; Orlicki, Jose; Sarraute, Carlos

    2010-01-01

    We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applications, protocols, users, etc. A novel characteristic of this tool is to simulate vulnerabilities (in...

  20. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost

    International Nuclear Information System (INIS)

    Annibale, A; Coolen, A C C; Bianconi, G

    2010-01-01

    We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network's integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optimal attack strategy and the most attack-resistant network degree statistics depend on the node removal cost function and the attack resources. The resilience of networks against intelligent attacks is found to depend strongly on the node removal cost function faced by the attacker. In particular, if node removal costs increase sufficiently fast with the node degree, power law networks are found to be more resilient than Poissonian ones, even against optimized intelligent attacks. For cost functions increasing quadratically in the node degrees, intelligent attackers cannot damage the network more than random damages would.