New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation

https://doi.org/10.1016/j.jss.2009.06.050Get rights and content

Abstract

In this paper we propose two new enhancements to the SOCKS protocol in the areas of IP multicasting and UDP tunneling. Most network firewalls deployed at the entrance to a private network block multicast traffic. This is because of potential security threats inherent with IP multicast. Multicasting is the backbone of many Internet technologies like voice and video conferencing, real time gaming, multimedia streaming, and online stock quotes, among others. There is a need to be able to safely and securely allow multicast streams to enter into and leave a protected enterprise network. Securing multicast streams is challenging. It poses many architectural issues. The SOCKS protocol is typically implemented in a network firewall as an application-layer gateway. Our first enhancement in the area of IP multicast to the SOCKS protocol is to enable the application of security and access control policies and safely allow multicast traffic to enter into the boundaries of a protected enterprise network. The second enhancement we propose is to allow the establishment of a tunnel between two protected networks that have SOCKS based firewalls to transport UDP datagrams.

Introduction

SOCKS is a network security protocol commonly deployed in enterprise firewalls for facilitating secure traversal of application-layer protocols across the boundaries of a private network. It is an Internet standard documented in RFC 1928 (Leech et al., 1928) as SOCKS Version 5.

Multicasting is an enabler of group communications. A group can represent a set of people or a community interested in sending and receiving data about a specific topic. Communications within the group follows a many-to-many model with many sources and many recipients. The conventional unicast TCP/IP model of communication does not scale well when applied to such group communications, because it is not practical and feasible to have a separate channel of communication between a sender and every recipient in the group.

In multicasting, end points join and leave a group and group membership information is shared between the multicast enabled routers in the Internet. The Internet Group Management Protocol Version 3 (IGMP v3) (Cain et al., 2002) is used in the IP v4 scheme for hosts to join and leave groups. It is also used by multicast routers to exchange and share group information with other multicast routers. The Multicast Listener Discovery Protocol Version 2 (MLD v2) (Vida and Costa, 2004) is the equivalent of IGMP used in the IP v6 (Deering and Hinden, 1998) scheme. MLD v2 supports all the features in IP v6 that are supported by IGMP v3 in IP v4 networks.

While multicasting as a technology evolved, a lot of new applications were developed that took advantage of its bandwidth conserving nature. A case in point is video conferencing over the Internet. Multicast enabled video end points can join a group hosted by a central controller. This controller can perform the job of host and a media gateway for the conference. As a host controller, it can invite end points to participate in the conference. It can allow video from only one end point at a time to be multicast to the other end points in the conference. It can receive video from the sending end point and multicast it to the participants that have joined the conference. Participants can join or leave the conference independent of each other. An online training session is another example of the use of multicasting. One host can be the sender and can stream the training material via IP multicast to a dynamic group of recipients. Such a stream could be an audio only, audio and video or an audio, video and whiteboard session. Many other applications of multicast, like mechanisms for secure software delivery (Han and Shahmehri, 2000) also exist.

Security is a key concern in multicast communications (Quinn and Almeroth, 2001). As the number of applications of IP multicasting is increasing, it is important to ensure security and confidentiality in such communications. Most enterprise networks do not allow multicast traffic to enter into the network because it is challenging to authenticate the sender of the multicast and to ensure the integrity of the data being multicast. Ballardie and Crowcroft (Ballardie and Crowcroft, 1995) discuss the security threats inherent in multicasting. A mechanism is needed where access control policies can be applied and multicast streams from the public Internet can be relayed into the Intranet for legitimate business purposes without compromising the security of the enterprise. We show in this paper an extension to the SOCKS protocol, which has no support for multicasting to achieve this goal.

Network firewalls also block UDP (Postel, 1980) traffic for various reasons. UDP is a transport protocol which does not lend itself to be easily secured like its TCP counterpart. There is a good reason for this. It was designed to be a connectionless datagram delivery service which does not offer any delivery guarantees. However the nature of UDP has made it suitable for transporting voice and real time media on the Internet.

There can be situations where UDP datagrams from an end point in one network need to be transported to another end point in another network. The two networks are protected and could share a relationship of the kind where one belongs to the vendor of a product and the other belongs to a customer for that product. The product could report errors as SNMP traps to the vendor for pro-active monitoring and troubleshooting. It is important to be able to securely transport the trap from the customer’s network to the vendor’s network even if the firewalls protecting both networks block UDP. Moreover it may be important to allow only such UDP datagrams to be transported that originate from legitimate and authenticated end points. We show in this paper a second extension to the SOCKS protocol to achieve this goal.

Section snippets

Related work

Multicast security is an active topic of research. Work is being done to build a security framework in the Internet for groups to communicate securely and robustly (Mazumder et al., 2005), without loss of confidentiality, through multicasting. Such work includes the use of group keys and protocols to manage the creation and distribution of group keys like the Group Key management protocol (Harney, 2094). Experimental work has been done and proposals have been made for allowing multicast

Proposed extensions to the SOCKS protocol

In the following sections, we propose enhancements to the SOCKS protocol for securely relaying multicast sessions from the Internet onto an Intranet and for establishing a secure tunnel between two enterprise networks for the purpose of transporting UDP datagrams between the two networks. Preliminary results of part of our work were reported in Sundararajan and Obaidat (2008).

We show in this paper an approach to allow trusted multicast sessions to securely enter into a private network by

Evaluation of multicast extensions

We have measured the performance of our SOCKS V6 reference implementation server by conducting various experiments in a test environment. This test environment consisted of the SOCKS V6 server, a test multicast server whose sole purpose was to multicast test data and a home grown SOCKS V6 client load generator, which can spawn many concurrent client threads. The format of the SOCKS response packet for UDP tunnel server is shown in Fig. 10. The following performance metrics were collected: (1)

Conclusions

To conclude, we have proposed two new extensions to the SOCKS protocol. These extensions solve two real world problems faced by enterprise networks. There is great potential in multicasting. Multicast based group communications is a powerful communication paradigm. The number of real world applications that are built using multicasting will only increase. There will be great value in allowing trusted multicast sessions originating on the Internet to securely enter into an enterprise network.

Mohammad S. Obaidat is an internationally well known academic, researcher, and scientist. He received his Ph.D. and MS degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. Among his previous positions are Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University and a faculty member at the

References (20)

  • Ballardie, T., Crowcroft, J., 1995. Multicast specific security threats and counter measures. In: IEEE Proceedings of...
  • Cain, B., Deering, S., Kouvelas, I., Fenner, B., Thyagarajan, A., 2002. Internet Group Management Protocol, Version 3,...
  • Deering, S., Hinden, R., 1998. Internet Protocol Version 6, RFC 2460....
  • Djahandari, K., Sterne, D., 1997. An MBone proxy for an application gateway firewall. In: Proceedings of the 1997 IEEE...
  • Finlayson, R., 1999. IP Multicast and Firewalls, RFC 2588....
  • K.P. Fung et al.

    A transport-level proxy for secure multimedia streams

    IEEE Internet Computing

    (2000)
  • Han, L., Shahmehri, N., 2000. Secure multicast software delivery. In: Proceedings of the IEEE 9th International...
  • Harney, H., 1997. Group Key Management Protocol (GKMP) Architecture, RFC 2094....
  • Paul Judge et al.

    Security issues and solutions in multicast content distribution a survey

    IEEE Networks

    (2003)
  • Leech, M., Janis, M., Lee, Y., Kuris, R., Koblas, D., Jones, L., 1996. RFC 1928, SOCKS Protocol Version 5....
There are more references available in the full text version of this article.

Cited by (0)

Mohammad S. Obaidat is an internationally well known academic, researcher, and scientist. He received his Ph.D. and MS degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. Among his previous positions are Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University and a faculty member at the City University of New York. He has received extensive research funding. He has authored or co-authored six books and over four hundred and twenty (420) refereed scholarly journal and conference articles. Dr. Obaidat has served as a consultant for several corporations and organizations worldwide and is editor of many scholarly journals including being the Editor-in-Chief of the International Journal of Communication Systems published by John Wiley. He is also an Editor of IEEE Wireless Communications. In 2002, he was the scientific advisor for the World Bank/UN Workshop on Fostering Digital Inclusion. Recently, Dr. Obaidat was awarded the distinguished Nokia Research Fellowship and the Distinguished Fulbright Award.

Dr. Obaidat has made pioneering and lasting contributions to the multi-facet fields of computer science and engineering. He has guest edited numerous special issues of scholarly journals such as IEEE Transactions on Systems, Man and Cybernetics, IEEE Wireless Communications, IEEE Systems Journal, Elsevier Performance Evaluation, SIMULATION: Transactions of SCS, Elsevier Computer Communications Journal, Journal of C & EE, and Wiley, Security and Communication Network Journal, and Wiley International Journal of Communication Systems, among others. Obaidat has served as the steering committee chair, advisory Committee Chair, honorary chair, and program chair of many international conferences. He is the founder of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS and has served as the General Chair of SPECTS since its inception. Obaidat has received a recognition certificate from IEEE. Between 1994-1997, Obaidat has served as distinguished speaker/visitor of IEEE (<http://www.ieee.org/>) Computer Society. Since 1995 he has been serving as an ACM (<http://www.acm.org/>) distinguished Lecturer. He is also and SCS Distinguished Lecturer. Prof. Obaidat is the founder of the SCS Distinguished Lecturer Program (DLP) and its present director.

Between 1996 and 1999, Dr. Obaidat served as an IEEE/ACM program evaluator of the Computing Sciences Accreditation Board/Commission, CSAB/CSAC. Between 1995 and 2002, he has served as a member of the board of directors of the Society for Computer Simulation International. Between 2002 and 2004, He has served as Vice President of Conferences of the Society for Modeling and Simulation International SCS (<http://www.scs.org/>). Between 2004-2006, he has served as Vice President of Membership of SCS. Between 2006-2009, he served as the Senior Vice President of SCS (<http://www.scs.org/>). He is currently the President of SCS. He has been invited to lecture and give keynote speeches worldwide. One of his recent co-authored papers has received the best paper award in the IEEE AICCSA 2009 international conference. In 2009, Dr. Obaidat received the (<http://www.scs.org/org/awards.html#McLeodFoundersAwardDistinguishedServiceProfession>) McLeod Founder’s Award for Distinguished Service to the Profession. His research interests are: wireless communications and networks, modeling and simulation, performance evaluation of computer systems, and telecommunications systems, security of computer and network systems, high performance computing/computers, applied neural networks and pattern recognition, security of e-based systems, and speech processing. During the 2004/2005 academic, he was on sabbatical leave as the Fulbright distinguished Professor and Advisor to the President of Philadelphia University (Dr. Adnan Badran who became in April 2005 the Prime Minster of Jordan). Prof. Obaidat is a Fellow of the Society for Modeling and Simulation International SCS (<http://www.scs.org/>), and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE <http://www.ieee.org>).

Mukund Sundararajan received his MS degree in Computer Science from Monmouth University under the direction of Prof. Mohammad S. Obaidat. He is currently working with Avaya, New Jersey. His research interest include: communication networks, network security and performance evaluation of communication networks.

View full text