7 DISCUSSION AND
CONCLUSIONS
Our proposed extensions to the SOCKS protocol
could lead to a new version of the protocol, which
when implemented, would greatly enhance the
capabilities of the protocol in securing and auditing
application layer traffic. With the convergence of
voice, video and data and the global adoption of IP as
a low cost medium for conducting multimedia
communications, it is highly valuable to add
multicast capabilities to a proven protocol like
SOCKS. While the new features we are
implementing will add value to the protocol, the
performance of the system will only be limited by the
network with no additional performance overhead
added by the new extensions. The application of
security policies and the initial setup of the channel
through socks might cause some delay in the setup
phase when an acpplication is reaching out to the
socks server to cross the network boundary but once
authenticated and authorized, there will be no further
delays added by socks. We expect the proposed
multicast relay process in socks to improve the
performance of multicast routing within the network
compared to other schemes where multicast packets
would need to be routed in a unicast fashion to
listeners in the protected network. We expect the
benefits of adding UDP tunneling and multiple TCP
and UDP bind support in the protocol to be well
received in a variety of application domains,
especially in the N-tier application server domains
and IP telephony.
REFERENCES
Leech, M., Janis, M., Lee, Y., Kuris, R., Koblas, D.,
Jones, L.,”RFC 1928, SOCKS Protocol Version 5”,
www.ietf.org/rfc/rfc1928.txt, March 1996.
Fung, K.,P., Chang, R.,K.,C., “A Transport-Level Proxy
for Secure Multimedia Streams”, IEEE Internet
Computing, pp. 57-67, November 2000.
Djahandari, K.,Sterne, D., “An MBone Proxy for an
Application Gateway Firewall”, Proceedings of the
1997 IEEE Symposium on Security and Privacy, pp.
72-78, 1997.
Vaidya, B., Kim, J.,W., Pyun, J.,Y., Park, J., Han, S.,
“framework for Secure Audio Streaming to Wireless
Access Network”, 2005 Systems communications, pp.
122-127, 2005.
Cain, B., Deering, S., Kouvelas, I., Fenner, B.,
Thyagarajan, A., “Internet Group Management
Protocol, Version 3”, RFC 3376,
www.ietf.org/rfc/rfc3376.txt, October 2002.
Vida, R., Costa, L., “Multicast Listener Discovery V2
(MLDv2) for IPv6”. Internet Engineering Task Force
(IETF), RFC 3810, www.ietf.org/rfc/rfc3810.txt, June
2004.
Finlayson, R., “RFC 2588, IP Multicast and firewalls”,
www.ietf.org/rfc/rfc2588.txt, May 1999.
Gong, L., Shacham, N., “Multicast security and its
extension to a mobile environment”, Wireless
Networks, ACM-Baltzer, Vol. 1, No. 3, pp. 281 – 295,
August 1995.
Thaler, D., Fenner, B., Quinn, B., “Socket interface
extensions for multicast source filters”, RFC 3678,
www.ietf.org/rfc/rfc3678.txt, January 2004.
Mazumder, A.S., Almeroth, K., Sarac, K., “Facilitating
robust multicast group management”, Proceedings of
the International Workshop on Network and Operating
Systems Support for Digital Audio and Video, pp.
183-188, 2005.
NEW TECHNIQUES TO ENHANCE THE CAPABILITIES OF THE SOCKS NETWORK SECURITY PROTOCOL
201