When security threats are detected, they tell us whether the essential network configuration variation strategy needs to contain more kinds of network configuration variations or needs higher requirements for them, aiming to eliminate ongoing attacks.