Viral Evasion and Subversion Mechanisms of the Host Immune System

AUTHORS

Mehran Ghaemi-Bafghi 1 , alireza Haghparast 1 , *

AUTHORS INFORMATION

1 Department of Pathobiology, Faculty of Veterinary Medicine& Institute of Biotechnology, Ferdowsi University of Mashhad, Mashhad, Iran

ARTICLE INFORMATION

Zahedan Journal of Research in Medical Sciences: 15 (10); e92814
Published Online: May 27, 2013
Article Type: Review Article
Received: July 16, 2012
Revised: August 29, 2012
Accepted: September 08, 2012

Crossmark

CHEKING

READ FULL TEXT
Abstract

Viruses are the most abundant and the most versatile pathogens which challenge the immune system and cause major threats for human health. In this review, I consider the mechanisms of viral evasion and subversion of immune system. Viruses inhibit humeral immunity in different ways which contains change of viral antigens, production of regulatory proteins of complement system and receptors of the Fc part of antibodies. Also, viruses disrupt interferon production with inhibition of infected cell signaling pathways for β interferon production. Additionally, one of the most important ways of viral evasion is inhibition and manipulation of cytokines and chemokines for example Herpsviruses and Poxviruses produce virokines and viroceptors. Some of the viruses inhibit apoptosis of infected cells to use cells for more amplification. In addition, viruses change maturation and expression of MHC1 and MHC2 molecule to hide of immune system recognition. Finally, most of the viruses have developed some strategies for evasion of immune system during their development. If we know them in detail we can combat them more successfully.

Keywords

Virus Immune system Evasion mechanisms

© 2013, Zahedan Journal of Research in Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/) which permits copy and redistribute the material just in noncommercial usages, provided the original work is properly cited.
Fulltext

The full text of this article is available on the PDF file.

References
  • 1. The References of this article are available on the PDF file.
  • COMMENTS

    LEAVE A COMMENT HERE: