We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK


93% of Lancaster students go into work or further study within six months of graduating

Home > Research > Publications & Outputs > Associating network flows with user and applica...
View graph of relations

« Back

Associating network flows with user and application information

Research output: Contribution in Book/Report/ProceedingsPaper


  • Ralf Ackermann
  • Utz Roedig
  • Michael Zink
  • Carsten Griwodz
  • Ralf Steinmetz
Publication date1/10/2000
Host publicationProceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA
Place of publicationNew York
PublisherACM Press
Number of pages4
ISBN (Print)1581133111
Original languageEnglish


The concept of authenticating users e.g. by means of a login process is very well established and there is no doubt that it is absolutely necessary and helpful in a multiuser environment. Unfortunately specific information about a user originating a data stream or receiving it, is often no longer available at the traversed network nodes. This applies to the even more specific question of what application is used as well. Routers, gateways or firewalls usually have to base their classification of data on IP header inspection or have to try to extract information from the packets payload. We present an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components. On top of this framework we show usage scenarios for dedicatedly placing copyright information in media content and for an enhancement of the interoperation with the security infrastructure.