Search results for: anti phishing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2137

Search results for: anti phishing

2137 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 455
2136 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 310
2135 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 111
2134 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 48
2133 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 297
2132 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network

Authors: M. Hilani, B. Nassih

Abstract:

Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.

Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering

Procedia PDF Downloads 83
2131 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails

Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith

Abstract:

Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.

Keywords: cybersecurity, human-centric, phishing, psychology

Procedia PDF Downloads 51
2130 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 13
2129 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 153
2128 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods

Authors: Issa Qabaja, Fadi Thabtah

Abstract:

Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.

Keywords: data mining, email classification, phishing, online security

Procedia PDF Downloads 405
2127 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021

Authors: Nkosingiphile Mbusozayo Zungu

Abstract:

The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.

Keywords: phishing, cybersecurity, informetrics, information security

Procedia PDF Downloads 83
2126 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 254
2125 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 306
2124 Anti-Oxidant and Anti-Bacterial Properties of Camellia sinensis, Tea Plant

Authors: Rini Jarial, Puranjan Mishra, Lakhveer Singh, Sveta Thakur, A. W. Zularisam, Mimi Sakinah

Abstract:

The aim of the present study was to assess the biological properties of Camellia sinensis and to identify its functional compounds. The methanolic leaves-extract (MLE) of commercial green tea (Camellia sinensis) was assessed for anti-bacterial activities by measuring inhibition zones against a panel of pathogenic bacterial strains using agar diffusion method. The flavonoid (5.0 to 8.0 mg/ml) and protein content (10 to 15 mg/ml) of the MLE were recorded. MLE at a concentration of 25 μg/ml showed marked anti-bacterial activity against all bacterial strains (11-30 mm zone of inhibition) and was maximum against Staphylococcus aureus (30 mm). The MLE of Camellia sinensis had the best MIC values of 2.25 and 0.56 mg/ml against S. aureus and Enterobacter sp., respectively. The MLE also possessed good anti-lipolytic activity (65%) against a Porcine pancreatic lipase (PPL) and cholesterol oxidase inhibition (79%). The present study provided strong experimental evidences that the MLE of Camellia sinensis is not only a potent source of natural anti-oxidants and anti-bacterial activity but also possesses efficient cholesterol degradation and anti-lipolytic activities that might be beneficial in the body weight management.

Keywords: anti-oxidant, anti-bacterial activity, anti-lipolytic activity, Camellia sinensis, phyto-chemicals

Procedia PDF Downloads 261
2123 Anti-Phosphorylcholine T Cell Dependent Antibody

Authors: M. M. Rahman, A. Liu, A. Frostegard, J. Frostegard

Abstract:

The human immune system plays an essential role in cardiovascular disease (CVD) and atherosclerosis. Our earlier studies showed that major immunocompetent cells including T cells are activated by phosphorylcholine epitope. Further, we have determined for the first time in a clinical cohort that antibodies against phosphorylcholine (anti-PC) are negatively and independently associated with the development of atherosclerosis and thus a low risk of cardiovascular diseases. It is still unknown whether activated T cells play a role in anti-PC production. Here we aim to clarify the role of T cells in anti-PC production. B cell alone, or with CD3 T, CD4 T or with CD8 T cells were cultured in polystyrene plates to examine anti-PC IgM production. In addition to mixed B cell with CD3 T cell culture, B cells with CD3 T cells were also cultured in transwell co-culture plates. Further, B cells alone and mixed B cell with CD3 T cell cultures with or without anti-HLA 2 antibody were cultured for 6 days. Anti-PC IgM was detected by ELISA in independent experiments. More than 8 fold higher levels of anti-PC IgM were detected by ELISA in mixed B cell with CD3 T cell cultures in comparison to B cells alone. After the co-culture of B and CD3 T cells in transwell plates, there were no increased antibody levels indicating that B and T cells need to interact to augment anti-PC IgM production. Furthermore, anti-PC IgM was abolished by anti-HLA 2 blocking antibody in mixed B and CD3 T cells culture. In addition, the lack of increased anti-PC IgM in mixed B with CD8 T cells culture and the increased levels of anti-PC in mixed B with CD4 T cells culture support the role of helper T cell for the anti-PC IgM production. Atherosclerosis is a major cause of cardiovascular diseases, but anti-PC IgM is a protection marker for atherosclerosis development. Understanding the mechanism involved in the anti-PC IgM regulation could play an important role in strategies to raise anti-PC IgM. Studies suggest that anti-PC is T-cell independent antibody, but our study shows the major role of T cell in anti-PC IgM production. Activation of helper T cells by immunization could be a possible mechanism for raising anti-PC levels.

Keywords: anti-PC, atherosclerosis, aardiovascular diseases, phosphorylcholine

Procedia PDF Downloads 317
2122 Ethical Aspects of the Anti-Doping System Management in Poland and in Global Framework

Authors: Malgorzata Kurleto

Abstract:

This study is trying to analyse the organization of the anti-doping system globally (particularly in Poland). The analysis is going to show the concept of doping, indicating the types of doping, and list of banned substances and methods. The paper discusses ethical aspects of the global anti-doping system. The analysis is focusing on organization of global Anti-Doping Agency. The paper will try to describe the basic assumptions of regulations adopted by WADA, called "standards” as well organization and functioning of the Polish Anti-Doping Agency (including the legal basis: POLADA). The base for this discuss will be the Polish 2018 annual report, which shows the most important assumptions, implementation and the number of anti-doping proceedings conducted in Poland. The aim of this paper is to show ethical arguments on anti-doping management strategies.

Keywords: anti-doping, ethical dilemmas, sports doping, WADA, POLADA

Procedia PDF Downloads 98
2121 Anti-Language in Jordanian Spoken Arabic: A Sociolinguistic Perspective

Authors: Ahmad Mohammad Al-Harahsheh

Abstract:

Anti-language reflects anti-society; it is a restricted spoken code used among a group of interlocutors because of anti-society. This study aims to shed light on the sociolinguistic characteristics of anti-language used by prisoners in Jordan. The participants included were 15 male-Jordanian prisoners who have recently been released. The data were written, transliterated, and analyzed on the basis of sociolinguistics and discourse analysis. This study draws on sociolinguistic theory of language codes as the theoretical framework. The study concludes that anti-language is a male language and is used for secrecy, as the prisoners' tendency to protect themselves from the police; it is a verbal competition, contest and display. In addition, it is employed to express obnoxious ideas and acts by using more pleasant or blurred words and expressions. Also, the anti-language used by prisoners has six linguistic characteristics in JSA (Jordanian Spoken Arabic), such as relexicalization, neologism, rhyme formation, semantic change, derivation, and metaphorical expressions.

Keywords: anti-language, Jordanian Spoken Arabic, sociolinguistics, prisoners

Procedia PDF Downloads 340
2120 An MrPPG Method for Face Anti-Spoofing

Authors: Lan Zhang, Cailing Zhang

Abstract:

In recent years, many face anti-spoofing algorithms have high detection accuracy when detecting 2D face anti-spoofing or 3D mask face anti-spoofing alone in the field of face anti-spoofing, but their detection performance is greatly reduced in multidimensional and cross-datasets tests. The rPPG method used for face anti-spoofing uses the unique vital information of real face to judge real faces and face anti-spoofing, so rPPG method has strong stability compared with other methods, but its detection rate of 2D face anti-spoofing needs to be improved. Therefore, in this paper, we improve an rPPG(Remote Photoplethysmography) method(MrPPG) for face anti-spoofing which through color space fusion, using the correlation of pulse signals between real face regions and background regions, and introducing the cyclic neural network (LSTM) method to improve accuracy in 2D face anti-spoofing. Meanwhile, the MrPPG also has high accuracy and good stability in face anti-spoofing of multi-dimensional and cross-data datasets. The improved method was validated on Replay-Attack, CASIA-FASD, Siw and HKBU_MARs_V2 datasets, the experimental results show that the performance and stability of the improved algorithm proposed in this paper is superior to many advanced algorithms.

Keywords: face anti-spoofing, face presentation attack detection, remote photoplethysmography, MrPPG

Procedia PDF Downloads 145
2119 Microbial Metabolites with Ability of Anti-Free Radicals

Authors: Yu Pu, Chien-Ping Hsiao, Chien-Chang Huang, Chieh-Lun Cheng

Abstract:

Free radicals can accelerate aging on human skin by causing lipid oxidation, protein denaturation, and even DNA mutation. Substances with the ability of anti-free radicals can be used as functional components in cosmetic products. Research are attracted to develop new anti-free radical components for cosmetic application. This study was aimed to evaluate the microbial metabolites on free radical scavenging ability. Two microorganisms, PU-01 and PU-02, were isolated from soil of hot spring environment and grew in LB agar at 50°C for 24 h. The suspension was collected by centrifugation at 4800 g for 3 min, The anti-free radical activity was determined by DPPH (1,1-diphenyl-2-picrylhydrazyl) scavenging assay. The result showed that the growth medium of PU-01 presented a higher DPPH scavenging effect than that of PU-02. This study presented potential anti-free radical components from microbial metabolites that might be applied in anti-aging cosmetics.

Keywords: anti-ageing, anti-free radical, biotechnology, microorganism

Procedia PDF Downloads 134
2118 Investigation of Medicinal Applications of Maclura Pomifera Extract

Authors: Mahdi Asghari Ozma

Abstract:

Background and Objective:Maclurapomifera (Rafin.) Schneider, known as osage orange, is a north american native plant which has multiple applications in herbal medicine. The extract of this plant has many therapeutic effects, including antimicrobial, anti-tumor, anti-inflammation, etc., that discussed in this study. Materials and Methods: For this study, the keywords "Maclurapomifera", "osage orange, ""herbal medicine ", and "plant extract" in the databases PubMed and Google Scholar between 2002 and 2021 were searched, and 20 articles were chosen, studied and analyzed. Results: Due to the increased resistance of microbes to antibiotics, the need for antimicrobial plants is increasing. Maclurapomifera is one of the plants with antimicrobial properties that can affect all microbes, especially Gram-negative bacteria, and fungi. This plant also has anti-tumor, anti-inflammatory, anti-oxidant, anti-aging, antiviral, anti-fungal, anti-ulcerogenic, anti-diabetic, and anti-nociceptive effects, which can be used as a substance with many amazing therapeutic applications. Conclusion: These results suggest that the extract of Maclurapomifera can be used in clinical medicine as a remedial agent, which can be substituted for chemical drugs or help them in the treatment of diseases.

Keywords: maclura pomifera, osage orange, herbal medicine, plant extract

Procedia PDF Downloads 202
2117 Anti-TNF: Possibilities of Rising Anti-Phosphorylcholine Antibodies

Authors: Md. Mizanur Rahman, Anquan Liu, Anna Frostegård, Johan Frostegård

Abstract:

The role of the human immune system is essential in cardiovascular diseases and atherosclerosis. Activated cells in atherosclerosis produce abundant amounts of cytokines, but the exact mechanisms involved in the effects of these inflammatory cytokines are not clear in atherosclerosis. In a large clinical cohort, we have previously determined that antibodies against phosphorylcholine (anti-PC) are negatively and independently associated with both development of atherosclerosis and also a low risk of cardiovascular disease. Further, we reported that rheumatoid arthritis patients who were non-responders to TNF-inhibitors, where those with low anti-PC levels. Upon anti-TNF treatment, anti-PC levels increased. We, therefore, hypothesised that proinflammatory cytokines such as TNF could play a role in anti-PC regulation. Peripheral blood mononuclear cells (PBMC) were cultured with or without TNF and anti-TNF. The cell supernatants were collected after six days for ELISA measurements. In separate experiments, cells were cultured for 24 hours in both polystyrene plates and ELISPOT plates under a similar condition for ELISA and ELISPOT assays respectively. Total RNA was extracted after 6 hours of cell culture to perform RT-qPCR. Cell viability was confirmed by trypan blue staining and MTT assays. ELISA measurements detected less than 40% of anti-PC in TNF-treated cells, in comparison to control cells, whereas anti-PC production was recovered by anti-TNF treatment. ELISPOT assays showed that TNF suppresses anti-PC production by inhibiting anti-PC producing B-cells. In addition, RT-qPCR and ELISA showed that TNF also has effects also on B-cell activation as BAFF expression was inhibited by TNF treatment. Atherosclerosis is a major cause of cardiovascular diseases, but anti-PC is a protection marker for atherosclerosis development. Our findings show that TNF is a negative regulator of anti-PC production. Immune modulation and rising of anti-PC could be of major significance for the patients.

Keywords: anti-PC, Anti-TNF, atherosclerosis, cardiovascular diseases, phosphorylecholine

Procedia PDF Downloads 217
2116 Investigating Anti-bacterial and Anti-Covid-19 Virus Properties and Mode of Action of Mg(Oh)₂ and Copper-Infused Mg(Oh)₂ Nanoparticles on Coated Polypropylene Surfaces

Authors: Saleh Alkarri, Melinda Frame, Dimple Sharma, John Cairney, Lee Maddan, Jin H. Kim, Jonathan O. Rayner, Teresa M. Bergholz, Muhammad Rabnawaz

Abstract:

Reported herein is an investigation of anti-bacterial and anti-virus properties, mode of action of Mg(OH)₂ and copper-infused Mg(OH)₂ nanoplatelets (NPs) on melt-compounded and thermally embossed polypropylene (PP) surfaces. The anti-viral activity for the NPs was studied in aqueous liquid suspensions against SARS-CoV-2, and the mode of action was investigated on neat NPs and PP samples that were thermally embossed with NPs. Anti-bacterial studies for melt-compounded NPs in PP confirmed approximately 1 log reduction of E. coli populations in 24 h, while for thermally embossed NPs, an 8 log reduction of E. coli populations was observed. In addition, the NPs exhibit anti-viral activity against SARS-CoV-2. Fluorescence microscopy revealed that reactive oxygen species (ROS) is the main mode of action through which Mg(OH)₂ and Cu-Infused Mg(OH)₂act against microbes. Plastics with anti-microbial surfaces from where biocides are non-leachable are highly desirable. This work provides a general fabrication strategy for developing anti-microbial plastic surfaces.

Keywords: anti-microbial activity, E. coli K-12 MG1655, anti-viral activity, SARS-CoV-2, copper-infused magnesium hydroxide, non-leachable, ROS, compounding, surface embossing, dyes

Procedia PDF Downloads 43
2115 Synthesis, Characterization, Validation of Resistant Microbial Strains and Anti Microbrial Activity of Substitted Pyrazoles

Authors: Rama Devi Kyatham, D. Ashok, K. S. K. Rao Patnaik, Raju Bathula

Abstract:

We have shown the importance of pyrazoles as anti-microbial chemical entities. These compounds have generally been considered significant due to their wide range of pharmacological acivities and their discovery motivates new avenues of research.The proposed pyrazoles were synthesized and evaluated for their anti-microbial activities. The Synthesized compounds were analyzed by different spectroscopic methods.

Keywords: pyrazoles, validation, resistant microbial strains, anti-microbial activities

Procedia PDF Downloads 140
2114 Rose geranium Essential Oil as a Source of New and Safe Anti-Inflammatory Drugs

Authors: M. A. Ferhat, M. N. Boukhatem, F. Chemat

Abstract:

Since the available anti-inflammatory drugs exert an extensive variety of side effects, the search for new anti-inflammatory agents has been a priority of pharmaceutical industries. The aim of the present study was to assess the anti-inflammatory activities of the essential oil of rose geranium (RGEO). The chemical composition of the RGEO was investigated by gas chromatography. The major components were citronellol (29.13%), geraniol (12.62%), and citronellyl formate (8.06%). In the carrageenan induced paw edema, five different groups were established and RGEO was administered orally in three different doses. RGEO (100 mg/kg) was able to significantly reduce the paw edema with a comparable effect to that observed with diclofenac, the positive control. In addition, RGEO showed a potent anti-inflammatory activity by topical treatment in the method of croton oil-induced ear edema. When the dose was 5 or 10 ml of RGEO per ear, the inflammation was reduced by 73 and 88%, respectively. This is the first report to demonstrate a significant anti-inflammatory activity of Algerian RGEO. In addition, histological analysis confirmed that RGEO inhibited the inflammatory responses in the skin. Our results indicate that RGEO may have significant potential for the development of novel anti-inflammatory drugs with improved safety profile.

Keywords: anti-inflammatory effect, carrageenan, citronellol, histopathology, Rose geranium

Procedia PDF Downloads 312
2113 Transfer of Business Anti-Corruption Norms in Developing Countries: A Case Study of Vietnam

Authors: Candice Lemaitre

Abstract:

During the 1990s, an alliance of international intergovernmental and non-governmental organizations proposed a set of regulatory norms designed to reduce corruption. Many governments in developing countries, such as Vietnam, enacted these global anti-corruption norms into their domestic law. This article draws on empirical research to understand why these anti-corruption norms have failed to reduce corruption in Vietnam and many other developing countries. Rather than investigating state compliance with global anti-corruption provisions, a topic that has already attracted considerable attention, this article aims to explore the comparatively under-researched area of business compliance. Based on data collected from semi-structured interviews with business managers in Vietnam and archival research, this article examines how businesses in Vietnam interpret and comply with global anti-corruption norms. It investigates why different types of companies in Vietnam engage with and respond to these norms in different ways. This article suggests that global anti-corruption norms have not been effective in reducing corruption in Vietnam because there is fragmentation in the way companies in Vietnam interpret and respond to these norms. This fragmentation results from differences in the epistemic (or interpretive) communities that companies draw upon to interpret global anti-corruption norms. This article uses discourse analysis to understand how the communities interpret global anti-corruption norms. This investigation aims to generate some predictive insights into how companies are likely to respond to anti-corruption regimes based on global anti-corruption norms.

Keywords: anti-corruption, business law, legal transfer, Vietnam

Procedia PDF Downloads 135
2112 Delivery of Doxorubicin to Glioblastoma Multiforme Using Solid Lipid Nanoparticles with Surface Aprotinin and Melanotransferrin Antibody for Enhanced Chemotherapy

Authors: Yung-Chih Kuo, I-Hsuan Lee

Abstract:

Solid lipid nanoparticles (SLNs) conjugated with aprotinin (Apr) and melanotransferrin antibody (Anti-MTf) were used to carry doxorubicin (Dox) across the blood–brain barrier (BBB) for glioblastoma multiforme (GBM) chemotherapy. Dox-entrapped SLNs with grafted Apr and Anti-MTf (Apr-Anti-MTf-Dox-SLNs) were applied to a cultured monolayer comprising human brain-microvascular endothelial cells (HBMECs) with regulation of human astrocyte (HAs) and to a proliferated colony of U87MG cells. Based on the average particle diameter, zeta potential, entrapping efficiency of Dox, and grafting efficiency of Apr and Anti-MTf, we found that 40% (w/w) 1,2-dipalmitoyl-sn-glycero-3-phosphocholine in lipids were appropriate for fabricating Apr-Anti-MTf-Dox-SLNs. In addition, Apr-Anti-MTf-Dox-SLNs could prevent Dox from fast dissolution and did not induce a serious cytotoxicity to HBMECs and HAs when compared with free Dox. Moreover, the treatments with Apr-Anti-MTf-Dox-SLNs enhanced the ability of Dox to infuse the BBB and to inhibit the growth of GBM. The current Apr-Anti-MTf-Dox-SLNs can be a promising pharmacotherapeutic preparation to penetrate the BBB for malignant brain tumor treatment.

Keywords: solid lipid nanoparticle, glioblastoma multiforme, blood–brain barrier, doxorubicin

Procedia PDF Downloads 337
2111 Pharmacological Activities and Potential Uses of Cyperus Rotundus: A Review

Authors: Arslan Masood Pirzada, Muhammad Naeem, Hafiz Haider Ali, Muhammad Latif, Aown Sammar Raza, Asad Hussain Bukhari, Muhammad Saqib, Muhammad Ijaz

Abstract:

Cyperus rotundus (Cyperaceae), a medicinal herb, is being traditionally used as a home remedy for the treatment of various clinical conditions like diarrhea, diabetic, pyretic, inflammation, malaria, and for treating stomach and bowel disorders. Its current status is one of the most widespread, troublesome, and economically damaging agronomic weeds, growing wildly in various tropical and sub-tropical regions of the world. Tuber and rhizomes of Cyperus rotundus possess a higher concentration of active ingredients in the form of essential oils, phenolic acids, ascorbic acids and flavonoids, responsible for its remedial properties. Exploitation of any medicinal plant application depends on the crucial and comprehensive information about the therapeutic potential of a plant. Researchers have evaluated and characterized the significance of Cyperus rotundus as an anti-androgenic, anti-bacterial, anti-cancerous, anti-convulsant, anti-diabetic, anti-diarrheal, anti-genotoxic, anti-inflammatory, anti-lipidemic, anti-malarial, anti-mutagenic, anti-obesity, anti-oxidant, anti-uropathogenic, hepato-, cardio-, neuroprotective, and nootropic agent. This paper comprises a broad review to summarize the current state of knowledge about chemical constituents, potential economic uses and therapeutic aspects of Cyperus rotundus that will aid in the development of bioethanol and modern herbal medicine through latest technologies that will promote the ability of this plant in the cure of many clinical disorders.

Keywords: purple nutsedge, chemical composition, economic uses, therapeutic values, future directions

Procedia PDF Downloads 476
2110 Anti-Melanogenesis and Anti-Inflammatory Effects of Opuntia humifusa

Authors: Yonghwa Lee, Yoon Suk Kim, Yongsub Yi

Abstract:

This study was to confirm the effects of anti-melanogenesis and anti-inflammatory effects from Opuntia humifusa fruit and stem extracts. A potent anti-oxidant activity was shown from the leaf extract at IC50 value of 38.33±1.07 μg/mL and fruit extract at IC50 value of 40.23±2.21 μg/mL by 1,1-diphenyl-2-picrylhydrazyl (DPPH) assay. Also, phenolic contents were confirmed total phenolic assay by high performance liquid chromatography (HPLC). Fraction of taxifolin from leaf extract was identified using HPLC and gas chromatography/mass spectrometry. The extracts of Opuntia humifusa fruit and stem were confirmed about toxicity effect in B16 F1 by cell viability. Melanin contents were decreased. Opuntia humifusa fruit and stem extracts had a positive effect of melanin synthesis inhibition for skin whitening. In investigating the anti-inflammatory activities of Opuntia humifusa, the results of cell viability indicated that taxifolin did not show cytotoxicity on RAW264.7 cells at 500 μM of concentration. The results show that taxifolin inhibited lipopolysaccharide (LPS)-induced production of Nitrite oxide (NO). In addition, taxifolin indicated the inhibition of lipopolysaccharide (LPS)-induced tumor necrosis factor (TNF) -α and interleukin (IL) -6 productions by cytokine assay and cyclooxygenase (COX)-2 expression by western blot analysis, meaning that taxifolin had a significant anti-inflammatory effect. Our results suggested that taxifolin from Opuntia humifusa has anti-melanogenesis and anti-inflammatory activities.

Keywords: anti-melanogenesis, anti-inflammatory, Opuntia humifusa, taxifolin

Procedia PDF Downloads 291
2109 Evaluation of Anti-Inflammatory Activities in Wild Herb Urginea wightii

Authors: S. K. Hemalata, M. N. Shiva Kameshwari

Abstract:

The present work focusses on anti-inflammatory action of Urginea wightii in-vitro. Urginea wightii is a member of Hyacinthaceae and considered to be wonder plant because of its varied important medicinal properties. The plant is endemic to India, Africa, and Mediterranian regions. Presence of alkaloids, flavonoid-glycosides especially flavonone derivatives are responsible for the strong anti-inflammatory activity of Urginea wightii. In present research work, anti-inflammatory activity of methanol extract of the bulb powder was tested on Male Wistar Rats. In these test animals, inflammation was induced by injecting carrageenan as the irritant to induce paw edema in Wistar rats. Inflammation of Paw edema was treated with both plant extract and Pyrox gel a known synthetic anti-inflammatory drug through external application. The result indicated that anti-inflammatory activity of Urginea wightii extract was almost similar to the synthetic Pyrox gel. This disproves the modern world's scepticism towards the herbal medicines and encourages to rely on natural plant extracts.

Keywords: anti-inflammatory activity, flavonoid-glycosides, Pyrox gel, Urginia wightii

Procedia PDF Downloads 143
2108 Anti-Corruption in Adverse Contexts: A Strategic Approach

Authors: Mushtaq H. Khan, Antonio Andreoni, Pallavi Roy

Abstract:

Developing countries are characterized by political settlements where formal rules are generally weakly enforced and widely violated. Conventional anti-corruption strategies that focus on improving the general enforcement of a rule of law and raising the costs of corruption facing individual public officials have typically delivered poor results in these contexts. Our alternative approach is to identify anti-corruption strategies that have a high impact and that are feasible to implement in these contexts. Our alternative approach identifies anti-corruption strategies from the bottom up. This involves identifying the characteristics of the corruption constraining particular development outcomes. By drawing on theories of rents and rent seeking, and theories of political settlements, we can assess the developmental impact of particular anti-corruption strategies and the feasibility of implementing these strategies. We argue that feasible anti-corruption in these contexts cannot be solely based on conventional anti-corruption strategies. In societies that have widespread rule violations, high-impact anti-corruption is only likely to be feasible if the overall strategy succeeds in aligning the interests and capabilities of powerful organizations at the sectoral level to support the enforcement of particular sets of rules. We examine four related strategies for changing these incentives and capabilities of critical stakeholders at the local or sectoral level, and we argue that this can provide a framework for organizing research on the impact and feasibility of anti-corruption activities in different priority areas in particular countries.

Keywords: anti-corruption, development, political settlements analysis, rule of law

Procedia PDF Downloads 379