ImageVerifierCode 换一换
格式:PDF , 页数:26 ,大小:174.09KB ,
资源ID:803443      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-803443.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T SERIES X SUPP 12-2012 ITU-T X 1240 C Supplement on overall aspects of countering mobile messaging spam (Study Group 17)《ITU-T X 1240 打击手机垃圾短信的综合补充 17号研究组》.pdf)为本站会员(赵齐羽)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T SERIES X SUPP 12-2012 ITU-T X 1240 C Supplement on overall aspects of countering mobile messaging spam (Study Group 17)《ITU-T X 1240 打击手机垃圾短信的综合补充 17号研究组》.pdf

1、 International Telecommunication Union ITU-T Series XTELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Supplement 12(03/2012) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY ITU-T X.1240 Supplement on overall aspects of countering mobile messaging spam ITU-T X-series Recommendations S

2、upplement 12 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS

3、 X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security management X.1050X.1069 Telebiometrics X.1080X.1099 SECURE APPLIC

4、ATIONS AND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV security X.1180X.1199 CYBERSPACE SECURITY Cybersecu

5、rity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 CYBERSECURITY INFORMATION EXCHANGE Overview of cybersecurity X.1500X.1519 Vulnerability/state exchang

6、e X.1520X.1539 Event/incident/heuristics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured exchange X.1580X.1589 For further details, please refer to the list of ITU-T Recommendations. X series Su

7、pplement 12 (03/2012) i Supplement 12 to ITU-T X-series Recommendations ITU-T X.1240 Supplement on overall aspects of countering mobile messaging spam Summary Supplement 12 to ITU-T X-series Recommendations, in particular to Recommendation ITU-T X.1240, describes the basic concept and characteristic

8、s of mobile messaging spam. It also introduces and analyses current technologies on countering mobile messaging spam. In addition, this supplement proposes a general implementation framework for countering mobile messaging spam. The relative activities in different organizations are introduced in Ap

9、pendix I. History Edition Recommendation Approval Study Group 1.0 ITU-T X Suppl. 12 2012-03-02 17 Keywords MMS, mobile messaging spam, SMS, spam. ii X series Supplement 12 (03/2012) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of tele

10、communications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing teleco

11、mmunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the pr

12、ocedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this publication, the expression “Administration“ is used for conciseness to indicate both a telec

13、ommunication administration and a recognized operating agency. Compliance with this publication is voluntary. However, the publication may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the publication is achieved when all of these manda

14、tory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the publication is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws atte

15、ntion to the possibility that the practice or implementation of this publication may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others o

16、utside of the publication development process. As of the date of approval of this publication, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this publication. However, implementers are cautioned that this may not represent the latest i

17、nformation and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2012 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. X series Supplement 12 (03/2012) iii Tabl

18、e of Contents Page 1 Scope 1 2 References. 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this supplement . 1 4 Abbreviations and acronyms 2 5 Conventions 3 6 Overview of mobile messaging spam . 3 6.1 Types 3 6.2 Characteristics 4 6.3 Delivery methods 4 7 Current technologies f

19、or countering mobile messaging spam 5 7.1 Blacklists/whitelists 5 7.2 Content-based filtering . 5 7.3 Spam reporting . 6 7.4 Traffic statistics 6 7.5 Analysis of call detail records 6 7.6 Greylisting 6 7.7 Duplicate content recognition . 6 7.8 Indication information recognition . 7 7.9 Analysis of m

20、essaging sending dispersion . 7 7.10 Limitation on the total amount of sent messages . 7 7.11 Security software 7 8 Analysis for countering mobile messaging spam . 8 8.1 Comparison . 8 8.2 Deployment framework 9 Appendix I Activities on countering mobile messaging spam . 11 I.1 Development of techni

21、cal specifications for countering mobile messaging spam 11 I.2 International activities on countering mobile messaging spam 15 I.3 Industry alliances and initiatives for countering mobile messaging spam . 15 Bibliography. 17 X series Supplement 12 (03/2012) 1 Supplement 12 to ITU-T X-series Recommen

22、dations ITU-T X.1240 Supplement on overall aspects of countering mobile messaging spam 1 Scope This supplement to Recommendation ITU-T X.1240 provides an overview of mobile messaging spam, including types, characteristics and delivery methods. Furthermore, this supplement analyses the current techno

23、logies on countering mobile messaging spam, and proposes an implementation framework for countering mobile messaging spam. The relevant activities in different standardization organizations and related organizations are introduced in Appendix I. This supplement only focuses on mobile messaging spam,

24、 including SMS spam and MMS spam. 2 References None. 3 Definitions 3.1 Terms defined elsewhere This supplement uses the following terms defined elsewhere: 3.1.1 mobile handset b-ITU-T K.49: Not fixed terminal equipment used for data or voice communication and connected to a fixed telecommunications

25、network via radio interface. 3.1.2 multimedia messaging service (MMS) b-ITU-T X.1231: Multimedia messaging service refers to a kind of messaging service after short message service which can transfer various multimedia messages including text, graphics, audio, video and so on through mobile network,

26、 wireless network or fixed network. 3.1.3 short message service (SMS) b-ITU-T X.1231: Short message service refers to a kind of message service, which allows mobile phones, telephones and other short message entities to transfer and receive text messages through a device-named service centre impleme

27、nting functions such as saving and delivering. 3.1.4 SMS spam b-ITU-T X.1242: Spam sent via SMS. 3.1.5 spam b-ITU-T X.1240: The meaning of the word “spam“ depends on each national perception of privacy and what constitutes spam from the national technological, economic, social and practical perspect

28、ives. In particular, its meaning evolves and broadens as technologies develop, providing novel opportunities for misuse of electronic communications. Although there is no globally agreed definition for spam, this term is commonly used to describe unsolicited electronic bulk communications over e-mai

29、l or mobile messaging for the purpose of marketing commercial products or services. 3.1.6 spammer b-ITU-T X.1240: An entity or a person creating and sending spam. 3.2 Terms defined in this supplement This supplement defines the following terms: 3.2.1 false positive: A result that is erroneously posi

30、tive when a situation is negative. 3.2.2 MMS spam: Spam sent via MMS. 2 X series Supplement 12 (03/2012) 3.2.3 mobile messaging spam: Unsolicited electronic communications over mobile messaging services, typically consisting of SMS spam and MMS spam. 4 Abbreviations and acronyms This supplement uses

31、 the following abbreviations and acronyms: CBCS Categorization-Based Content Screening CDR Call Detail Record CI Contextual Information CSCS Client Side Content Screening FMD Filtered Messages Database GSM Global System for Mobile communications HMM Hidden Markov Models HPLMN Home Public Land Mobile

32、 Network ID Identity IMR Identification, Marking and Reacting IMS IP Multimedia Subsystem MAP Mobile Application Part MMS Multimedia Messaging Service MMSC Multimedia Messaging Service Centre MT-SMs Mobile Terminated-Short Messages NB Naive Bayes Algorithm OPH Open Proxy Handshake OSBF-Lua Orthogona

33、l Sparse Bigrams with confidence Factor PLMN Public Land Mobile Network PS Packet Switched PUCI Protection against Unsolicited Communication for IMS SCIDM Secure Content IDentification Mechanism SCM Service Control Module SIM Subscriber Identity Module SMS Short Message Service SMSC Short Message Se

34、rvice Centre SPIT SPam over Internet Telephony SS Supplementary Services SSFM SMS Spam Filtering Module SVM Support Vector Machine TCAP Transaction Capabilities Application Part UC Unsolicited Communication X series Supplement 12 (03/2012) 3 UC-OPH Unsolicited Communication - Open Proxy Handshake UC

35、S supervised Classifier System URD User-specified Rules Database URL Uniform Resource Locator USIM Universal Subscriber Identity Module USMM User Service Management Module VPLMN Visited Public Land Mobile Network WAP Wireless Application Protocol 5 Conventions None. 6 Overview of mobile messaging sp

36、am 6.1 Types Mobile messaging spam is unsolicited electronic communications over mobile messaging services. Spam messages mainly include the following content: advertising information: advertisement of products or services, especially discount information, etc. fraud information: lottery winning fra

37、ud, bank card fraud, fake identity fraud, etc. Based on the different carriers of unsolicited messages, mobile messaging spam could be classified into SMS spam and MMS spam. SMS spam is spread widely throughout the world. Unsolicited spam included in short messages can seriously disturb peoples dail

38、y life by wasting their time and influencing their state of mind. With the low cost of bulk sending and the increasing number of SMS users, SMS spam has constituted the major mobile messaging spam. Service providers often cannot charge for SMS spam. In a postpaid environment, the users or customers

39、may renege on payment. Furthermore, this bulk spam consumes an enormous amount of storage space and computing resources for mobile networks, which may affect the service quality of legitimate users. However, bulk transmission does not necessarily imply spam; for example, circulating an announcement

40、within a company may also display similar features to those of SMS spam. Because MMS is sent in the packet switched (PS) data channel of mobile networks, it is easier to be used for spreading malware. Therefore, it seems to be a more serious problem. The scale of MMS spam is not as large as SMS spam

41、, due to the costly price and limitations of the delivery methods. Even if the price for the individual multimedia message is much higher than that for the short message service, bulk sending pricing will tremendously reduce the cost for spam distributors. Furthermore, the rate of spam return is hig

42、her for MMS than for SMS spam. Currently, there are more counter measures against SMS spam available to users and operators. Therefore, many spammers prefer to use MMS spam in some situations. 4 X series Supplement 12 (03/2012) 6.2 Characteristics In order to counter mobile messaging spam effectivel

43、y and efficiently, the characteristics of mobile messaging spam need to be analysed and summarized. Such an analysis could be taken into consideration in the development of the relative technologies and policy decisions in view of countering mobile messaging spam. Some of the most common characteris

44、tics are as follows: Spam messages can be as long as possible in order to transmit the maximum amount of information. Spam messages use some random characters dynamically inserted into the text of the message in order to avoid the identification of single bulk transmission, and to avoid spam keyword

45、 recognition filters. There is usually a phone number or a hyperlink for contact information. This phone number and hyperlink may not belong to the presumed advertiser. A spam message does not necessarily mean that there is no interest in receiving it. The decision should be made by the recipients.

46、Spammers may send messages to a large proportion of a mobile phone number segment in a short time. Most spammers do not retry a failed message delivery. Spammers and recipients are usually unknown to each other, and there is no voice conversation between them. Besides, the responses to a spam messag

47、e are not as frequent as to a normal message. Spammers seldom incur any other charges (such as voice call) other than the messaging charge. Spam messages with the same content may be originated from different mobile phone numbers. 6.3 Delivery methods There are two common bulk delivery methods of mo

48、bile messaging that can be used for mobile messaging spam: Using spam tools to send bulk messages: spammers acquire subscriber identity cards (such as SIM, USIM, etc.), usually with a discount package for sending mobile messages, and they plug the cards into the spam tools that are controlled by com

49、puter software. Spammers can then send bulk messages by activating those spam tools. Generally, each computer has the ability to control more than one spam tool at the same time, and enable the bulk sending of spam messages. Bulk spam message sending is usually at a low price. With this method, the sending number will be shown in the recipients mobile handset as a normal mobile phone number, and the recipients cannot recognize whether it is spam or not before they read it. Most

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1