<?xml version="1.0" encoding="UTF-8"?>
<record>
  <title>Efficient Security and AI Defence Mechanisms in Cyber Networks</title>
  <journal>Journal of Information Security Research</journal>
  <author>Farhan Nisar, Baseer Ali Rehman, Sana Shafiq, Shum Yee Chan, Rabina Safi</author>
  <volume>16</volume>
  <issue>4</issue>
  <year>2025</year>
  <doi>https://doi.org/10.6025/jisr/2025/16/4/137-149</doi>
  <url>https://www.dline.info/jisr/fulltext/v16n4/jisrv16n4_1.pdf</url>
  <abstract>The document examines cloud computing security challenges, emphasizing that misconfigurations, weak
identity controls, insecure APIs, and DoS/DDoS attacks are among the most critical vulnerabilities in modern
cloud environments. It highlights that human error not platform flaws is the primary cause of breaches,
underscoring the need for robust policy based defenses. The study's main contribution involves analyzing
various DoS attack types (volumetric, protocol based, and application layer), enhancing edge router security
through ACLs, rate limiting, and deep packet inspection, and validating these measures in a GNS3 network
simulation environment. Key experiments demonstrate that disabling Cisco Discovery Protocol (CDP), enabling
DHCP snooping, and applying port security effectively mitigate ICMP floods, rogue DHCP servers, and
reconnaissance threats. The paper validates established best practices such as those from Cisco rather than
proposing novel cryptographic or architectural solutions. While results show 100% mitigation of specific
attacks under controlled conditions, limitations include the lack of real world deployment, the absence of AI
despite the title's implication, a narrow threat scope, and a simplified network topology. Future work
recommends testing in live multi cloud infrastructures, integrating AI driven anomaly detection for adaptive
policy enforcement, and developing context aware threat models for hybrid cloud ecosystems. Overall, the
research provides practical, simulation backed evidence that foundational Layer 2/3 security configurations
significantly improve resilience against common network layer threats in cloud infrastructures.</abstract>
</record>
