Intrusion detection systems, commonly known as IDS are used in modern everyday networks. One of the most popular forms of IDS in the Honeypot. Honeypots are decoy systems basically, that are used to lure in possible attackers that threaten secure networks. Honeypots can be used on wired or wireless network technologies. In this paper I hope to inform of how some honeypots are deployed.
According to the Cyber and Homeland Security Research and Development study done at Dartmouth College on honeypots, one way of deployment of a honeypot is through deception services.
This document is in PDF format. To view it click here.