887 resultados para DDoS attack defense


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The plant cell wall constitutes an essential protection barrier against pathogen attack. In addition, cell-wall disruption leads to accumulation of jasmonates (JAs), which are key signaling molecules for activation of plant inducible defense responses. However, whether JAs in return modulate the cell-wall composition to reinforce this defensive barrier remains unknown. The enzyme 13-allene oxide synthase (13-AOS) catalyzes the first committed step towards biosynthesis of JAs. In potato (Solanum tuberosum), there are two putative St13-AOS genes, which we show here to be differentially induced upon wounding. We also determine that both genes complement an Arabidopsis aos null mutant, indicating that they encode functional 13-AOS enzymes. Indeed, transgenic potato plants lacking both St13-AOS genes (CoAOS1/2 lines) exhibited a significant reduction of JAs, a concomitant decrease in wound-responsive gene activation, and an increased severity of soft rot disease symptoms caused by Dickeya dadantii. Intriguingly, a hypovirulent D. dadantii pel strain lacking the five major pectate lyases, which causes limited tissue maceration on wild-type plants, regained infectivity in CoAOS1/2 plants. In line with this, we found differences in pectin methyl esterase activity and cell-wall pectin composition between wild-type and CoAOS1/2 plants. Importantly, wild-type plants had pectins with a lower degree of methyl esterification, which are the substrates of the pectate lyases mutated in the pel strain. These results suggest that, during development of potato plants, JAs mediate modification of the pectin matrix to form a defensive barrier that is counteracted by pectinolytic virulence factors from D. dadantii.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The signaling pathways that allow plants to mount defenses against chewing insects are known to be complex. To investigate the role of jasmonate in wound signaling in Arabidopsis and to test whether parallel or redundant pathways exist for insect defense, we have studied a mutant (fad3–2 fad7–2 fad8) that is deficient in the jasmonate precursor linolenic acid. Mutant plants contained negligible levels of jasmonate and showed extremely high mortality (≈80%) from attack by larvae of a common saprophagous fungal gnat, Bradysia impatiens (Diptera: Sciaridae), even though neighboring wild-type plants were largely unaffected. Application of exogenous methyl jasmonate substantially protected the mutant plants and reduced mortality to ≈12%. These experiments precisely define the role of jasmonate as being essential for the induction of biologically effective defense in this plant–insect interaction. The transcripts of three wound-responsive genes were shown not to be induced by wounding of mutant plants but the same transcripts could be induced by application of methyl jasmonate. By contrast, measurements of transcript levels for a gene encoding glutathione S-transferase demonstrated that wound induction of this gene is independent of jasmonate synthesis. These results indicate that the mutant will be a good genetic model for testing the practical effectiveness of candidate defense genes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Salicylic acid (SA) plays a critical signaling role in the activation of plant defense responses after pathogen attack. We have identified several potential components of the SA signaling pathway, including (i) the H2O2-scavenging enzymes catalase and ascorbate peroxidase, (ii) a high affinity SA-binding protein (SABP2), (iii) a SA-inducible protein kinase (SIPK), (iv) NPR1, an ankyrin repeat-containing protein that exhibits limited homology to IκBα and is required for SA signaling, and (v) members of the TGA/OBF family of bZIP transcription factors. These bZIP factors physically interact with NPR1 and bind the SA-responsive element in promoters of several defense genes, such as the pathogenesis-related 1 gene (PR-1). Recent studies have demonstrated that nitric oxide (NO) is another signal that activates defense responses after pathogen attack. NO has been shown to play a critical role in the activation of innate immune and inflammatory responses in animals. Increases in NO synthase (NOS)-like activity occurred in resistant but not susceptible tobacco after infection with tobacco mosaic virus. Here we demonstrate that this increase in activity participates in PR-1 gene induction. Two signaling molecules, cGMP and cyclic ADP ribose (cADPR), which function downstream of NO in animals, also appear to mediate plant defense gene activation (e.g., PR-1). Additionally, NO may activate PR-1 expression via an NO-dependent, cADPR-independent pathway. Several targets of NO in animals, including guanylate cyclase, aconitase, and mitogen-activated protein kinases (e.g., SIPK), are also modulated by NO in plants. Thus, at least portions of NO signaling pathways appear to be shared between plants and animals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Systemic acquired resistance is an important component of the disease-resistance arsenal of plants, and is associated with an enhanced potency for activating local defense responses upon pathogen attack. Here we demonstrate that pretreatment with benzothiadiazole (BTH), a synthetic activator of acquired resistance in plants, augmented the sensitivity for low-dose elicitation of coumarin phytoalexin secretion by cultured parsley (Petroselinum crispum L.) cells. Enhanced coumarin secretion was associated with potentiated activation of genes encoding Phe ammonia-lyase (PAL). The augmentation of PAL gene induction was proportional to the length of pretreatment with BTH, indicating time-dependent priming of the cells. In contrast to the PAL genes, those for anionic peroxidase were directly induced by BTH in the absence of elicitor, thus confirming a dual role for BTH in the activation of plant defenses. Strikingly, the ability of various chemicals to enhance plant disease resistance correlated with their capability to potentiate parsley PAL gene elicitation, emphasizing an important role for defense response potentiation in acquired plant disease resistance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, it has become apparent that salicylic acid (SA) plays an important role in plant defense responses to pathogen attack. Previous studies have suggested that one of SA's mechanisms of action is the inhibition of catalase, resulting in elevated levels of H2O2, which activate defense-related genes. Here we demonstrate that SA also inhibits ascorbate peroxoidase (APX), the other key enzyme for scavenging H2O2. The synthetic inducer of defense responses, 2,6-dichloroisonicotinic acid (INA), was also found to be an effective inhibitor of APX. In the presence of 750 microM ascorbic acid (AsA), substrate-dependent IC50 values of 78 microM and 95 microM were obtained for SA and INA, respectively. Furthermore, the ability of SA analogues to block APX activity correlated with their ability to induce defense-related genes in tobacco and enhance resistance to tobacco mosaic virus. Inhibition of APX by SA appears to be reversible, thus differing from the time-dependent, irreversible inactivation by suicide substrates such as p-aminophenol. In contrast to APX, the guaiacol-utilizing peroxidases, which participate in the synthesis and crosslinking of cell wall components as part of the defense response, are not inhibited by SA or INA. The inhibition of both catalase and APX, but not guaiacol peroxidases, supports the hypothesis that SA-induced defense responses are mediated, in part, through elevated H2O2 levels or coupled perturbations of the cellular redox state.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Issued in chapters of ca. 54-70 p. each.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Errata slips reverse the titles of chapters 2 and 3 of the manual.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Includes bibliographical references.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of Popular Communication examines the impact of the global financial crisis and recession on differnt aspects of global and regional media and the cultural industries, changing practices of media production, as well as media consumption, and the interplay of economic challenges and technological change.