This paper proposes using a honeypot to improve the efficiency of intrusion detection systems (IDS) in detecting zero-day attacks. It presents a network architecture that deploys a honeypot and uses packet analysis tools to generate IDS signatures for new attacks. The honeypot records an attacker's activities without their knowledge. The recorded data is analyzed to write custom IDS rules matching payloads to detect similar future attacks. This allows the IDS to identify threats even without prior signatures.