1) The document proposes enhancing IDS systems with honeypot placement to detect zero-day attacks. A new network architecture is designed where honeypots attract attackers and log their activities to generate IDS signatures.
2) Experimental setup involves deploying a honeypot server using Honeyd and Arpd to monitor unused IP space and direct attacks. Tcpdump is used to analyze traffic and payloads directed at the honeypot.
3) Analysis of honeypot logs is used to write custom IDS rules matching observed payloads. This allows detection of new attacks before they can harm the internal network.