MOLECULAR IDENTIFICATION OF TRYPANOSOMES IN WILD TSETSE FLIES CAPTURED FROM KAINJI LAKE NATIONAL PARK, NIGERIA.
Keywords:
Tsetse fly, Vectorial capacity, PCR, Trypanosoma vivax, Trypanosoma congolense, Glossina tachnoides, Apparent fly densityAbstract
In order to detect and identify trypanosomes in the wild, and to better understand tsetse-trypanosome relationships, Tsetse flies were trapped from the Kanji-Lake Nation al Park, North-central, Nigeria, using 20 biconical Tsetse traps obtained from Nigerian Institute for Trypanosomiasis, Kaduna. The traps were deployed, covering a 10km distance on the banks of the Oli River at the park. Flies were harvested daily, sorted and preserved in absolute alcohol. A total of 234 flies were trapped in three days comprising159 females and 75 males. The apparent fly density was determined, (Fly/Trap/Day, FTD). DNA extraction was performed on 72 randomly selected flies. Extracted DNA was then subjected to PCR using ITS1 of the ribosomal DNA. Results identified all flies as Glossina tachnoides sp with an apparent fly density (FTD), of 3.93. PCR amplification indicated that 56 (78%) of the flies were infected with Trypanosoma vivax and Trypanosoma congolense (either as single or mixed infections). This infection rate of 78% is considered high and suggests a high level of flies’ vectorial capacity. Tsetse fly being a major transmitter of Animal and human Trypanosomiasis, its high vectorial capacity is a key indicator of the prevalence of the disease. The findings of this study therefore present issues of major health concerns because of the potential risk of Trypanosomiasis infection to tourists, livestock and other animals in the park and its buffer zones. A timely intervention to suppress fly population in the park is suggested.
References
Atul, K., & Jevitha, K. (2017). Prevention of PAC File Based Attack Using DHCP Snooping. Security in Computing Communications (pp. 195–204. DOI: 10.1007/978-981-10-6898-0_16). Springer Nature Singapore Pte Ltd.
Harris, M. (2016, February 9). DHCP Snooping: Basic Concepts and Configuration. Retrieved from Pearson IT Certification: https://www.pearsonitcertification.com/articles/printerfriendly/2474170
Hubballi, N., & Tripathi, N. (2016). A Closer Look into DHCP Starvation Attack in Wireless Networks. Computers & Security, DOI: 10.1016/j.cose.2016.10.002.
Mitra, A. (2019, October 25). What is DHCP Starvation attack and how does it work? Retrieved from The Security Buddy: https://www.thesecuritybuddy.com/network-security/what-is-dhcp-starvation-attack-and-how-does-it-work/
Mukhtar, H., Salah, K., & Iraqi, Y. (2012). Mitigation of DHCP starvation attack. Computers and Electrical Engineering 338(5), 1115–1128; DOI: 10.1016/j.compeleceng.2012.06.005.
Neumann, J. C (2015). The book of GNS3: build virtual network labs using Cisco, Jupiter, and more. San Francisco: No Starch press.
Rooney, T. (2011). Introduction to IP Address Management. John Wiley & Sons; pp55.
Tripathi, N., & Hubballi, N. (2017). Detecting Stealth DHCP Starvation Attack using Machine. Journal of Computer Virology and Hacking Technique, 1-12; DOI: 10.1007/s11416-017-0310-x.
Younes, O. S. (2016). A Secure DHCP Protocol to Mitigate LAN Attacks. Journal of Computer and Communications, 4, 39-50. . http://dx.doi.org/10.4236/jcc.2016.41005.
Published
How to Cite
Issue
Section
FUDMA Journal of Sciences