Open Access
Article
Article ID: 3072
PDF
by Farhan Nisar, Baseer Ali Rehman
Comput. Telecommun. Eng. 2025, 3(2);   
Received: 16 November 2024; Accepted: 13 March 2025; Available online: 1 April 2025;
Issue release: 30 June 2025
Abstract

The rapid expansion of cloud computing within business environments, along with the increasing complexity of organizational deployments, has led to a surge in cloud-based attacks on computer networks. These attacks exploit security vulnerabilities and systemic breaches. This study explores robust defense mechanisms by leveraging policy-based configurations and rule enforcement on edge network devices. These mechanisms were tested using GNS3 simulations to strengthen internal and external infrastructures against critical threats such as ICMP, CDP, and port security attacks.

show more