Understanding Linux-Based Honeypots: A Detailed Exploration into Cybersecurity Defense