As show in the figure 11, the victim must treat with the IP packets includes the malicious packets and then decrypt them. The process impropriates resource of CPU. So, the legal packets can not be arranged. The result is that the victim can not provide his service for legal users.