(Judging by voting and answers, I failed rather badly at asking a question that in my head was superbly clear. Clearly I was wrong. I've since attempted to rephrase the original question to more precisely reflect my original thought, and now with the help of two good answers to a terrible question!)
Question:
Have anyone come across a repository of Honeypot configurations modelled based on the CAPEC and a set of suitable metrics for discovering the attack pattern in question?
Background
Reports and discussions often surround the number of confirmed breaches, such as DBIR et al. While it's possible to draw a number of conclusions from this data about the effectiveness of security mechanisms it's certainly no easy task, nor particularly accurate.
I learned of CAPEC a few months back and have only recently been reintroduced to Honeypots. A failed breach attempt could, if modelled correctly, demonstrate what exactly prevented the attempted breach and hence what security mechanisms actually do work.
(Having recently had the DBIR presented to me by one of the original writers it was only in a minority of cases where for example an IDS was responsible for the discovery of the breach.)