Using cloud computing to implement a security overlay network

Khaled Salah, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, Mohammed Alzaabi

Research output: Contribution to journalArticlepeer-review

67 Scopus citations

Abstract

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Original languageBritish English
Article number6226348
Pages (from-to)44-53
Number of pages10
JournalIEEE Security and Privacy
Volume11
Issue number1
DOIs
StatePublished - 2013

Keywords

  • antispam
  • antivirus
  • cloud computing
  • denial of service
  • intrusion detection
  • overlay networks
  • security

Fingerprint

Dive into the research topics of 'Using cloud computing to implement a security overlay network'. Together they form a unique fingerprint.

Cite this