Zero Day Detection Techniques Blackhole monitoring Monitor large unused networks Profile traffic, continually watch trends Correlation analysis LAN or WAN monitoring Honeypot technologies Mimic exposed systems, watch attacks Behavioral anomaly detection Statistical Protocol Relational