Production honeypots can be used to protect your network by intercepting attack probes intended for IP addresses that are currently unused and sending to the honeypot. The honeypot will then interact with the attacker leading it to believe it's a different system than it really is. This can be combined with tarpitting to slow attackers.
Honeypots are an exciting new technology. They allow us to turn the tables on the bad guys, we can take the initiative. In the past several years there has been growing interest in exactly what this technology is and how it works. The purpose of this paper is to introduce you to honeypots and demonstrate their capabilities. We will begin by discussing what a honeypot is and how it works, then go into detail using the OpenSource solution Honeyd.