Publication | Closed Access
Using Cloud Computing to Implement a Security Overlay Network
74
Citations
8
References
2012
Year
Secure ServiceEngineeringInformation SecurityEdge ComputingCloud ComputingIntrusion ToleranceSecurityCloud Computing SecurityComputer ScienceSoftware Defined SecurityIn-cloud Security ServicesOverlay NetworkTransparent Overlay NetworkIntrusion Detection SystemsData SecurityCryptographyNetwork Security
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
| Year | Citations | |
|---|---|---|
Page 1
Page 1