• Aug 09, 2018 News![CFP] The annual meeting of IJFCC Editorial Board, ICCTD 2019, will be held in Prague, Czech Republic during March 2-4, 2019.   [Click]
  • Aug 09, 2018 News!IJFCC Vol. 6, No. 1-No. 3 has been indexed by EI (Inspec).   [Click]
  • Dec 24, 2018 News!The papers published in Vol.7, No.1-No.2 have all received dois from Crossref.
General Information
    • ISSN: 2010-3751
    • Frequency: Bimonthly (2012-2016); Quarterly (Since 2017)
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Cherry L. Chan
    • Abstracting/ Indexing: Google Scholar,  Crossref, Electronic Journals LibraryEI (INSPEC, IET), etc.
    • E-mail:  ijfcc@ejournal.net 
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2013 Vol.3(1): 1-4 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2014.V3.255

Mitigation of Abuse Attack for Large Scale Network

Xiao Lin Qiao
Abstract—With the deepening of Internet applications, people increasingly dependent on the network, the Internet has revolutionized the way people live. Internet has gradually become an indispensable tool for daily life. But with the deepening of Internet applications, once the network paralysis, will result in huge economic losses. The Internet is a huge open a system, its own design and implementation of the agreement that there are many defects, plus upper layer application software itself vulnerabilities, the security of the Internet has increasingly become a focal point. This paper presents a wavelet-based preprocessing algorithm for early warning of worms. And malicious attacks on users to make a special packet processing. The terminal server to a reasonable allocation of its resources. To avoid consuming resources during an attack, the malicious user abuse of resources is a result of normal user cannot obtain effective services.

Index Terms—Network resources, consumption-based attacks, network security

Xiaolin Qiao is with the Shenzhen Polytechnic, Nanshan District, Shenzhen, Guangdong, China (e-mail: xiaolin102@126.com).


Cite:Xiao Lin Qiao, "Mitigation of Abuse Attack for Large Scale Network," International Journal of Future Computer and Communication vol. 2, no. 6, pp. 1-4, 2014.

Copyright © 2008-2018. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net