Which of the following acts as a decoy to detect active Internet attacks? A、Honeypots B、Firewalls C、Trapdoors D、Traffic analysis