Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ivica Dodig is active.

Publication


Featured researches published by Ivica Dodig.


Telecommunication Systems | 2018

Reducing false rate packet recognition using Dual Counting Bloom Filter

Ivica Dodig; Vlado Sruk; Davor Cafuta

Distributed Denial of Service (DDoS) attacks are a serious threat to Internet security. A lot of research effort focuses on having detection and prevention methods on the victim server side or source side. The Bloom filter is a space-efficient data structure used to support pattern matching problems. The filter is utilised in network applications for deep packet inspection of headers and contents and also looks for predefined strings to detect irregularities. In intrusion detection systems, the accuracy of pattern matching algorithms is crucial for dependable detection of matching pairs, and its complexity usually poses a critical performance bottleneck. In this paper, we will propose a novel Dual Counting Bloom Filter (DCBF) data structure to decrease false detection of matching packets applicable for the


Polytechnic and design | 2017

ANALIZA NAPADA USKRAĆIVANJEM USLUGE U STVARNOMOKRUŽENJU

Igor Džanko; Ivica Dodig; Davor Cafuta; Renata Kovačević; Tin Kramberger


Polytechic & Design | 2017

Small Animal Physical Activity Monitoring System

Renata Kovačević; Kramberger Tin; Davor Cafuta; Ivica Dodig

\textit{SACK}^2


Tehnicki Vjesnik-technical Gazette | 2017

Fast-flux Botnet Detection Based on Traffic Response and Search Engines Creditworthiness

Davor Cafuta; Vlado Sruk; Ivica Dodig


international convention on information and communication technology, electronics and microelectronics | 2012

Database system performance in correlation with different storage file systems

Tin Kramberger; Davor Cafuta; Ivica Dodig

SACK2 algorithm. A theoretical evaluation will determine the false rate probability of detection and requirements for increased memory. The proposed approach significantly reduces the false rate compared to previously published results. The results indicate that the increased complexity of the DCBF does not affect efficient implementation of hardware for embedded systems that are resource constrained. The experimental evaluation was performed using extensive simulations based on real Internet traces of a wide area network link, and it was subsequently proved that DCBF significantly reduces the false rate.


international conference on computer communications | 2017

Analysing the influence of the DCBF data structure on the DoS attack detection

Ivica Dodig; Davor Cafuta; Vlado Sruk

U posljednje vrijeme Internet se znacajno unaprijedio i uvelike poboljsao komunikaciju i poslovanje. Vise poslovne korisnosti proporcionalno utjece na kolicinu sigurnosnih prijetnji. Najcesce sigurnosne prijetnje na Internetu cine mrežni napadi. Najcesci mrežni napad zasniva se na onemogucavanju normalne komunikacije. Mrežni napadi koji su usredotoceni na onemogucavanje komunikacije nazivamo Napadima sa uskracivanjem usluge (engl. Denial of Service – DoS). DoS napad sprjecava pristup korisnicima da komuniciraju u okviru napadnute racunalne mreže ili onemogucavaju poslužitelja da poslužuju normalne usluge. Razliciti mehanizmi su razvijeni za rano otkrivanje i prevenciju od DoS napada na razlicitim razinama mrežne infrastrukture. Postoji konstantan napor za izradu novog boljeg modela za komunikaciju. Međutim, metode napada također se razvijaju. Kako bi se sprijecilo blokiranje evoluirao je novi oblik napada – Distribuirani napadi s uskracivanjem usluga (engl. Distributed Denial of service napada (DDoS)). Kod DDoS-a napadaci su raspoređeni na cijelom Internetu. Koristeci mrežu kompromitiranih racunala (engl. Botnet) napad može biti pokrenut istovremeno sa stotina tisuca kompromitiranih racunala. Iskoristavajuci veliku mrežu kompromitiranih racunala izvor napada može biti dodatno skriven koristenjem Distribuiranog reflektivnog napada s uskracivanjem usluga (engl. Distributive Reflective Denial of Service (DRDoS)). U ovom radu cemo predstaviti razlicite verzije DoS napada. U pravom mrežnom okruženju, mjerenjem se pokazuje znacajnost utjecaja na rad mreže kroz dostupnost poslužitelja. Dodatno, predložiti ce se mogucnosti otkrivanja i prevencije takvih napada.


2017 International Conference on Smart Systems and Technologies (SST) | 2017

Spam detection based on search engine creditworthiness

Davor Cafuta; Ivica Dodig; Vlado Sruk

Gadgets are omnipresent in todays peoples lives. Many of them do not have a needed and smart function, but are here to bring joy and happiness to people worldwide. Consumerism and hyper production has lowered the price of consumer and business electronics. The theme of this paper is to project and implement an automated system that monitors a pet’s physical activity via popular Arduino mass produced development electronics. The system is monitoring the amount of physical activity and calculate average distance and speed the animal is doing daily. The principles and scheme of the assembly will be shown and described.


CECIIS - 2013 | 2013

Dependencies of File System Cluster Size in Correlation with Database Management System

Tin Kramberger; Davor Cafuta; Ivica Dodig


international convention on information and communication technology, electronics and microelectronics | 2012

Syncronization of information systems - Case study

Davor Cafuta; Ivica Dodig; Dalibor Grgec


IT SYSTEMS 2012 E-HEALTH & M-HEALTH 2012 | 2012

Performance of centralised identification system based on low cost RFID readers

Ivica Dodig; Davor Cafuta; Vlado Sruk

Collaboration


Dive into the Ivica Dodig's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge