Gathering Malware Data through High-Interaction Honeypots