The Community for Technology Leaders
RSS Icon
Issue No.01 - Jan.-Feb. (2013 vol.11)
pp: 44-53
Khaled Salah , Khalifa University of Science, Technology, and Research
Jose M. Alcaraz Calero , University of Valencia
Sherali Zeadally , University of the District of Columbia
Sameera Al-Mulla , Khalifa University of Science, Technology, and Research
Mohammed Alzaabi , Khalifa University of Science, Technology, and Research
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Cloud computing, Electronic mail, Intrusion detection, Computer architecture, Computer crime, Overlay networks, Computer security, antispam, cloud computing, overlay networks, security, denial of service, intrusion detection, antivirus
Khaled Salah, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, Mohammed Alzaabi, "Using Cloud Computing to Implement a Security Overlay Network", IEEE Security & Privacy, vol.11, no. 1, pp. 44-53, Jan.-Feb. 2013, doi:10.1109/MSP.2012.88
1. H. Takabi, J.B.D. Joshi, and G-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security & Privacy, vol. 8, no. 6, 2010, pp. 24–31.
2. P. Du and A. Nakao, “DDoS Defense as a Network Service,” Network Operations and Management Symp. (NOMS 10), IEEE CS, 2010, pp. 894–897.
3. C. Duffy Marsan, , “Verisign to Extend Cloud-Based DDoS Protection to SMEs,” Computer World UK, 10 May 2011; verisign-to-extend-cloud-based-ddos-protectionto-smes .
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool