An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer

Yusuf M. M., Fumlack K. G., Caleb M., Okpalaifeako L. C.
{"title":"An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer","authors":"Yusuf M. M., Fumlack K. G., Caleb M., Okpalaifeako L. C.","doi":"10.52589/bjcnit-oyirlauk","DOIUrl":null,"url":null,"abstract":"In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach was adopted, integrating quantitative and qualitative research designs. Primary data were collected through surveys using Google form and network analysis tools within Cisco Packet Tracer, while secondary data is derived from a comprehensive literature review. The study employed a random sampling technique to select participants with relevant expertise in cloud security. Data analysis involved thematic analysis to identify patterns in the literature and content analysis to extract insights from survey responses. Statistical tests were used to analyze quantitative data, and network analysis was conducted on data obtained from Cisco Packet Tracer simulations. Key findings revealed that data breaches, unauthorized access, insider threats, malware, ransomware attacks, and Denial of Service (DoS) attacks were significant security concerns. The survey results indicated a consensus on the importance of specific features in efficient security routing protocols but also highlighted skepticism regarding the effectiveness of existing protocols. The proposed security measures, including the Three-Level Enabled Secret protocol, Encryption protocol, Secure Shell protocol (SSH), and various routing protocols such as EIGRP, RIP, BGP, and OSPF, Trunk protocol, switch-port security protocol were validated through simulations and showed effectiveness in mitigating security threats. The study has both theoretical and practical implications, contributing to the body of knowledge in cloud computing security and providing practical recommendations for organisations to strengthen their cloud security posture. Limitations include the simulation-based approach and the focus on specific security protocols, suggesting areas for further research in real-world implementation and integration with emerging technologies.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"British Journal of Computer, Networking and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52589/bjcnit-oyirlauk","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach was adopted, integrating quantitative and qualitative research designs. Primary data were collected through surveys using Google form and network analysis tools within Cisco Packet Tracer, while secondary data is derived from a comprehensive literature review. The study employed a random sampling technique to select participants with relevant expertise in cloud security. Data analysis involved thematic analysis to identify patterns in the literature and content analysis to extract insights from survey responses. Statistical tests were used to analyze quantitative data, and network analysis was conducted on data obtained from Cisco Packet Tracer simulations. Key findings revealed that data breaches, unauthorized access, insider threats, malware, ransomware attacks, and Denial of Service (DoS) attacks were significant security concerns. The survey results indicated a consensus on the importance of specific features in efficient security routing protocols but also highlighted skepticism regarding the effectiveness of existing protocols. The proposed security measures, including the Three-Level Enabled Secret protocol, Encryption protocol, Secure Shell protocol (SSH), and various routing protocols such as EIGRP, RIP, BGP, and OSPF, Trunk protocol, switch-port security protocol were validated through simulations and showed effectiveness in mitigating security threats. The study has both theoretical and practical implications, contributing to the body of knowledge in cloud computing security and providing practical recommendations for organisations to strengthen their cloud security posture. Limitations include the simulation-based approach and the focus on specific security protocols, suggesting areas for further research in real-world implementation and integration with emerging technologies.
使用思科数据包跟踪器的云网络高效安全路由协议
鉴于云计算的使用日益增多,本研究利用思科数据包跟踪器(Cisco Packet Tracer)为基于云的网络设计并实施了一种高效的安全路由协议。云计算的共享资源和动态可扩展性使基于云的网络很容易受到不受欢迎的访问、数据泄露和内部攻击的影响,从而引发了这项研究。研究目标是识别安全威胁并对其进行分类,评估现有的安全解决方案,提出增强的安全措施,并通过在 Cisco Packet Tracer 中进行模拟来验证这些解决方案。研究采用混合方法,将定量和定性研究设计相结合。主要数据通过使用谷歌表格和 Cisco Packet Tracer 中的网络分析工具进行调查收集,而辅助数据则来自全面的文献综述。研究采用了随机抽样技术,以选择具有云安全相关专业知识的参与者。数据分析包括主题分析和内容分析,主题分析用于识别文献中的模式,内容分析用于从调查回复中提取见解。统计测试用于分析定量数据,而网络分析则是通过思科 Packet Tracer 仿真获得的数据进行的。主要调查结果显示,数据泄露、未经授权的访问、内部威胁、恶意软件、勒索软件攻击和拒绝服务(DoS)攻击是重要的安全问题。调查结果表明,人们对高效安全路由协议中特定功能的重要性达成了共识,但也强调了对现有协议有效性的怀疑。建议的安全措施包括三层启用保密协议、加密协议、安全外壳协议(SSH)和各种路由协议(如 EIGRP、RIP、BGP 和 OSPF)、中继协议、交换机端口安全协议,这些措施通过模拟进行了验证,并显示出在减轻安全威胁方面的有效性。这项研究具有理论和实践意义,有助于丰富云计算安全知识,并为企业加强云安全态势提供实用建议。研究的局限性包括基于模拟的方法和对特定安全协议的关注,建议在现实世界的实施和与新兴技术的整合方面开展进一步研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信