With the increasingly wide deployment of networks and more stringent requirement of users, the conflict between the strong dependency on highly reliable networks and the potential threats faced by the network infrastructures becomes more and more prominent.