Felix MusauRuth OgingaChristopher Maghanga2024-08-132024-08-132019-09Oginga, R., Musau, F., & Maghanga, C. (2019). Demonstrating the Weaknesses of IDS and Firewall on Policy Violation in the Cloud. In International Journal of Innovative Research in Science, Engineering and Technology (Vol. 8, Issue 9). https://doi.org/10.15680/IJIRSET.2019.0809002ISSN(Online): 2319-8753, ISSN (Print): 2347-6710.https://repository.ru.ac.ke/handle/123456789/36Organizations are increasingly becoming aware of the business value that cloud computing brings and are taking steps towards transition to the cloud. With the diverseness of technologies, there are different security attacks and challenges. There are several important challenges that exist with regard to efficient provisioning and delivery of services through cloud. Threats on the cloud environment can be due to policy violation. Despite the use of protection systems to detect any malicious activities, policy violation is one factor that hinders widespread usage of cloud. The focus of this paper is on demonstrating the weaknesses of IDS and firewall on policy violation in the cloud. In particular, the research design used was based on mixed research and the prototype was tested by a group of experts. The results were demonstrated using algorithm, flow charts and experiments. It was recommended that security and applicable policies needs to be implemented to safe guard the customers‟ data.enPolicy violation, cloud, security, WeaknessesDemonstrating the Weaknesses of IDS and Firewall on Policy Violation in the CloudArticle