Abstract

Cloud computing is mainly based on virtualization which enables multi-tenancy and scalable shared resources used on an On-demand basis by all tenants. Since overlay networks are also based on virtualized nodes for implementing network services, this fact allows combining both techniques to reap the benefits of each other together. This is particularly useful for the deployment of new transparent network security services over the current networks in order to enhance their protection. The primary contribution of this paper proposes and analyzes a cloud-based security overlay network that can be used to offer an integrated set of several security services. Cloud Computing and Overlay Networks have newly received a lot of attention in computing and networking areas. These technologies are being demoralized and implemented in the design of large network infrastructures. They are being widely deployed by organizations, and research interests keep growing. We explore the use of Cloud computing in implementing a security overlay network. In particular, we propose and analyze a general cloud-based security overlay network that can be used as a transparent overlay network to provide security services such as Intrusion Detection System (IDS), Anti-Virus software, Anti-Spam software and Denial of Service (DOS). Each of these in-cloud security services is analyzed in terms of its effectiveness, performance, flexibility, control, and cost.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.