Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud

dc.contributor.authorFelix Musau
dc.contributor.authorRuth Oginga
dc.contributor.authorChristopher Maghanga
dc.date.accessioned2024-08-13T08:25:25Z
dc.date.available2024-08-13T08:25:25Z
dc.date.issued2019-09
dc.description.abstractOrganizations are increasingly becoming aware of the business value that cloud computing brings and are taking steps towards transition to the cloud. With the diverseness of technologies, there are different security attacks and challenges. There are several important challenges that exist with regard to efficient provisioning and delivery of services through cloud. Threats on the cloud environment can be due to policy violation. Despite the use of protection systems to detect any malicious activities, policy violation is one factor that hinders widespread usage of cloud. The focus of this paper is on demonstrating the weaknesses of IDS and firewall on policy violation in the cloud. In particular, the research design used was based on mixed research and the prototype was tested by a group of experts. The results were demonstrated using algorithm, flow charts and experiments. It was recommended that security and applicable policies needs to be implemented to safe guard the customers‟ data.
dc.identifier.citationOginga, R., Musau, F., & Maghanga, C. (2019). Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud. In International Journal of Innovative Research in Science, Engineering and Technology (Vol. 8, Issue 9). https://doi.org/10.15680/IJIRSET.2019.0809002
dc.identifier.issnISSN(Online): 2319-8753, ISSN (Print): 2347-6710.
dc.identifier.urihttps://repository.ru.ac.ke/handle/123456789/36
dc.language.isoen
dc.publisherInternational Journal of Innovative Research in Science, Engineering and Technology
dc.relation.ispartofseriesVol.8, Issue 9.
dc.subjectPolicy violation, cloud, security, Weaknesses
dc.titleDemonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud
dc.typeArticle

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud.pdf
Size:
937.78 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: