The Analysis of Peer-to-Peer Network Security