Problem How can we defend against an enemy, when we don't know who the enemy is? Internet-wide exploitation of vulnerabilities happens frequently: Scripted exploitation to create Zombies for DDoS attacks. Automatic exploitation via worms. Detecting new attacks and threats important: Early warning of new attacks. Security is an iterative process. As attackers get better, systems need to increase their security.