RESEARCH SCOPE

Current network security systems are progressively showing their limitations as it is estimated that only about 50% of new threats can be successfully detected. Therefore it is vital to find a new direction in which cybersecurity development should follow.

In Bio-inspired Security Research Group (BSRG) we strongly believe that the next-generation cybersecurity systems should seek inspiration in nature and that current and future cybersecurity solutions should be designed, developed and deployed in a way that will allow to take full advantage of nature's experience.

Current works in this field can be broadly divided into two groups, depending on how an inspiration is drawn:
  • An inspiration is drawn from a given organism's characteristic feature/defense mechanism (internal or external). Internal mechanisms include e.g. an immune system, while external features are for example different camouflage or mimicry techniques.
  • An inspiration can also be drawn from various organisms' interactions - this includes e.g. cooperative behavior or prey-predator association.

We do our best to contribute in both abovementioned fields.


GROUP MEMBERS

Head of the Research Group
Wojciech Mazurczyk, Ph.D., D.Sc.

PhD students
Piotr Białczak, M.Sc.
Marcin Gregorczyk, M.Sc.
Paweł Łąka, M.Sc.
Elżbieta Rzeszutko, M.Sc.

Master and Bachelor students
Maciej Karwowski, B.Sc.
Michał Krawczyk, B.Sc.
Maciej Podolski, B.Sc.


ACTIVITIES

We are organizing a Feature Topic on Bio-inspired Cyber Security for Communications and Networking for IEEE Communications magazine - submission deadline is November 1st, 2015 - submit your paper now! [NEW]

We are also proud organizers of 1st Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2016) which is co-located with 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016) - consider submitting your paper now! (deadline is January, 15th 2016)


PROJECTS

For our work on bio-inspired cybersecurity that draws inspiration from nature's interactions and mechanisms please check out the page of our Cybersecurity.bio project and 'Publications' section below.

For bio-inspired camouflage and mimicry techniques we proposed a number of information hiding methods which are included under Stegano.net project.


PUBLICATIONS

Our ten most recent publications:
  1. W. Mazurczyk, S. Drobniak, S. Moore - Towards a Systematic View on Cybersecurity Ecology (submitted)
  2. E. Rzeszutko, W. Mazurczyk - Insights from the Nature for Cybersecurity - Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (now Health Security Journal), April 2015, Vol. 13, No. 2, pp. 82-87
  3. W. Mazurczyk, E. Rzeszutko - Security - a perpetual war: lessons from nature - IEEE IT Professional, vol. 17, no. 1, pp. 16-22, January/February 2015
  4. W. Mazurczyk, L. Caviglione - Information Hiding as a Challenge for Malware Detection - IEEE Security and Privacy Magazine, Issue 2, March/April 2015, pp. 89-93
  5. L. Caviglione, W. Mazurczyk - Understanding Information Hiding in iOS - IEEE Computer Magazine, January 2015, Vol. 48, Iss. 1, pp. 62 - 65
  6. A. Janicki, W. Mazurczyk, K. Szczypiorski - Evaluation of Efficiency of Transcoding Steganography - Journal of Homeland Security and Emergency Management, 2015, DOI: 10.1515/jhsem-2014-0028
  7. W. Mazurczyk, L. Caviglione - Steganography in Modern Smartphones and Mitigation Techniques - IEEE Communications Surveys & Tutorials, 2014, DOI: 10.1109/COMST.2014.2350994
  8. W. Mazurczyk, S. Wendzel, I. Azagra Villares, K. Szczypiorski - On Importance of Steganographic Cost For Network Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, 2014, DOI: 10.1002/sec.1085
  9. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography, IEEE Communication Magazine, vol. 52, no. 5, May 2014
  10. E. Zielinska, W. Mazurczyk, K. Szczypiorski - Trends in Steganography - Communications of the ACM, vol 57, No.2, March 2014, pp. 86-95


COLLABORATION

We closely cooperate with the researchers from the following institutions:


CONTACT

For any enquires please contact us at: contact@cybersecurity.bio.