Unlike misuse detection, anomaly detection requires normal network behavior to associate and compare with anomaly behavior of the network traffic. This detection can detect unknown/new-type of worm. However, it is complicate to differentiate normal behavior and abnormal behavior of network traffic. Some benign traffic may be falsely classified as attack. Examples of network activities that are difficult to classify are peer-to-peer protocols and some media applications [2].