Current network security systems are progressively showing their limitations as it is estimated that only about 50% of new threats can be successfully detected.
Therefore it is vital to find a new direction in which cybersecurity development should follow.
In Bio-inspired Security Research Group (BSRG) we strongly believe that the next-generation cybersecurity systems should seek inspiration in nature and that current and future cybersecurity solutions should be designed, developed and deployed in a way that will allow to take full advantage of nature's experience.
- An inspiration is drawn from a given organism's characteristic feature/defense mechanism (internal or external). Internal mechanisms include e.g. an immune system, while external features are for example different camouflage or mimicry techniques.
- An inspiration can also be drawn from various organisms' interactions - this includes e.g. cooperative behavior or prey-predator association.
We do our best to contribute in both abovementioned fields.
Head of the Research GroupWojciech Mazurczyk, Ph.D., D.Sc.
PhD studentsPiotr Białczak, M.Sc.
Marcin Gregorczyk, M.Sc.
Mikołaj Kowalski, M.Sc.
Słamowir Krawczyk, M.Sc.
Paweł Łąka, M.Sc.
Słamowir Nowaczewski, M.Sc.
Piotr Nowakowski, M.Sc.
Krzysztof Opasiak, M.Sc.
Grzegorz Siewruk, M.Sc.
Elżbieta Rzeszutko, M.Sc.
Master and Bachelor studentsPiotr Żórawski, B.Sc.
Jakub Krasowski, B.Sc.
Monika Skowron, B.Sc.
Witold Precikowski, B.Sc.
Maciej Karwowski, M.Sc.
Krystian Powójski, M.Sc.
Maciej Podolski, M.Sc.
Marcin Urbanski, M.Sc.
CURRENT ACTIVITIESWe are also proud organizers of 3rd Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2018) which is co-located with 39th IEEE Symposium on Security and Privacy (IEEE S&P 2018)
PAST ACTIVITIESWe were organizing a Feature Topic on Bio-inspired Cyber Security for Communications and Networking for IEEE Communications magazine
We were organizers of Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR) which was co-located with IEEE Symposium on Security and Privacy (IEEE S&P) in 2016 and 2017
PROJECTSFor our work on bio-inspired cybersecurity that draws inspiration from nature's interactions and mechanisms please check out the page of our Cybersecurity.bio project and 'Publications' section below.
For bio-inspired camouflage and mimicry techniques we proposed a number of information hiding methods which are included under Stegano.net project.
PUBLICATIONSOur most recent publications:
- K. Opasiak, W. Mazurczyk - (In)Secure Android Debugging (submitted)
- W. Mazurczyk, S. Wendzel, M. Chourib, J. Keller - You Shall Not Pass: Countering Network Covert Channels with Dynamic Wardens (submitted)
- P. Białczak, W. Mazurczyk - Malware network traffic analysis for detection of HTTP protocol anomalies (submitted)
- P. Łąka, W. Mazurczyk - User Perspective and Security of a New Mobile Authentication, Telecommunication Systems, DOI: 10.1007/s11235-018-0437-1
- K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System - In Proc. of 5G Network Security (5G-NS 2018) workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
- E. Rzeszutko, W. Mazurczyk - Nature-inspired analogies and metaphors for cyber security - E. M. El-Alfy, M. Eltoweissy, E. Fulp, W. Mazurczyk - Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques, and Applications, Institution of Engineering and Technology (IET), 2019
- K. Cabaj, M. Gregorczyk, W. Mazurczyk - Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics, Computers and Electrical Engineering, Vol. 66, pp. 353-368, DOI: 10.1016/j.compeleceng.2017.10.012, February 2018
- L. Caviglione, M. Podolski, W. Mazurczyk, M. Ianigro - Covert Channels in Personal Cloud Storage Services: the case of Dropbox, IEEE Transactions on Industrial Informatics, Vol. 13, Iss. 4, pp. 1921-1931, 2017 DOI: 10.1109/TII.2016.2627503
- K. Cabaj, W. Mazurczyk, P. Nowakowski, P. Zorawski - Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
- S. Wendzel, W. Mazurczyk, G. Haas - Don't You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings - In Proc. of the Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2017) co-located with the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017), San Jose, USA, May 25, 2017
- M. Urbanski, W. Mazurczyk, J-F. Lalande, L. Caviglione - Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones - International Journal of Computer Systems Science and Engineering, Vol. 32 No. 2, March 2017
- L. Caviglione, M. Gaggero, J-F. Lalande, M. Urbanski, W. Mazurczyk - Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence - IEEE Transactions on Information Forensics and Security, Vol. 11, No. 4, pp. 799-810, April 2016
- W. Mazurczyk, S. Moore, E. W. Fulp, H. Wada, K. Leibnitz - Bio-inspired Cyber Security for Communications and Networking - IEEE Communication Magazine, pp. 120-121, June 2016
- W. Mazurczyk, S. Drobniak, S. Moore - Towards a Systematic View on Cybersecurity Ecology - In B. Akhgar and B. Brewster (eds.), Combatting Cybercrime and Cyberterrorism, Advanced Sciences and Technologies for Security Applications, Springer, DOI: 10.1007/978-3-319-38930-1, June 2016, pp. 17-37
- E. Rzeszutko, W. Mazurczyk - Insights from the Nature for Cybersecurity - Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (now Health Security Journal), April 2015, Vol. 13, No. 2, pp. 82-87
- W. Mazurczyk, E. Rzeszutko - Security - a perpetual war: lessons from nature - IEEE IT Professional, vol. 17, no. 1, pp. 16-22, January/February 2015
- W. Mazurczyk, L. Caviglione - Information Hiding as a Challenge for Malware Detection - IEEE Security and Privacy Magazine, Issue 2, March/April 2015, pp. 89-93
- W. Mazurczyk, L. Caviglione - Steganography in Modern Smartphones and Mitigation Techniques - IEEE Communications Surveys & Tutorials, 2014, DOI: 10.1109/COMST.2014.2350994
- E. Zielinska, W. Mazurczyk, K. Szczypiorski - Trends in Steganography - Communications of the ACM, vol 57, No.2, March 2014, pp. 86-95
COLLABORATIONWe closely cooperate with the researchers from the following institutions:
- Institute for Applied Mathematics and Information Technologies "Enrico Magenes" (IMATI), National Research Council of Italy (CNR), Italy
- Worms University of Applied Sciences, Worms, Germany
- Cyber Security Department, Fraunhofer FKIE, Bonn, Germany
- Security and Distributed Systems Team at Laboratoire d'Informatique Fondamentale d'Orléans, INSA Centre-Val de Loire, France
- Institute of Environmental Sciences, Jagiellonian University, Poland