Home Page


Email & Spam

Security Terminology

Security Topics

VPN & Cryptography




Which Network Firewall

Which Home Firewall

Network Firewall Buyers Guide


Firewall Terminology

Application Control

Application Layer Filtering

Firewall Authentication

High Availability, Failover, RAID, Clustering, & Redundancy

IPS & IDS Systems

Load Balancing & Link Balancing


Network Firewall Buyers Guide

Next-Gen vs UTM

Packet Filtering

Parental Control

Perimeter Network or DMZ

Personal or Hardware Firewall?

Ports Protocols and IP Addresses


Stateful Packet Filtering



What is a Firewall?

Which home Firewall?

Which Network Firewall?

Zero Day Protection


Security Products Guide

Which Anti-Virus Software?

Which Firewall?

Which Spam Filter?

Which Internet Security Suite?


What is Guide

What is a Firewall?

What is a Virus?

What is Spam?


Essential Security Guides

Securing Windows XP Guide

Securing Windows Vista Guide

A Guide to Wireless Security



Top 8 Internet Security Tips

Why both, Firewall and Anti Virus?

Free or purchased security - Which one?





Blocking Zero Day Attacks Tutorial Guide



If a new virus or any other malware has been released out into the open, vendors would need to produce a patch for this. In the time a vendor finds out about the malicious code, creates a patch and releases this for end users, the damage may have already been done. Hardware firewalls have zero day protection features now in place to stop and minimise such unknown threats.

Zero day protection has been introduced to overcome the above issue. Zero day protection works by inspecting abnormal content and abnormal behaviour within traffic, and would drop this type of traffic.

Application layer proxies are one strategy in protecting networks against zero day attacks. They are designed to allow good traffic and block everything else. They can recognise zero day threats as most of these threats take place at the application layer.

So zero day protection is the ability to block such a threat, via common abnormalities, suspicious looking traffic, even though the exact mechanisms of the attack are not known.

For further reading, there's some excellent electronic ebooks available for download from eBooks.com