Browsing by Author "Ruth Oginga"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item A Model for Detecting Information Technology Infrastructure Policy Violations in a Cloud Environment(The International Journal Of Science And Technoledge, 2019-09) Felix Musau; Ruth Oginga; Christopher MaghangaThe pervasiveness of the internet and available connectivity solutions brought about by cloud computing has led to unprecedented increase in technologies built based on information technology infrastructures. Most organizations consider the deployment of different types of protection systems to curb the various malicious activities. Organizations offer sophisticated monitoring and reporting capabilities to identify attacks against cloud environment, while stopping multiple classes of attacks before they successful interfere with network activities. Users with ill intentions have increasingly used the cloud as an attack vector due to its ubiquity, scalability and open nature despite the existence of policy violation detection systems necessitating the need to strengthen access policies from time to time. Policy violation detection plays a major role in information security by providing a systematic way of detection and interpreting attacks. Some of the known weaknesses of most detection tools are the generation of false positives or false alerts and inability to perform analysis if traffic is encrypted as well as failure to detect and prevent attacks. This research paper was concerned with the investigation of weaknesses of firewall and Intrusion Detection system (IDS) which are supported by the cloud. The research design for the paper was based on the mixed methods. Experimental results revealed weakness in existing systems specifically IDS and firewall. Unlike the existing systems, new model designed to overcome the shortfall was able to detect both known and unknown attacks and signatures. Moreover, the model was capable of preventing the occurrence of false positives, and terminates suspicious nodes in real time without human intervention. Based on the tests carried out, it was recommended that Policy violation detection model be implemented to guarantee protection. An additional area of application such as migration from one cloud to another is not achievable, at this moment because of the heterogeneous nature of the cloud. This is a potential area for investigation in future.Item Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud(International Journal of Innovative Research in Science, Engineering and Technology, 2019-09) Felix Musau; Ruth Oginga; Christopher MaghangaOrganizations are increasingly becoming aware of the business value that cloud computing brings and are taking steps towards transition to the cloud. With the diverseness of technologies, there are different security attacks and challenges. There are several important challenges that exist with regard to efficient provisioning and delivery of services through cloud. Threats on the cloud environment can be due to policy violation. Despite the use of protection systems to detect any malicious activities, policy violation is one factor that hinders widespread usage of cloud. The focus of this paper is on demonstrating the weaknesses of IDS and firewall on policy violation in the cloud. In particular, the research design used was based on mixed research and the prototype was tested by a group of experts. The results were demonstrated using algorithm, flow charts and experiments. It was recommended that security and applicable policies needs to be implemented to safe guard the customers‟ data.