Pavol Jozef Šafárik University in Kosice - Faculty of Science


Cyber security laboratory

Cyber security laboratory is dedicated to research in information and cyber security, in particular:

  • analysis of network attacks and attackers,
  • prediction of network attacks,
  • forensic analysis and cryptanalysis,
  • addressing security incidents,
  • Developing network attack detection systems and analyzing the behavior of attackers.


  • Mgr. Tomáš Bajtoš
  • doc. RNDr. Jozef Jirásek, PhD.
  • RNDr. Rastislav Krivoš-Belluš, PhD.
  • MSc. Terézia Mézešová
  • Mgr. Patrik Pekarčík
  • RNDr. JUDr. Pavol Sokol, PhD. (leading researcher)

Responsible: RNDr. JUDr. Pavol Sokol, PhD.

Technical infrastructure

  • sieťové prepínače
    • Catalyst 3560X 24 Port PoE IP Base
    • Catalyst 3K-X 10G Service Module
    • Catalyst 3560C Switch 8 GE PoE(+), 2x Dual Uplink, IP Base
  • WiFi – kontrolér a AP
    • 2504 Wireless Controller with 5 AP Licenses
    • 802.11a/g/n Fixed Unified AP; Int Ant; E Reg Domain
  • bezpečnostné zariadenia
    • ASA 5510 Appl w/ CSC10, SW, 50 Usr AV/Spy, 1 YR Subscript
    • ASA 5515-X with IPS, SW, 6GE Data, 1GE Mgmt, AC, 3DES/AES
    • ASA 5510 Security Plus Appl with SW, HA, 2GE+3FE, 3DES/AES
    • ACS 1121 Appliance With 5.x SW And Base license
    • 3x Cisco 2911 Security Bundle w/SEC license PAK

Research infrastructure

The laboratory is in the LKB room, which features a presentation screen, computer assemblies, and a data switch containing various security devices. The room is used for meetings of laboratory members and for organizing various seminars and lectures. The laboratory uses computational resources located in the Research and network datacenter.

Selected publications

  1. Mézešová, T., Bahsi, H.: Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths. In: International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident), Glasgow, Scotland, UK, June 2018. IEEE (2018).
  2. Bajtoš, T., Gajdoš, A., Kleinová, L., Lučivjanská, K., Sokol, P.: Network Intrusion Detection with Threat Agent Profiling. Secur. Commun. Networks. 2018, 1–17 (2018).
  3. Sokol, P., Gajdoš, A.: Prediction of Attacks Against Honeynet Based on Time Series Modeling. Adv. Intell. Syst. Comput. 662, 360–371 (2018).
  4. Sokol, P., Míšek, J., Husák, M.: Honeypots and honeynets: issues of privacy. Eurasip J. Inf. Secur. 2017, 4 (2017).
  5. Sokol, P., Kopčová, V.: Lessons learned from correlation of honeypots’ data & spatial data. In: Proceedings of the 8th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2016 (2017).
  6. Sokol, P., Glova, M., Mézešová, T., Hučková, R.: Lessons learned from phishing test. In: 25th Interdisciplinary Information Management Talks - Digitalization in Management, Society and Economy. pp. 297–304 (2017).
  7. Sokol, P., Host, J.: Evolution of legal issues of honeynets. In: Studies in Systems, Decision and Control. pp. 179–200. Springer, Cham (2016).
  8. Sokol, P., Kopčová, V.: Lessons learned from honeypots – Statistical analysis of logins and passwords. In: Lecture Notes in Business Information Processing. pp. 112–126 (2016).
  9. Sokol, P., Zuzčák, M., Sochor, T.: Definition of attack in context of high level interaction honeypots. In: Advances in Intelligent Systems and Computing. pp. 155–164. Springer, Cham (2015).
  10. Sokol, P., Zuzčák, M., Sochor, T.: Definition of attack in the context of low-level interaction server honeypots. In: Lecture Notes in Electrical Engineering. pp. 499–504. Springer, Berlin, Heidelberg (2015).
  11. Sokol, P., Husák, M., Lipták, F.: Deploying honeypots and honeynets: Issue of privacy. In: 10th International Conference on Availability, Reliability and Security, ARES 2015. pp. 397–403. IEEE (2015).
  12. Sokol, P., Andrejko, M.: Deploying Honeypots and Honeynets: Issues of Liability. In: Computer Networks. pp. 92–101. Springer, Cham (2015).
  13. Pisarčík, P., Pavol, S.: Framework for distributed virtual honeynets. IEEE Xplore. 6 (2015).
  14. Sokol, P., Kleinova, L., Husak, M.: Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. In: Proceedings - EUROCON 2015 (2015).

Related projects and grants

  • Developing key competences of public sector employees (RKKZ) (NFP312010D432)
  • IT Academy - National project focused on modernizing computer science education (ITMS: 312011F057)
  • APVV-17-0561 - Human rights related aspects and ethical aspects of the information security
  • APVV-14-0598 - Electronisation of business with emphasis on the legal and technical aspects

Cooperating institutions

  • Masaryk University, Brno, Czech Republic
  • CESNET, Prague, Czech Republic
  • CZ.NIC, Prague, Czech Republic

Contract partners

Related links


Last update: 23.10.2018