Using cloud computing to implement a security overlay network

Khaled Salah, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, Mohammed Alzaabi

Research output: Contribution to journalArticlepeer-review

65 Scopus citations


This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Original languageEnglish
Article number6226348
Pages (from-to)44-53
Number of pages10
JournalIEEE Security and Privacy
Issue number1
StatePublished - 2013


  • antispam
  • antivirus
  • cloud computing
  • denial of service
  • intrusion detection
  • overlay networks
  • security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law


Dive into the research topics of 'Using cloud computing to implement a security overlay network'. Together they form a unique fingerprint.

Cite this