Achieving computer system security is one of the most popular and fastest information technology in organization. System security personnel fight a seemingly unending battle to secure their digital assets against an ever increasing onslaught of attacks. Protection of information availability, its access and data integrity are the basic security characteristics of information sources. Any disruption of these properties would result in system intrusion and the related security risk. Advanced decoy based technology called honeypot has a huge potential for the security community and can achieve several goals of other security technologies, which makes it almost universal.