18 resultados para malware attacks
em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"
Resumo:
Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be adapted to detect malware attacks. In this paper we propose a system to perform malware distributed collection, analysis and detection, this last inspired by the human immune system. After collecting malware samples from Internet, they are dynamically analyzed so as to provide execution traces at the operating system level and network flows that are used to create a behavioral model and to generate a detection signature. Those signatures serve as input to a malware detector, acting as the antibodies in the antigen detection process. This allows us to understand the malware attack and aids in the infection removal procedures. © 2012 Springer-Verlag.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Neonatal maternal separation (NMS) is a form of stress that interferes with the regulation of the stress response, an effect that predisposes to the emergence of panic and anxiety related disorders. We previously showed that at adulthood, awake female (but not male) rats subjected to NMS show a hypercapnic ventilatory response (HCVR; 5% CO(2)) that is 63% greater than controls (Genest et al., 2007). To understand the mechanisms underlying the sex-specific effects of NMS on the ventilatory response to CO(2), we used two different anesthetized female rat preparations to assess central CO(2) chemosensitivity and contribution of sensory afferents (stretch receptors and peripheral chemoreceptors) that influence the HCVR. Data show that anesthesia eliminated the respiratory phenotype observed previously in awake females and CO(2) chemosensitivity did not differ between groups. Finally, the assessment of the ovarian hormone levels across the oestrus cycle failed to reveal significant differences between groups. Since anesthesia did not affect the manifestation of NMS-related respiratory dysfunction in males (including the hypercapnic ventilatory response) (Kinkead et al., 2005; Dumont and Kinkead, 2010), we propose that the panic or anxiety induced by CO(2) during wakefulness is responsible for enhancement of the HCVR in NMS females. (C) 2011 Elsevier B.V. All rights reserved.
Resumo:
Ataques por piranhas vêm se tornando um problema comum em trechos represados de rios e córregos no estado de São Paulo, Sudeste do Brasil. em dois surtos ocorridos em dois municípios vizinhos no noroeste do estado, 74 banhistas foram mordidos. Uma mordida por pessoa foi registrada, em curto período do ano. As mordidas estão relacionadas a cuidado parental e/ou defesa do território de desova, o que reforça estudos anteriores e desmistifica os ataques por este peixe lendário, da maneira como são popularmente percebidos. A colocação de redes de malha fina e a remoção de vegetação aquática cessaram os ataques.
Resumo:
Coatis [including Nasua nasua, the ring-tailed coati], are medium-sized mammals widely distributed in the Americas. They are social animals, whose normal diet includes insects, fruits, and small vertebrates, and rarely prey on larger sized animals. There are, to our knowledge, no reports in the medical literature of attacks on humans. This report describes a coati attack on 2 children in their home. The children sustained deep scratches and bites. The animal may have injured the humans in a defensive strike, but motivation for attack was uncertain. Coati attacks may occur in places where there is interaction between these mammals and humans.
Resumo:
Bee males (drones) of stingless bees tend to congregate near entrances of conspecific nests, where they wait for virgin queens that initiate their nuptial flight. We observed that the Neotropical solitary wasp Trachypus boharti (Hymenoptera, Cabronidae) specifically preys on males of the stingless bee Scaptotrigona postica (Hymenoptera, Apidae); these wasps captured up to 50 males per day near the entrance of a single hive. Over 90% of the wasp attacks were unsuccessful; such erroneous attacks often involved conspecific wasps and worker bees. After the capture of non-male prey, wasps almost immediately released these individuals unharmed and continued hunting. A simple behavioral experiment showed that at short distances wasps were not specifically attracted to S. postica males nor were they repelled by workers of the same species. Likely, short-range prey detection near the bees' nest is achieved mainly by vision whereas close-range prey recognition is based principally on chemical and/or mechanical cues. We argue that the dependence on the wasp's visual perception during attack and the crowded and dynamic hunting conditions caused wasps to make many preying attempts that failed. Two wasp-density-related factors, wasp-prey distance and wasp-wasp encounters, may account for the fact that the highest male capture and unsuccessful wasp bee encounter rates occurred at intermediate wasp numbers.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Agressões de morcegos a pessoas vêm sendo notificadas em várias comunidades amazônicas nesta última década. Isto constitui um risco potencial para a raiva humana transmitida por morcegos. O objetivo deste estudo foi de analisar fatores associados a estas agressões em uma destas comunidades. Foi realizado um estudo transversal em um povoado de garimpeiros na Região Amazônica brasileira (160 habitantes). Foi realizada a captura de morcegos junto às casas e foram enviadas amostras para o laboratório. Das 129 pessoas entrevistas, 41% foram agredidas por morcegos pelo menos uma vez, com 92% das mordidas localizadas nos dedos dos pés. Por meio de regressão logística, encontrou-se que adultos eram agredidos ao redor de quatro vezes mais do que crianças (OR = 3,75, IC: 1,46-9,62, p = 0,036). Homens foram agredidos com maior freqüência do que mulheres (OR = 2,08, IC: 0,90-4,76, p = 0,067). Nove Desmodus rotundus e três morcegos frugívoros foram capturados e resultaram negativos para a raiva. O estudo sugere que, em áreas de garimpo, adultos do sexo masculino têm maior probabilidade de serem agredidos por morcegos. As ações de controle para a raiva humana a serem desenvolvidas nestes lugares devem dar ênfase especial a adultos homens. Recomendam-se mais investigações sobre o modo como o garimpo na Região Amazônica está colocando em risco as pessoas e o ambiente.
Resumo:
We studied the responses of Solenopsis fire ants to Pseudacteon phorid fly attacks in southeastern Brazil. The presence of these phorid parasites triggered a suite of phorid-specific defense responses including reduced foraging, bait guarding, a curled defensive posture, and general colony immobility. The existence of these phorid-specific defenses indicates that Pseudacteon phorids exert substantial evolutionary pressure on South American fire ant populations.
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
There are many tales describing ferocious schools of piranha attacking humans, but there are few scientific data supporting such behavior. The very few documented instances of humans attacked and eaten by piranha schools include 3 that occurred after death by other causes (eg, heart failure and drowning). These predaceous fishes, however, do occasionally injure bathers and swimmers in lakes and rivers. The characteristic profile of most injuries is a single bite per victim, generally related to the fish defending its brood. This paper describes an outbreak of piranha bites in a dammed river portion in southeast Brazil. The outbreak was caused by the speckled piranha, Serrasalmus spilopleura, a widespread species which benefits from the growing tendency of damming rivers all over Brazil. This article focuses on the epidemiological and clinical aspects of the injuries, as well as on piranha biology, to gain a better understanding of the natural history of bite outbreaks.
Resumo:
The objectives of the present study were to verify if the males of the wasp Mischocyttarus cerberus participate in defense of the nest as they react to attack by ants, and to observe if they use chemical defense. First, wasps were stimulated with an empty pair of tweezers and a second stimulation was done with a pair of tweezers containing an ant, Camponotus crassus. The behaviors of the wasps were recorded and analyzed. The males can participate in defense of the nest, presenting some aggressive behaviors, even so, most of the time they ignore the stimulation, hide behind the nest and stay immobile.
Resumo:
Malware has become a major threat in the last years due to the ease of spread through the Internet. Malware detection has become difficult with the use of compression, polymorphic methods and techniques to detect and disable security software. Those and other obfuscation techniques pose a problem for detection and classification schemes that analyze malware behavior. In this paper we propose a distributed architecture to improve malware collection using different honeypot technologies to increase the variety of malware collected. We also present a daemon tool developed to grab malware distributed through spam and a pre-classification technique that uses antivirus technology to separate malware in generic classes. © 2009 SPIE.
Resumo:
Conflicts between humans and big cats have been known for centuries throughout the world, but have intensified in recent decades. Recently, attacks by Panthera onca on humans in Brazil have been brought to the forefront through exposure in the press and because of the severity of the attacks. We report 3 cases of patients attacked by jaguars in provoked and predatory situations. Two patients survived the attacks and one died. Attack mechanisms and lesions in victims are discussed. The attacks demonstrate a real risk of accidents from jaguars in certain regions, such as the Pantanal and the Amazon. © 2011 Wilderness Medical Society.
Resumo:
Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities of each scenario, such as limitations of computing resources and energy supply. Problems such as denial of service attacks are common place and cause great inconvenience. Thus, this study presents simulations of denial of service attacks on 802.11 wireless networks using the network simulator OMNeT++. Furthermore, we present an approach to mitigate such attack, obtaining significant results for improving wireless networks.