Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape | IEEE Conference Publication | IEEE Xplore