I. Introduction
Recently, cyber attacks become so sophisticated. In case of targeted attacks, attackers investigate target network carefully, and use malwares dedicated to target network. Such malwares slip through countermeasures and operate over a long period of time. In addition, current malware hides its communication in normal communication. Thus, it is difficult to detect and avoid such malwares with conventional countermeasures. Countermeasures for preventing malware intrusion like firewalls and/or IDS (Intrusion Detection System) were mainstream in former days.