Associating Network Flows with User and Application Information

  • Ralf Ackermann
  • , Utz Roedig
  • , Michael Zink
  • , Carsten Griwodz
  • , Ralf Steinmetz

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

The concept of authenticating users e.g. by means of a login process is very well established and there is no doubt that it is absolutely necessary and helpful in a multiuser environment. Unfortunately specific information about a user originating a data stream or receiving it, is often no longer available at the traversed network nodes. This applies to the even more specific question of what application is used as well. Routers, gateways or firewalls usually have to base their classification of data on IP header inspection or have to try to extract information from the packets payload. We present an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components. On top of this framework we show usage scenarios for dedicatedly placing copyright information in media content and for an enhancement of the interoperation with the security infrastructure.

Original languageEnglish
Title of host publicationMULTIMEDIA 2000 - Proceedings of the 2000 ACM Workshops on Multimedia
PublisherAssociation for Computing Machinery, Inc
Pages149-152
Number of pages4
ISBN (Electronic)9781581133110
DOIs
Publication statusPublished - 2000
Externally publishedYes
Event2000 ACM Workshops on Multimedia, MULTIMEDIA 2000 - Los Angeles, United States
Duration: 30 Oct 20003 Nov 2000

Publication series

NameMULTIMEDIA 2000 - Proceedings of the 2000 ACM Workshops on Multimedia

Conference

Conference2000 ACM Workshops on Multimedia, MULTIMEDIA 2000
Country/TerritoryUnited States
CityLos Angeles
Period30/10/003/11/00

Keywords

  • Firewalls
  • Network Traffic Marking
  • Security
  • Watermarking

Fingerprint

Dive into the research topics of 'Associating Network Flows with User and Application Information'. Together they form a unique fingerprint.

Cite this