Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud

No Thumbnail Available

Date

2019-09

Journal Title

Journal ISSN

Volume Title

Publisher

International Journal of Innovative Research in Science, Engineering and Technology

Abstract

Organizations are increasingly becoming aware of the business value that cloud computing brings and are taking steps towards transition to the cloud. With the diverseness of technologies, there are different security attacks and challenges. There are several important challenges that exist with regard to efficient provisioning and delivery of services through cloud. Threats on the cloud environment can be due to policy violation. Despite the use of protection systems to detect any malicious activities, policy violation is one factor that hinders widespread usage of cloud. The focus of this paper is on demonstrating the weaknesses of IDS and firewall on policy violation in the cloud. In particular, the research design used was based on mixed research and the prototype was tested by a group of experts. The results were demonstrated using algorithm, flow charts and experiments. It was recommended that security and applicable policies needs to be implemented to safe guard the customers‟ data.

Description

Keywords

Policy violation, cloud, security, Weaknesses

Citation

Oginga, R., Musau, F., & Maghanga, C. (2019). Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud. In International Journal of Innovative Research in Science, Engineering and Technology (Vol. 8, Issue 9). https://doi.org/10.15680/IJIRSET.2019.0809002