Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud
dc.contributor.author | Felix Musau | |
dc.contributor.author | Ruth Oginga | |
dc.contributor.author | Christopher Maghanga | |
dc.date.accessioned | 2024-08-13T08:25:25Z | |
dc.date.available | 2024-08-13T08:25:25Z | |
dc.date.issued | 2019-09 | |
dc.description.abstract | Organizations are increasingly becoming aware of the business value that cloud computing brings and are taking steps towards transition to the cloud. With the diverseness of technologies, there are different security attacks and challenges. There are several important challenges that exist with regard to efficient provisioning and delivery of services through cloud. Threats on the cloud environment can be due to policy violation. Despite the use of protection systems to detect any malicious activities, policy violation is one factor that hinders widespread usage of cloud. The focus of this paper is on demonstrating the weaknesses of IDS and firewall on policy violation in the cloud. In particular, the research design used was based on mixed research and the prototype was tested by a group of experts. The results were demonstrated using algorithm, flow charts and experiments. It was recommended that security and applicable policies needs to be implemented to safe guard the customers‟ data. | |
dc.identifier.citation | Oginga, R., Musau, F., & Maghanga, C. (2019). Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud. In International Journal of Innovative Research in Science, Engineering and Technology (Vol. 8, Issue 9). https://doi.org/10.15680/IJIRSET.2019.0809002 | |
dc.identifier.issn | ISSN(Online): 2319-8753, ISSN (Print): 2347-6710. | |
dc.identifier.uri | https://repository.ru.ac.ke/handle/123456789/36 | |
dc.language.iso | en | |
dc.publisher | International Journal of Innovative Research in Science, Engineering and Technology | |
dc.relation.ispartofseries | Vol.8, Issue 9. | |
dc.subject | Policy violation, cloud, security, Weaknesses | |
dc.title | Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud | |
dc.type | Article |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud.pdf
- Size:
- 937.78 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed to upon submission
- Description: