Active network decoys (Deception) belong to the Intrusion Detection System class of solutions — intrusion detection systems. The main purpose of such a system is to detect an attempt at unauthorized access to the network. In other words, active network decoys help detect network attacks.
Deception can be represented as a centralized management system for false network objects, which are commonly called decoys. Each trap is, in fact, a separate honeypot, that is, a separate network resource that does not interact with anyone, but only waits for the attacker to record his actions, but they are all connected to a central server.