Introduction Honeypots are virtual doll houses that permit detection and research of new attack methods. Honeypots can provide: Intrusion detection and response. Network decoy to deter from real targets. Network sensor. Different types of Honeypots: low-interaction: a few services are emulated. high-interaction: represents a complete (real) operating system. physical: the honeypot is the same as the machine it runs on. virtual: no physical system corresponds to the honeypot.