Introduction Internet has become a complicated system that is used for many often unanticipated purposes: Virtual networks that do not exist but are supposed to be found. Steganographic messages hidden so that they will not be found. Internet-wide scans for vulnerabilities are more frequent and attacks increase in sophistication. Honeypots permit detection and research of new attack methods.