NEW TECHNIQUES TO ENHANCE THE CAPABILITIES OF THE SOCKS NETWORK SECURITY PROTOCOL

Mukund Sundararajan, Mohammad S. Obaidat

2008

Abstract

SOCKS is an industry standard network security protocol used in private networks to allow secure traversal of application layer traffic through the boundaries of the network. Standardized by IETF in Request for Comments (RFC) 1928 (Leech et al., 1996) as SOCKS Version 5, this protocol has found widespread use in various security frameworks to allow a variety of application layer protocols to securely traverse a firewall. This paper is the result of research performed on the usability of the protocol in application domains such as multicast. We discuss some of the shortcomings of the SOCKS protocol and provide a framework and the methods for enhancing the capabilities of the protocol in areas such as multicast and advanced TCP and UDP capabilities not addressed by the current standard of the protocol. The methods proposed are being implemented in a reference implementation by the authors.

References

  1. Leech, M., Janis, M., Lee, Y., Kuris, R., Koblas, D., Jones, L.,”RFC 1928, SOCKS Protocol Version 5”, www.ietf.org/rfc/rfc1928.txt, March 1996.
  2. Fung, K.,P., Chang, R.,K.,C., “A Transport-Level Proxy for Secure Multimedia Streams”, IEEE Internet Computing, pp. 57-67, November 2000.
  3. Djahandari, K.,Sterne, D., “An MBone Proxy for an Application Gateway Firewall”, Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 72-78, 1997.
  4. Vaidya, B., Kim, J.,W., Pyun, J.,Y., Park, J., Han, S., “framework for Secure Audio Streaming to Wireless Access Network”, 2005 Systems communications, pp. 122-127, 2005.
  5. Cain, B., Deering, S., Kouvelas, I., Fenner, B., Thyagarajan, A., “Internet Group Management Protocol, Version 3”, RFC 3376, www.ietf.org/rfc/rfc3376.txt, October 2002.
  6. Vida, R., Costa, L., “Multicast Listener Discovery V2 (MLDv2) for IPv6”. Internet Engineering Task Force (IETF), RFC 3810, www.ietf.org/rfc/rfc3810.txt, June 2004.
  7. Finlayson, R., “RFC 2588, IP Multicast and firewalls”, www.ietf.org/rfc/rfc2588.txt, May 1999.
  8. Gong, L., Shacham, N., “Multicast security and its extension to a mobile environment”, Wireless Networks, ACM-Baltzer, Vol. 1, No. 3, pp. 281 - 295, August 1995.
  9. Thaler, D., Fenner, B., Quinn, B., “Socket interface extensions for multicast source filters”, RFC 3678, www.ietf.org/rfc/rfc3678.txt, January 2004.
  10. Mazumder, A.S., Almeroth, K., Sarac, K., “Facilitating robust multicast group management”, Proceedings of the International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 183-188, 2005.
Download


Paper Citation


in Harvard Style

Sundararajan M. and S. Obaidat M. (2008). NEW TECHNIQUES TO ENHANCE THE CAPABILITIES OF THE SOCKS NETWORK SECURITY PROTOCOL . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 197-201. DOI: 10.5220/0001930001970201


in Bibtex Style

@conference{secrypt08,
author={Mukund Sundararajan and Mohammad S. Obaidat},
title={NEW TECHNIQUES TO ENHANCE THE CAPABILITIES OF THE SOCKS NETWORK SECURITY PROTOCOL},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={197-201},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001930001970201},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - NEW TECHNIQUES TO ENHANCE THE CAPABILITIES OF THE SOCKS NETWORK SECURITY PROTOCOL
SN - 978-989-8111-59-3
AU - Sundararajan M.
AU - S. Obaidat M.
PY - 2008
SP - 197
EP - 201
DO - 10.5220/0001930001970201