Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Patryk Szewczyk is active.

Publication


Featured researches published by Patryk Szewczyk.


embedded and ubiquitous computing | 2011

Using Traffic Analysis to Identify the Second Generation Onion Router

John E Barker; Peter Hannay; Patryk Szewczyk

Anonymous networks provide security for users by obfuscating messages with encryption and hiding communications amongst cover traffic provided by other network participants. The traditional goal of academic research into these networks has been attacks that aim to uncover the identity of network users. But the success of an anonymous network relies not only on its technical capabilities, but on adoption by a large enough user base to provide adequate cover traffic. If anonymous network nodes can be identified, the users can be harassed, discouraging participation. Tor is an example of widely used anonymous network which uses a form of Onion Routing to provide low latency anonymous communications. This paper demonstrates that traffic from a simulated Tor network can be distinguished from regular encrypted traffic, suggesting that real world Tor users may be vulnerable to the same analysis.


The Journal of Digital Forensics, Security and Law | 2009

Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective

Patryk Szewczyk; Craig Valli

Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.


network and system security | 2010

Ignorant Experts: Computer and Network Security Support from Internet Service Providers

Patryk Szewczyk; Craig Valli

The paper examines the advice and support provided by seven major Internet Service Providers in Australia through late 2009 and early 2010 in relation to computer and network security. Previous research has indicated that many end-users will attempt to utilise the support provided by Internet Service Providers as a simple and effective method by which to obtain key information in regards to computer security. This paper demonstrates that in many cases the individuals working at the help desk are either reluctant to provide IT security support or have insufficient skill to provide the correct information.


network and system security | 2011

Usability of Internet Security Software: Have they got it right?

Patryk Szewczyk

Security software usability has been an ongoing issue for end-users. Whilst manufactures have focused on making computers and operating systems more usable, the same cannot be said for security software. Whilst the number of threats continues to escalate, end-users are left attempting to implement a security solution on their own. Previous research has shown that users are unaware of Internet threats and do not know where to start with mitigation. This paper demonstrates that in 2011, Internet Security Software is gradually becoming more usable, although there are key elements which still require improvements. This paper shows the strengths and weaknesses of current security software, and proposes a series of solutions that software vendors should consider in future releases.


The Journal of Digital Forensics, Security and Law | 2011

Analysis of Data Remaining on Second Hand ADSL Routers

Patryk Szewczyk

In theory an ADSL router is capable of providing immense security capabilities including but not limited to wireless encryption, denial of service prevention through firewall rule sets, and logging facilities for review or analysis of network events. However, most laymen may be unaware of the intricacies of the security measures available to them. As a result a vast array of information could remain on ADSL routers once the device is sold, including the users’ approach to security, Internet usage habits, or more importantly confidential user or account information. This paper presents the findings of data acquired from second hand ADSL routers purchased during the first quarter of 2011. The outcomes demonstrate that individuals are not removing their identity adequately and are leaving confidential data which may lead to detrimental outcomes if misused. The paper also demonstrates that the overall security of these devices is alarmingly low, and thus many consumers may fall victim to new and emergent Internet based crimes.


Archive | 2005

Individuals perceptions of wireless security in the home environment

Patryk Szewczyk


Archive | 2008

Malware Detection and Removal: An Examination of Personal Anti-Virus Software

Patryk Szewczyk; Murray Brand


Digital Investigation | 2017

Future challenges for smart cities

Zubair A. Baig; Patryk Szewczyk; Craig Valli; Priya Rabadia; Peter Hannay; Maxim Chernyshev; Michael N. Johnstone; Paresh Kerai; Ahmad Ibrahim; Krishnun Sansurooah; Naeem Syed; Matthew Peacock


Archive | 2012

The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia

Patryk Szewczyk; Krishnun Sansurooah


Archive | 2013

Sellers continue to give away confidential information on second hand memory cards sold in Australia

Patryk Szewczyk; Nikki Robins; Krishnun Sansurooah

Collaboration


Dive into the Patryk Szewczyk's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Craig Valli

Edith Cowan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Naeem Syed

Edith Cowan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge