Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

An Efficient Security Framework for Cloud Computing
Farhan Nisar, Samad Baseer, Arshad khan
Department of Computer Science and Information Technology Qurtaba University, Department of Engineering & Technology University of Engineering & Technology, Peshawar Pakistan
Abstract: Many organisations have been established due to the rapid development of cloud in business environments. Today, our scenario related to cloud attacks on computer networks has increased because of security vernal ability and breaches in establishments. Many attack spenetrate our edge network device; some of the most prone attacks are ICMP attacks, CDP attacks and port security attacks, leading to a denial of service. In this paper, we analyze different mechanisms to provide network security by using different policies and rules on edge network devices to protect the network devices. We can be tested in Lab in Lab by using the GNS3 simulator. We are implementing these mechanisms to protect internal and external networks from attacks like ICMP, CDP, and Port Security.
Keywords: Attacks, Security, Network, DoS, ICMP, CDP, Port Security An Efficient Security Framework for Cloud Computing
DOI:https://doi.org/10.6025/jisr/2024/15/1/23-29
Full_Text   PDF 853 KB   Download:   28  times
References:

[1] Harshita. (2013). A survey of different types of security threats and its countermeasures.

[2] Computerweekly.com. 

[3] Ponemon Institute/Symantic.com.

[4] Ionanidis, J., Bellovin, S. (2012). Implementing PushBack: Router-based Defense Against DDoS Attacks.

[5] Rao, R. (2007). On Scalable Attack Detection in the Network.

[6] Karerna., David. (2009). Scalable Network-Layer Defense Mechanism against Internet Bandwidth Flooding Attack.

[7] Lui, X. (2010). Preventing Internet Denial of Service from Inside Out.

[8] Bogdanoshi, M. (2011). Wireless Network Behavior under ICMP Flood DoS Attack and Mitigation Techniques.

[9] TELELINK. (2013). Corporate WAN Threats, IT Threats – Control Plane Attack.

[10] CSA, Security Guidance. (2014). Construction of digital campus security based cloud computing.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info