Home > Research > Publications & Outputs > Associating network flows with user and applica...

Electronic data

Links

Text available via DOI:

View graph of relations

Associating network flows with user and application information

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Associating network flows with user and application information. / Ackermann, Ralf; Roedig, Utz; Zink, Michael et al.
Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA. New York: ACM Press, 2000. p. 149-152.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Ackermann, R, Roedig, U, Zink, M, Griwodz, C & Steinmetz, R 2000, Associating network flows with user and application information. in Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA. ACM Press, New York, pp. 149-152. https://doi.org/10.1145/357744.357914

APA

Ackermann, R., Roedig, U., Zink, M., Griwodz, C., & Steinmetz, R. (2000). Associating network flows with user and application information. In Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA (pp. 149-152). ACM Press. https://doi.org/10.1145/357744.357914

Vancouver

Ackermann R, Roedig U, Zink M, Griwodz C, Steinmetz R. Associating network flows with user and application information. In Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA. New York: ACM Press. 2000. p. 149-152 doi: 10.1145/357744.357914

Author

Ackermann, Ralf ; Roedig, Utz ; Zink, Michael et al. / Associating network flows with user and application information. Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA. New York : ACM Press, 2000. pp. 149-152

Bibtex

@inproceedings{a2d87fe3b210497aa1e7ca57b3adfc8e,
title = "Associating network flows with user and application information",
abstract = "The concept of authenticating users e.g. by means of a login process is very well established and there is no doubt that it is absolutely necessary and helpful in a multiuser environment. Unfortunately specific information about a user originating a data stream or receiving it, is often no longer available at the traversed network nodes. This applies to the even more specific question of what application is used as well. Routers, gateways or firewalls usually have to base their classification of data on IP header inspection or have to try to extract information from the packets payload. We present an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components. On top of this framework we show usage scenarios for dedicatedly placing copyright information in media content and for an enhancement of the interoperation with the security infrastructure.",
author = "Ralf Ackermann and Utz Roedig and Michael Zink and Carsten Griwodz and Ralf Steinmetz",
year = "2000",
month = oct,
day = "1",
doi = "10.1145/357744.357914",
language = "English",
isbn = "1581133111",
pages = "149--152",
booktitle = "Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA",
publisher = "ACM Press",

}

RIS

TY - GEN

T1 - Associating network flows with user and application information

AU - Ackermann, Ralf

AU - Roedig, Utz

AU - Zink, Michael

AU - Griwodz, Carsten

AU - Steinmetz, Ralf

PY - 2000/10/1

Y1 - 2000/10/1

N2 - The concept of authenticating users e.g. by means of a login process is very well established and there is no doubt that it is absolutely necessary and helpful in a multiuser environment. Unfortunately specific information about a user originating a data stream or receiving it, is often no longer available at the traversed network nodes. This applies to the even more specific question of what application is used as well. Routers, gateways or firewalls usually have to base their classification of data on IP header inspection or have to try to extract information from the packets payload. We present an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components. On top of this framework we show usage scenarios for dedicatedly placing copyright information in media content and for an enhancement of the interoperation with the security infrastructure.

AB - The concept of authenticating users e.g. by means of a login process is very well established and there is no doubt that it is absolutely necessary and helpful in a multiuser environment. Unfortunately specific information about a user originating a data stream or receiving it, is often no longer available at the traversed network nodes. This applies to the even more specific question of what application is used as well. Routers, gateways or firewalls usually have to base their classification of data on IP header inspection or have to try to extract information from the packets payload. We present an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components. On top of this framework we show usage scenarios for dedicatedly placing copyright information in media content and for an enhancement of the interoperation with the security infrastructure.

U2 - 10.1145/357744.357914

DO - 10.1145/357744.357914

M3 - Conference contribution/Paper

SN - 1581133111

SP - 149

EP - 152

BT - Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA

PB - ACM Press

CY - New York

ER -