Using cloud computing to implement a security overlay network

Khaled Salah, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, Mohammed Alzaabi

Research output: Contribution to journalArticlepeer-review

58 Citations (Scopus)

Abstract

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Original languageEnglish
Pages (from-to)44-53
Number of pages10
JournalIEEE Security and Privacy
Volume11
Issue number1
Early online date26 Jun 2012
DOIs
Publication statusPublished - 28 Feb 2013
Externally publishedYes

Keywords

  • cloud computing
  • overlay networks
  • security
  • denial of service
  • intrusion detection
  • antivirus
  • antispam

Fingerprint

Dive into the research topics of 'Using cloud computing to implement a security overlay network'. Together they form a unique fingerprint.

Cite this