Detecting Network Intruders Connected Through Long Stepping-stone Chains