Collection and analysis of attack data based on honeypots deployed on the Internet