This document discusses improving intrusion detection systems through the use of honeypots. It begins by outlining the need for network security due to threats like worms, trojans and DDoS attacks. It then explains how intrusion detection systems work by monitoring network traffic and alerts for suspicious activity. The document also discusses different types of IDS and their disadvantages. It proposes using honeypots, which are decoy systems, to help analyze attacks and reduce false alarms in intrusion detection systems. In conclusion, honeypots are presented as a new security paradigm that can provide valuable research to prevent threats.