SinE Muhammad Ihtisamul Hasan
SinE Muhammad Ihtisamul Hasan
SinE Muhammad Ihtisamul Hasan
Supervisor By:
Andri Setiaji.S.SI..M.T.I . Muhammad Ihtisamul Hasan Bin Almahdi
NIP. 198310022006041002 NPT. 41.19.0081
Purpose Benefit
Designing and implementing a network Improve the security of BMKG's internal
security system using IPS and multiple network infrastructure and systems from
Honeypot T-Pot at BMKG external and internal threats.
• adbhoney, • honeypots,
• ciscoasa, • honeytrap,
• citrixhoneypot, • ipphoney,
• conpot, • log4pot,
• cowrie, • mailoney,
• ddospot,s • medpot,
• dicompot, • redishoneypot,
• dionaea, • sentrypeer,
• elasticpot, • snare,
• endlessh, • tanner
• glutton,
• Heralding
• hellpot,
Network Topology
10
𝑇𝑒𝑠𝑡 Succcess = × 100 %= 100 %
10
Data Logging Test
The image shows the test of sending logging from logsatash to elasticsearch and vice versa. Testing is
done by sniffing using tcpdump, the process is done by running the command "sudo tcpdump -i br-
037c238b3268 -nnNN tcp port 9200",
Penetration Testing Test
Testing Response
Penetration Testing NESSUS
Penetration Testing ZAP
Penetration Testing Nmap
Response
Testing
Testing Response
Penetration Testing mssql (port 1433)
Testing Response
Penetration Testing PTPP (Port 1723)
Testing Response
Penetration Testing Metasploit mysql (3306)
Testing Response
Network Security Analysis
Total attack by date
Attacks
14000
12000
10000
8000
6000
4000
2000
0
0 0 0 0 0 0 0
0 : 0:0 0:0 0:0 0:0 0:0
23 023 023 23 023 023
/20 4/2 4/2 /20 4/2 4/2
4/4 4 /1 4 /2 5/4 5 /1 5 /2
Network Security Analysis
Total attack by IP remote host
12%
45%
17%
20%
Source:
Conclusion and Suggestion
Further research development can Closing unused ports and installing Further research development can
add more honeypot sensors antivirus on office devices and servers implement NAT on the server so that it
so that they are not infected with can be accessed by outside networks
malware and viruses. and BMKG.
Thank You