Honeypots

Honeypots are closely monitored fake APs that "trap" unauthorized users.  They serve as an important security tool for detection, prevention and counteraction of attackers.  They normally contain no traffic so often times, attackers are identified by traffic within honeypots.  When the attacker unknowingly accesses these honeypots, their activity is then monitored and accessed by the creator of such honeypot.  There are primarily 2 types of honeypots: Production honeypots and Research honeypots.

Production Honeypots:  These are most often utilized by big companies and corporations and allow for the creator to access limited activity of the attacker.

Research Honeypots:  These are most often used by military and government organizations and allow for extensive access to the attacker's activity.

A successful Honeypot is one in which an attacker is actually unable to detect that he/she actually has fallen victim to the Honeypot. Most Honeypots are installed inside firewalls so that they can be better administered, although they can also operate outside of firewalls.

Honeypots are excellent ways for the creators to improve their computer systems. The Honeypot is mimics a system that an attacker would want to exploit and allows all traffic from the attacker, however it would limit them from full access to the system and controls what is the system's output. By deliberately allowing access into the systems, the Honeypot creators are able to gather where their system needs protection reinforcement, can actually capture the attackers before they get to the root of the system, and can build more secure systems in the future.

This shows that fake APs operate dual roles in the modern world. Despite the fact that fake APs can be and often are used maliciously, they can also be utilized to facilitate learning for computer system creators to employ better security and prevention methods.

Visual of how a Honeypot works.