With the increasing security threats to server networks from cyberattacks, organizations and government institutions are at risk of significant harm [1]. Servers are crucial for providing efficient and effective storage, management

Assessment 

Introduction

With the increasing security threats to server networks from cyberattacks, organizations and government institutions are at risk of significant harm [1]. Servers are crucial for providing efficient and effective storage, management, and processing of data. Despite robust security systems, vulnerabilities still exist that can be exploited by internal and external threats [2], [3]. Therefore, it is essential to implement security measures to protect servers from potential harmful attacks [4], [5]. Network security for servers involves implementing robust measures and protocols to defend against a wide range of cyber threats, including unauthorized access, data breaches, denial-of-service (DoS) attacks, malware infiltration, and more [6]. The goal is to establish multiple layers of protection to create a formidable defense against potential vulnerabilities and cyber risks [7], [8]. Various aspects of network security for servers, including the use of firewalls, intrusion detection systems (IDS), encryption protocols, access controls, and the incorporation of honeypots as deceptive security measures [9], [10]. By comprehensively addressing these aspects, organizations can bolster their server network security and ensure their critical data and services' confidentiality, integrity, and availability [11].

One increasingly popular solution for detecting and mitigating server network attacks is using Honeypot technology [12]. Honeypots are designed to mimic real systems or services within a network and act as attractive targets for attackers [13]. Honeypot is an open-source system designed to attract the attention of attackers [14]. Honeypot systems can be in the form of fake servers or applications that appear active and connected to the internet [15]. When attackers attempt to breach them, the Honeypot system records the attackers' activities, such as the type of attack, tools used, and methods employed to compromise the server network [16]. This information is then sent to the network administrator to prevent similar attacks in the future [17].

Research Method

NDLC (Network Development Life Cycle) is a methodology used in computer network development that encompasses a series of stages or steps to be followed in order to build and develop a secure and efficient network. efektif [22]. The NDLC (Network Development Life Cycle) method is one of the approaches used to identify existing issues in servers. In Figure 1, there is a flow diagram illustrating the NDLC method.

  • Requirement Analysis: The requirement analysis phase aims to identify the devices and methods used for implementing Honeypot on the server network. The hardware requirements for creating a Honeypot include a computer with the following specifications: Processor: Intel(R) Core(TM) i5- 10400 and RAM: 8.00 GB. The software requirements include the following:
    • Oracle VM Virtualbox: This virtual machine software is used to run the server operating system. b.Kali Linux: It is utilized as an attacker system, employing attack methods such as Slowloris and GoldenEye. 
    • Ubuntu: This operating system is installed with Pentbox, which is used to run the Honeypot. 
    • PfSense Firewall: It is equipped with Snort for detecting attacks and blocking them.
  • Design: After completing the requirement analysis, the next stage is network design and topology. The design phase aims to provide an overview of the implementation to be carried out. Below is the Honeypot network scheme.
  • Simulation Prototype: At this stage, a simulation is conducted based on the designed architecture.

Summary of Assessment Requirements

This assessment required the student to evaluate their understanding of server network security, identify relevant technologies used to mitigate cyber threats, and demonstrate the application of the Network Development Life Cycle (NDLC) methodology. The student was expected to:

  • Explain the importance of server security and the growing risks posed by cyberattacks.
  • Analyse vulnerabilities in server networks and outline appropriate technical security measures.
  • Demonstrate the implementation of a Honeypot system as a method for detecting and mitigating attacks.
  • Apply the NDLC methodology requirement analysis, design, and simulation prototype to design a secure network structure.
  • Evaluate hardware and software requirements, including VirtualBox, Ubuntu with Pentbox, Kali Linux, and PfSense with Snort.
  • Produce a clear, structured report outlining the implementation steps and how Honeypot technology strengthens network security.

The assessment required the student to showcase both theoretical understanding and practical application of cybersecurity and network defense strategies.