A Transport-Level Proxy for Secure Multimedia Streams
IEEE Internet Computing
Secure Multicast Software Delivery
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
The Group Security Association for Secure Multicasting
ICON '01 Proceedings of the 9th IEEE International Conference on Networks
An MBone Proxy for an Application Gateway Firewall
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Facilitating robust multicast group management
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Framework for Secure Audio Streaming to Wireless Access Network
ICW '05 Proceedings of the 2005 Systems Communications
Security issues and solutions in multicast content distribution: a survey
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper we propose two new enhancements to the SOCKS protocol in the areas of IP multicasting and UDP tunneling. Most network firewalls deployed at the entrance to a private network block multicast traffic. This is because of potential security threats inherent with IP multicast. Multicasting is the backbone of many Internet technologies like voice and video conferencing, real time gaming, multimedia streaming, and online stock quotes, among others. There is a need to be able to safely and securely allow multicast streams to enter into and leave a protected enterprise network. Securing multicast streams is challenging. It poses many architectural issues. The SOCKS protocol is typically implemented in a network firewall as an application-layer gateway. Our first enhancement in the area of IP multicast to the SOCKS protocol is to enable the application of security and access control policies and safely allow multicast traffic to enter into the boundaries of a protected enterprise network. The second enhancement we propose is to allow the establishment of a tunnel between two protected networks that have SOCKS based firewalls to transport UDP datagrams.