network security paper 5