Honeypot Background Honeypots are a security resource whose value lies in being probed, attacked, or compromised. Provide IDS functionality. All data leaving or entering a honeypot is collected to gain insight into new attack methods. Different types of Honeypots: low-interaction: a few services are emulated not the whole operating system. high-interaction: represents a complete (real) operating system. physical: the honeypot is the same as the machine it runs on. virtual: no physical system corresponds to the honeypot.