Currently, cloud and Internet service providers typically use antivirus, firewall, packet inspection and intrusion detection systems (IDSs) to protect against cyber-security threats on the cloud and internet. These protection systems rely on the knowledge of a fixed and known database of threats to detect malicious activity, but they have no ability to detect new, mutated, threats dynamically. Once an undetected cyber-attack has caused damage and has subsequently been identified by technicians or third party sources, only then can these systems be updated by going offline.