Current network security systems are progressively showing their limitations as it is estimated that only about 50% of new threats can be successfully detected.
Therefore it is vital to find a new direction in which cybersecurity development should follow.
In Bio-inspired Security Research Group (BSRG) we strongly believe that the next-generation cybersecurity systems should seek inspiration in nature and that current and future cybersecurity solutions should be designed, developed and deployed in a way that will allow to take full advantage of nature's experience.
- An inspiration is drawn from a given organism's characteristic feature/defense mechanism (internal or external). Internal mechanisms include e.g. an immune system, while external features are for example different camouflage or mimicry techniques.
- An inspiration can also be drawn from various organisms' interactions - this includes e.g. cooperative behavior or prey-predator association.
We do our best to contribute in both abovementioned fields.
Head of the Research GroupWojciech Mazurczyk, Ph.D., D.Sc.
PhD studentsPiotr Białczak, M.Sc.
Marcin Gregorczyk, M.Sc.
Paweł Łąka, M.Sc.
Elżbieta Rzeszutko, M.Sc.
Master and Bachelor studentsMaciej Karwowski, B.Sc.
Michał Krawczyk, B.Sc.
Maciej Podolski, B.Sc.
ACTIVITIESWe are organizing a Feature Topic on Bio-inspired Cyber Security for Communications and Networking for IEEE Communications magazine - submission deadline is November 1st, 2015 - submit your paper now! [NEW]
We are also proud organizers of 1st Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2016) which is co-located with 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016) - consider submitting your paper now! (deadline is January, 15th 2016)
PROJECTSFor our work on bio-inspired cybersecurity that draws inspiration from nature's interactions and mechanisms please check out the page of our Cybersecurity.bio project and 'Publications' section below.
For bio-inspired camouflage and mimicry techniques we proposed a number of information hiding methods which are included under Stegano.net project.
PUBLICATIONSOur ten most recent publications:
- W. Mazurczyk, S. Drobniak, S. Moore - Towards a Systematic View on Cybersecurity Ecology (submitted)
- E. Rzeszutko, W. Mazurczyk - Insights from the Nature for Cybersecurity - Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (now Health Security Journal), April 2015, Vol. 13, No. 2, pp. 82-87
- W. Mazurczyk, E. Rzeszutko - Security - a perpetual war: lessons from nature - IEEE IT Professional, vol. 17, no. 1, pp. 16-22, January/February 2015
- W. Mazurczyk, L. Caviglione - Information Hiding as a Challenge for Malware Detection - IEEE Security and Privacy Magazine, Issue 2, March/April 2015, pp. 89-93
- L. Caviglione, W. Mazurczyk - Understanding Information Hiding in iOS - IEEE Computer Magazine, January 2015, Vol. 48, Iss. 1, pp. 62 - 65
- A. Janicki, W. Mazurczyk, K. Szczypiorski - Evaluation of Efficiency of Transcoding Steganography - Journal of Homeland Security and Emergency Management, 2015, DOI: 10.1515/jhsem-2014-0028
- W. Mazurczyk, L. Caviglione - Steganography in Modern Smartphones and Mitigation Techniques - IEEE Communications Surveys & Tutorials, 2014, DOI: 10.1109/COMST.2014.2350994
- W. Mazurczyk, S. Wendzel, I. Azagra Villares, K. Szczypiorski - On Importance of Steganographic Cost For Network Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, 2014, DOI: 10.1002/sec.1085
- J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography, IEEE Communication Magazine, vol. 52, no. 5, May 2014
- E. Zielinska, W. Mazurczyk, K. Szczypiorski - Trends in Steganography - Communications of the ACM, vol 57, No.2, March 2014, pp. 86-95
COLLABORATIONWe closely cooperate with the researchers from the following institutions:
- Institute of Intelligent Systems for Automation (ISSIA), National Research Council of Italy (CNR), Italy
- Cyber Security Department, Fraunhofer FKIE, Bonn, Germany
- Security and Distributed Systems Team at Laboratoire d'Informatique Fondamentale d'Orléans, INSA Centre-Val de Loire, France
- Institute of Environmental Sciences, Jagiellonian University, Poland