problem, and in order to prevent information leakage, we built a system to prevent malware from expanding its influence, in the network itself. •This system utilizes an algorithm for detecting anomalies based on the communication tendencies of clients. •Future tasks •TCP fragment packet processing •Evaluate the system with actual malware •Detect encrypted backdoor communications •Consider a response method other than packet drop 27