Another perspective for network security