I. Introduction
In today's cyberspace, attackers have developed new and persistent attacks, and various attacks are consistently occurring. Attackers often use existing attack methods or their unique methods, but they sometimes create communities to share information for more efficient and complex attacks. They share the “zero-day” vulnerability to a specific target or new attack techniques through the communities. Therefore, similar attacks may be performed by several attackers.