Identifying and Detecting Zero Day Attacks Follow