The Community for Technology Leaders
Green Image
Issue No. 01 - Jan.-Feb. (2013 vol. 11)
ISSN: 1540-7993
pp: 44-53
Sameera Al-Mulla , Khalifa University of Science, Technology, and Research
Sherali Zeadally , University of the District of Columbia
Jose M. Alcaraz Calero , University of Valencia
Khaled Salah , Khalifa University of Science, Technology, and Research
Mohammed Alzaabi , Khalifa University of Science, Technology, and Research
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Cloud computing, Electronic mail, Intrusion detection, Computer architecture, Computer crime, Overlay networks, Computer security, antispam, cloud computing, overlay networks, security, denial of service, intrusion detection, antivirus
Sameera Al-Mulla, Sherali Zeadally, Jose M. Alcaraz Calero, Khaled Salah, Mohammed Alzaabi, "Using Cloud Computing to Implement a Security Overlay Network", IEEE Security & Privacy, vol. 11, no. , pp. 44-53, Jan.-Feb. 2013, doi:10.1109/MSP.2012.88
85 ms
(Ver 3.3 (11022016))