Analysing Attackers and Intrusions on a High-Interaction Honeypot System | IEEE Conference Publication | IEEE Xplore