ImageVerifierCode 换一换
格式:PDF , 页数:36 ,大小:171.75KB ,
资源ID:804597      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-804597.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 1244-2008 Overall aspects of countering spam in IP-based multimedia applications (Study Group 17)《基于互联网协议(IP)多媒体应用中反垃圾邮件的整体方面 17号研究组》.pdf)为本站会员(吴艺期)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 1244-2008 Overall aspects of countering spam in IP-based multimedia applications (Study Group 17)《基于互联网协议(IP)多媒体应用中反垃圾邮件的整体方面 17号研究组》.pdf

1、 International Telecommunication Union ITU-T X.1244TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2008) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security Overall aspects of countering spam in IP-based multimedia applications Recommendation ITU-T X.1244

2、ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS Services and facilities X.1X.19 Interfaces X.20X.49 Transmission, signalling and switching X.50X.89 Network aspects X.90X.149 Maintenance X.150X.179 Administrative arrangements X.180X.199 OPEN

3、SYSTEMS INTERCONNECTION Model and notation X.200X.209 Service definitions X.210X.219 Connection-mode protocol specifications X.220X.229 Connectionless-mode protocol specifications X.230X.239 PICS proformas X.240X.259 Protocol Identification X.260X.269 Security Protocols X.270X.279 Layer Managed Obje

4、cts X.280X.289 Conformance testing X.290X.299 INTERWORKING BETWEEN NETWORKS General X.300X.349 Satellite data transmission systems X.350X.369 IP-based networks X.370X.379 MESSAGE HANDLING SYSTEMS X.400X.499DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS Networking X.600X.629 Efficiency X.630X

5、.639 Quality of service X.640X.649 Naming, Addressing and Registration X.650X.679 Abstract Syntax Notation One (ASN.1) X.680X.699 OSI MANAGEMENT Systems Management framework and architecture X.700X.709 Management Communication Service and Protocol X.710X.719 Structure of Management Information X.720

6、X.729 Management functions and ODMA functions X.730X.799 SECURITY X.800X.849 OSI APPLICATIONS Commitment, Concurrency and Recovery X.850X.859 Transaction processing X.860X.879 Remote operations X.880X.889 Generic applications of ASN.1 X.890X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 TELECOMMUNICATI

7、ON SECURITY X.1000 For further details, please refer to the list of ITU-T Recommendations. Rec. ITU-T X.1244 (09/2008) i Recommendation ITU-T X.1244 Overall aspects of countering spam in IP-based multimedia applications Summary Recommendation ITU-T X.1244 specifies the basic concepts, characteristic

8、s, and technical issues related to countering spam in IP multimedia applications such as IP telephony, instant messaging, etc. The various types of IP multimedia application spam are categorized, and each categorized group is described according to its characteristics. This Recommendation describes

9、various spam security threats that can cause IP multimedia application spam. There are various techniques developed to control the e-mail spam which has become a social problem. Some of those techniques can be used in countering IP multimedia application spam. This Recommendation analyses the conven

10、tional spam countering mechanisms and discusses their applicability to countering IP multimedia application spam. This Recommendation concludes by mentioning various aspects that should be considered in countering IP multimedia application spam. Source Recommendation ITU-T X.1244 was approved on 19

11、September 2008 by ITU-T Study Group 17 (2005-2008) under the WTSA Resolution 1 procedure. Keywords Instant messaging spam, IP multimedia application spam, spam, voice over IP spam. ii Rec. ITU-T X.1244 (09/2008) FOREWORD The International Telecommunication Union (ITU) is the United Nations specializ

12、ed agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with

13、a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recomm

14、endations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for con

15、ciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g. interoperability or applicability) and compliance with the Recommenda

16、tion is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party.

17、INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Right

18、s, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers

19、 are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2009 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permi

20、ssion of ITU. Rec. ITU-T X.1244 (09/2008) iii CONTENTS Page 1 Scope 1 2 References. 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation. 2 4 Abbreviations and acronyms 3 5 Conventions 4 6 Concept and typical types of IP multimedia spam . 4 6.1 VoIP spam 4 6.2 IP

21、multimedia message spam . 5 6.3 Instant messaging spam 5 6.4 Chat spam . 5 6.5 Multimodal spam 6 6.6 Spam over P2P based file sharing service 6 6.7 Website spam 6 7 Classification of IP multimedia spam. 6 7.1 Real-time voice spam . 7 7.2 Real-time text spam 8 7.3 Real-time video spam. 8 7.4 Non real

22、-time voice spam. 8 7.5 Non real-time text spam . 9 7.6 Non real-time video spam 9 8 Technical issue for countering IP multimedia spam 9 8.1 Creation and delivery of spam 10 8.2 Detection and filtering of spam 11 8.3 Action for the received spam 12 9 Security threats related to spam 12 9.1 Security

23、threats related to spam 12 9.2 Classification of spam security threats. 14 9.3 Countermeasures 14 10 Applicability of well-known countering spam mechanisms for IP multimedia applications. 15 10.1 Identification filtering. 15 10.2 Address masking 18 10.3 Human interactive proof. 18 10.4 Content filte

24、ring 19 10.5 Authentication by key exchange 19 10.6 Network-based spam filtering 20 iv Rec. ITU-T X.1244 (09/2008) Page 10.7 Online stamp. 21 10.8 Authorization-based spam filtering 21 10.9 Legal action and regulations. 22 11 Considerations in countering IP multimedia application spam 23 11.1 Servic

25、e user (service subscriber) 23 11.2 Service provider 23 11.3 Network operator 24 11.4 Public organization. 25 11.5 Other considerations. 25 Bibliography. 26 Rec. ITU-T X.1244 (09/2008) v Introduction Spam has been a social problem in the network e-mail system. Various solutions have been developed a

26、nd deployed to resolve this problem, but none of them have actually solved the spam problem. The IP multimedia application consists of various types of services, such as IP telephony, instant messaging, etc. These IP multimedia services are becoming a new target for the sender of spam, since it is t

27、echnically a simpler and economically cheaper approach for spamming. IP multimedia application spam must be dealt with before it becomes a public problem. This Recommendation describes the concept and characteristics of various types of spam that can occur in IP multimedia applications. It discusses

28、 some issues on technical and security viewpoints for countering IP multimedia application spam, thus provides some consideration aspects by several participating members in providing IP multimedia service such as service providers, service users, etc. in countering IP multimedia application spam. R

29、ec. ITU-T X.1244 (09/2008) 1 Recommendation ITU-T X.1244 Overall aspects of countering spam in IP-based multimedia applications 1 Scope This Recommendation provides an overview of IP multimedia spam, with a focus on the following issues: Concept and characteristics of IP multimedia spam Technical is

30、sues related to IP multimedia spam Security threats related to spam Spam countering methods and their applicability to counter IP multimedia spam Various aspects that should be considered for countering spam in IP-based multimedia applications NOTE The use of the term “identity“ in this Recommendati

31、on does not indicate its absolute meaning. In particular, it does not constitute any positive validation. 2 References None. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the following terms defined elsewhere: 3.1.1 access control list (ACL) b-ITU-T X.741: The access control lis

32、t attribute is used to contain identities of initiators that are either specifically granted access to management information or specifically denied access to management information. 3.1.2 certification authority (CA) b-ITU-T X.509: An authority trusted by one or more users to create and assign publ

33、ic-key certificates. Optionally, the certification authority may create the users keys. 3.1.3 conference b-ITU-T T.124: A number of nodes that are joined together and that are capable of exchanging audiographic and audiovisual information across various telecommunication networks. 3.1.4 DomainKeys i

34、dentified mail (DKIM) b-IETF RFC 4871: A mechanism by which e-mail messages can be cryptographically signed, permitting a signing domain to claim responsibility for the introduction of a message into the mail stream. Message recipients can verify the signature by querying the signers domain directly

35、 to retrieve the appropriate public key, and thereby confirm that the message was attested to by a party in possession of the private key for the signing domain. 3.1.5 instant messaging (IM) b-IETF RFC 3428: An exchange of content between a set of participants in near real time. Generally, the conte

36、nt is short text messages, although that need not be the case. 3.1.6 peer-to-peer (P2P) relationship b-ITU-T T.180: In a peer-to-peer relationship, the users may negotiate the characteristics of their interaction and, afterwards, communicate obeying the rules they have negotiated; both users (an ent

37、ity and its peer entity) have potentially equal rights. b-IETF RFC 4981 indicates that P2P networks are those that exhibit three characteristics: self-organization, symmetric communication, and distributed control. 2 Rec. ITU-T X.1244 (09/2008) 3.1.7 pretty good privacy (PGP) b-IETF RFC 1991: PGP us

38、es a combination of public key and conventional encryption to provide security services for electronic mail messages and data files. These services include confidentiality and digital signature. PGP was created by Philip Zimmermann and first released, in Version 1.0, in 1991. Subsequent versions, e.

39、g., open PGP that is described in b-IETF RFC 4880, have been designed and implemented by an all-volunteer collaborative effort under the design guidance of Philip Zimmermann. PGP and Pretty Good Privacy are trademarks of Philip Zimmermann. 3.1.8 public key infrastructure (PKI) b-ITU-T X.509: The inf

40、rastructure able to support the management of public keys able to support authentication, encryption, integrity or non-repudiation services. 3.1.9 transport layer security (TLS) b-ITU-T Q.814: The TLS protocol optionally provides communications privacy. The protocol allows client/server applications

41、 to communicate in a way that is designed to prevent eavesdropping, tampering, and intrusion. The TLS protocol also provides strong peer authentication and data flow integrity. 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 bait spam: Its name derived

42、 playfully from the analogy to fishing (and phishing (see clause 3.2.10), bait spam is a variety of spam which includes an element, e.g., an e-mail subject or embedded link, to lure users. The lured user is attacked by the bait spam. 3.2.2 blog: A contraction of “web log“; a blog is an online, possi

43、bly multimedia, list of its owners personal interests that is available for general public to view and, sometimes, to enhance. 3.2.3 bot: Bot is a contraction of “robot“, which is a program that operates as an agent for a user or another program to simulate a human activity. 3.2.4 DNS cache poisonin

44、g: DNS cache poisoning is a technique that tricks a domain name system server (DNS server) into believing the DNS address of a certain server has been changed when, in reality, it has not. Once the DNS server has been poisoned, this information is generally cached for a certain period of time, sprea

45、ding the effect of the attack to the users of the server. 3.2.5 IP multimedia message: IP multimedia message is a text, voice, or video message that is delivered and stored in an IP multimedia terminal or server for the recipient to check afterward. It is similar to voice mail in telephony service,

46、but serviced in IP multimedia service. 3.2.6 IP multimedia spam: Unsolicited messages or calls through IP multimedia applications. To distinguish this from traditional e-mail spam, IP multimedia spam denotes spam on newly emerging telecommunication methods over IP, such as instant messaging (IM), pr

47、esence, or voice over IP (VoIP) services. 3.2.7 modality: In general usage, this term refers to the forms, protocols, or conditions that surround formal communications. In the context of this Recommendation, it refers to the information encoding(s) containing information perceptible for a human bein

48、g. Examples of modality include textual, graphical, audio, video or haptical data used in human-computer interfaces. Multimodal information can originate from, or be targeted to, multimodal-devices. Examples of human-computer interfaces include microphones for voice (sound) input, pens for haptic in

49、put, keyboards for textual input, mice for motion input, speakers for synthesized voice output, screens for graphic/text output, vibrating devices for haptic feedback, and Braille-writing devices for people with visual disabilities. 3.2.8 multimodal message: This is a multimedia message that contains differently encoded information for interaction via multiple modalities. For example, a MMS (multimedia messaging service) message may convey text, graphic and audio modalities. A web-page may also contain multimedia mod

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1