Attacking Infiltration In Network: Fundamental Challenges And Actions