Adapting Honeypot Configurations to Detect Evolving Exploits