An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer

Author:

M. M. Yusuf,K. G. Fumlack,M. Caleb,L. C. Okpalaifeako

Abstract

In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach was adopted, integrating quantitative and qualitative research designs. Primary data were collected through surveys using Google form and network analysis tools within Cisco Packet Tracer, while secondary data is derived from a comprehensive literature review. The study employed a random sampling technique to select participants with relevant expertise in cloud security. Data analysis involved thematic analysis to identify patterns in the literature and content analysis to extract insights from survey responses. Statistical tests were used to analyze quantitative data, and network analysis was conducted on data obtained from Cisco Packet Tracer simulations. Key findings revealed that data breaches, unauthorized access, insider threats, malware, ransomware attacks, and Denial of Service (DoS) attacks were significant security concerns. The survey results indicated a consensus on the importance of specific features in efficient security routing protocols but also highlighted skepticism regarding the effectiveness of existing protocols. The proposed security measures, including the Three-Level Enabled Secret protocol, Encryption protocol, Secure Shell protocol (SSH), and various routing protocols such as EIGRP, RIP, BGP, and OSPF, Trunk protocol, switch-port security protocol were validated through simulations and showed effectiveness in mitigating security threats. The study has both theoretical and practical implications, contributing to the body of knowledge in cloud computing security and providing practical recommendations for organisations to strengthen their cloud security posture. Limitations include the simulation-based approach and the focus on specific security protocols, suggesting areas for further research in real-world implementation and integration with emerging technologies.

Publisher

African - British Journals

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3