Vulnerability Analysis and Defense for the Internet door