This total is divided into five chapters. First two chapters summarizes this research content, meaning and network hackers some of the basic content, chap outlined and network security status, chap analyzed this focus that the network hackers flow analysis, chapter on network security trends and the current insecurity in the network some of the recommendations.