An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer
-
Published:2024-07-12
Issue:2
Volume:7
Page:49-67
-
ISSN:2689-5315
-
Container-title:British Journal of Computer, Networking and Information Technology
-
language:en
-
Short-container-title:British Journal of Computer, Networking and Information Technology
Author:
M. M. Yusuf,K. G. Fumlack,M. Caleb,L. C. Okpalaifeako
Abstract
In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach was adopted, integrating quantitative and qualitative research designs. Primary data were collected through surveys using Google form and network analysis tools within Cisco Packet Tracer, while secondary data is derived from a comprehensive literature review. The study employed a random sampling technique to select participants with relevant expertise in cloud security. Data analysis involved thematic analysis to identify patterns in the literature and content analysis to extract insights from survey responses. Statistical tests were used to analyze quantitative data, and network analysis was conducted on data obtained from Cisco Packet Tracer simulations. Key findings revealed that data breaches, unauthorized access, insider threats, malware, ransomware attacks, and Denial of Service (DoS) attacks were significant security concerns. The survey results indicated a consensus on the importance of specific features in efficient security routing protocols but also highlighted skepticism regarding the effectiveness of existing protocols. The proposed security measures, including the Three-Level Enabled Secret protocol, Encryption protocol, Secure Shell protocol (SSH), and various routing protocols such as EIGRP, RIP, BGP, and OSPF, Trunk protocol, switch-port security protocol were validated through simulations and showed effectiveness in mitigating security threats. The study has both theoretical and practical implications, contributing to the body of knowledge in cloud computing security and providing practical recommendations for organisations to strengthen their cloud security posture. Limitations include the simulation-based approach and the focus on specific security protocols, suggesting areas for further research in real-world implementation and integration with emerging technologies.
Publisher
African - British Journals
Reference59 articles.
1. Adelia, A., Miftahurrahmah, M., Nurpathonah, N., Zaindanu, Y., & Ihsan, M. T. (2021). The role of google form as an assessment tool in elt: Critical review of the literature. ETDC: Indonesian Journal of Research and Educational Review, 1(1), 58-66. 2. AL-Dosari, K., Deif, A. M., Kucukvar, M., Onat, N., & Fetais, N. (2023). Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events. Drones, 7(9), 555. 3. Allison, J. (2022). Simulation-based learning via cisco packet tracer to enhance the teaching of computer networks. In Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1 (pp. 68-74). 4. Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., and Ayaz, M. (2021). A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access, 9, 57792-57807. 5. Bidgoli, H. (2023). Integrating Information Technology to Healthcare and Healthcare Management: Improving Quality, Access, Efficiency, Equity, and Healthy Lives. American Journal of Management, 23(3), 111-131.
|
|