First, according to the security requirements from the users of hosts 1 and 2, the variation of routes is performed on the TCP communication between these two hosts with a change frequency of 20 s, aiming to protect the communication from monitoring and masquerading.