I. Introduction
Recent cyber attacks have been so sophisticated that conventional countermeasures cannot defend our networks against them. The most of the countermeasures are designed under the assumption that we can know the detail of the attacks in advance. For example, mass infection of malwares makes us possible to collect and analyze their samples to describe their features. Although we have to accept the existence of several victims, detection patterns for anti-virus and signatures for intrusion detection can be prepared as inbound countermeasures.