Design and requirements to Build a honeypot

Design a honeypot It should be Forensic analysis honeypot, which can capture and isolate the malware or hacker tools The honeypots should mimic mail-server and web server The honeypot should collect all the attacks being used against the domain (.nl) on which it is installed It should be a Low-interaction honeypot to simulate the services commonly requested by attackers. The honeypot will be placed on the internet on a dedicated public IP The honeypot should be based on emulation software The honeypot should be built with open source tools and software’s The article should recommend a design including which monitoring and alerting tools to use based on the previous mentioned criteria