• Jan 05, 2017 News![CFP] 2017 the annual meeting of IJFCC Editorial Board, ICCTD 2017, will be held in Paris, France during March 20-22, 2017.   [Click]
  • Mar 24, 2016 News! IJFCC Vol. 4, No. 4 has been indexed by EI (Inspec).   [Click]
  • Jun 28, 2017 News!Vol.6, No.3 has been published with online version.   [Click]
General Information
    • ISSN: 2010-3751
    • Frequency: Bimonthly (2012-2016); Quarterly (Since 2017)
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: Google Scholar, Engineering & Technology Digital Library, and Crossref, DOAJ, Electronic Journals LibraryEI (INSPEC, IET).
    • E-mail:  ijfcc@ejournal.net 
Editor-in-chief
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2013 Vol.3(1): 1-4 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2014.V3.255

Mitigation of Abuse Attack for Large Scale Network

Xiao Lin Qiao
Abstract—With the deepening of Internet applications, people increasingly dependent on the network, the Internet has revolutionized the way people live. Internet has gradually become an indispensable tool for daily life. But with the deepening of Internet applications, once the network paralysis, will result in huge economic losses. The Internet is a huge open a system, its own design and implementation of the agreement that there are many defects, plus upper layer application software itself vulnerabilities, the security of the Internet has increasingly become a focal point. This paper presents a wavelet-based preprocessing algorithm for early warning of worms. And malicious attacks on users to make a special packet processing. The terminal server to a reasonable allocation of its resources. To avoid consuming resources during an attack, the malicious user abuse of resources is a result of normal user cannot obtain effective services.

Index Terms—Network resources, consumption-based attacks, network security

Xiaolin Qiao is with the Shenzhen Polytechnic, Nanshan District, Shenzhen, Guangdong, China (e-mail: xiaolin102@126.com).

[PDF]

Cite:Xiao Lin Qiao, "Mitigation of Abuse Attack for Large Scale Network," International Journal of Future Computer and Communication vol. 2, no. 6, pp. 1-4, 2014.

Copyright © 2008-2016. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net