The Community for Technology Leaders
Green Image
Issue No. 01 - Jan.-Feb. (2013 vol. 11)
ISSN: 1540-7993
pp: 44-53
Khaled Salah , Khalifa University of Science, Technology, and Research
Jose M. Alcaraz Calero , University of Valencia
Sherali Zeadally , University of the District of Columbia
Sameera Al-Mulla , Khalifa University of Science, Technology, and Research
Mohammed Alzaabi , Khalifa University of Science, Technology, and Research
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Cloud computing, Electronic mail, Intrusion detection, Computer architecture, Computer crime, Overlay networks, Computer security, antispam, cloud computing, overlay networks, security, denial of service, intrusion detection, antivirus

S. Al-Mulla, S. Zeadally, J. M. Alcaraz Calero, K. Salah and M. Alzaabi, "Using Cloud Computing to Implement a Security Overlay Network," in IEEE Security & Privacy, vol. 11, no. , pp. 44-53, 2013.
160 ms
(Ver 3.3 (11022016))