Overview Introduction Virtual Honeypots Honeypot Background Honeyd Implementation Virtual Machines Virtual Network Topologies Hidden Content Introduction Steganography Background Information Hiding in JPEG Images Statistical Analysis Steganographic Systems in Use Detection Framework Discussion Conclusion