Traditional intrusion detection systems rely on systems that collect data when actual devices or applications are infiltrated. Some security experts advocate the use of honeypots, to lure bad guys into systems that look valuable but are simply decoys. But a new start up is taking a different approach.