Open source honeypots can be useful for a wide variety of purposes. They can help locate attackers quickly and provide a new way to automate more offensive cyber security measures. The goal of these deception networks is threefold: Reduce the dwell time of any attacker or malware on your network. Some tools have very realistic decoys and a wide range of decoy types, including ATM terminals and SCADA controllers, all to appear more like real running computers. The faster you are notified about an attacker roaming your routers, the better.”]

