Dissecting the brain's fear system reveals the hypothalamus is critical for responding in subordinate conspecific intruders.
نویسندگان
چکیده
Effective defense against natural threats in the environment is essential for the survival of individual animals. Thus, instinctive behavioral responses accompanied by fear have evolved to protect individuals from predators and from opponents of the same species (dominant conspecifics). While it has been suggested that all perceived environmental threats trigger the same set of innately determined defensive responses, we tested the alternate hypothesis that different stimuli may evoke differentiable behaviors supported by distinct neural circuitry. The results of behavioral, neuronal immediate early gene activation, lesion, and neuroanatomical experiments indicate that the hypothalamus is necessary for full expression of defensive behavioral responses in a subordinate conspecific, that lesions of the dorsal premammillary nucleus drastically reduce behavioral measures of fear in these animals, and that essentially separate hypothalamic circuitry supports defensive responses to a predator or a dominant conspecific. It is now clear that differentiable neural circuitry underlies defensive responses to fear conditioning associated with painful stimuli, predators, and dominant conspecifics and that the hypothalamus is an essential component of the circuitry for the latter two stimuli.
منابع مشابه
P43: Neuroanatomical Basis of Anxiety Disorders
Anxiety is an emotion characterized by an unpleasant manner of inner distress, often accompanied by nervous behavior. Anxiety is related to the particular behaviors of fight or flight responses. The amygdala, the insula and anterior cingulate cortex seem to be critical, and all three have been referred to as the fear network .The amygdala which plays a fundamental role in neural network of fear...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملInterspecific aggression and character displacement of competitor recognition in Hetaerina damselflies.
In zones of sympatry between closely related species, species recognition errors in a competitive context can cause character displacement in agonistic signals and competitor recognition functions, just as species recognition errors in a mating context can cause character displacement in mating signals and mate recognition. These two processes are difficult to distinguish because the same trait...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Proceedings of the National Academy of Sciences of the United States of America
دوره 106 12 شماره
صفحات -
تاریخ انتشار 2009