12,000

We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK

93%

93% of Lancaster students go into work or further study within six months of graduating

Home > Research > Publications & Outputs > Associating Network Flows with User and Applica...
View graph of relations

Download

Text available via DOI:

« Back

Associating Network Flows with User and Application Information

Research output: Contribution in Book/Report/ProceedingsPaper

Published

  • Ralf Ackermann
  • Utz Roedig
  • Michael Zink
  • Carsten Griwodz
  • Ralf Steinmetz
Publication date1/10/2000
Host publicationProceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA
PublisherACM Press
Pages149-152
Number of pages4
ISBN (Print)1-58113-311-1
Original languageEnglish

Abstract

The concept of authenticating users e.g. by means of a login process is very well established and there is no doubt that it is absolutely necessary and helpful in a multiuser environment. Unfortunately specific information about a user originating a data stream or receiving it, is often no longer available at the traversed network nodes. This applies to the even more specific question of what application is used as well. Routers, gateways or firewalls usually have to base their classification of data on IP header inspection or have to try to extract information from the packets payload. We present an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components. On top of this framework we show usage scenarios for dedicatedly placing copyright information in media content and for an enhancement of the interoperation with the security infrastructure.