skip to main content
10.1145/357744.357914acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article
Free access

Associating network flows with user and application information

Published: 04 November 2000 Publication History

Abstract

The concept of authenticating users e.g. by means of a login process is very well established and there is no doubt that it is absolutely necessary and helpful in a multiuser environment. Unfortunately specific information about a user originating a data stream or receiving it, is often no longer available at the traversed network nodes. This applies to the even more specific question of what application is used as well. Routers, gateways or firewalls usually have to base their classification of data on IP header inspection or have to try to extract information from the packets payload.
We present an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components. On top of this framework we show usage scenarios for dedicatedly placing copyright information in media content and for an enhancement of the interoperation with the security infrastructure.

References

[1]
D. Awduche, J. Malcolm, J. Agogbua, M. O'Dell, and J. McManus. Requirements for Traffic Engineering Over MPLS. lnternet Request for Comments Nr. 2702, September 1999.]]
[2]
D. B. Chapman. Building Internet Fircwalls. O'Reilly, Cambridge, 1995.]]
[3]
W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security. Addison Wesley, 1994.]]
[4]
A. Chiu. Authentication Mechanisms for ONC RPC. Internet Engineering Task Force, May 1999.]]
[5]
S. Deering and R. Hinden. Internet Protocol, Version 6 (IPv6) Specification. Internet Request for Comments Nr. 2460, December 1998.]]
[6]
W. Hua, J. Ohlund, and B. Butterklee. Unraveling the Mysteries of Writing a Winsock 2 Layered Service Provider.]]
[7]
S. Katzenbeisser and F. (Editors). Information hiding techniques for steganography and digital watermarking. Artech House Books, 1999.]]
[8]
S. Kent and R. Atkinson. IP Authentication Header. Internet Request for Comments Nr. 2402, November 1998.]]
[9]
W. Stallings. SNMP and SNMPv2 - The Infrastructure for Network Management. IEEE Communications Magazine, 36(3):37-43, March 1998.]]
[10]
SunSoft. STREAMS Programmers Guide. SunSoft, November 1995.]]

Cited By

View all
  • (2008)An open system for transparent firewall authentication and user traffic identification within corporate intranetsProceedings of the 9th ACM SIGITE conference on Information technology education10.1145/1414558.1414591(113-118)Online publication date: 16-Oct-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MULTIMEDIA '00: Proceedings of the 2000 ACM workshops on Multimedia
November 2000
248 pages
ISBN:1581133111
DOI:10.1145/357744
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2000

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. firewalls
  2. network traffic marking
  3. security
  4. watermarking

Qualifiers

  • Article

Conference

MM00: ACM Multimedia 2000
October 30 - November 3, 2000
California, Los Angeles, USA

Acceptance Rates

Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)3
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2008)An open system for transparent firewall authentication and user traffic identification within corporate intranetsProceedings of the 9th ACM SIGITE conference on Information technology education10.1145/1414558.1414591(113-118)Online publication date: 16-Oct-2008

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media