Table of Contents
1Scope
2References
3Definitions
3.1Termsdefinedelsewhere
3.2TermsdefinedinthisRecommendation
4Abbreviationsandacronyms
5Conventions
6ConceptandtypicaltypesofIPmultimediaspam
6.1VoIPspam
6.2IPmultimediamessagespam
6.3Instantmessagingspam
6.4Chatspam
6.5Multimodalspam
6.6SpamoverP2Pbasedfilesharingservice
6.7Websitespam
7ClassificationofIPmultimediaspam
7.1Real-timevoicespam
7.2Real-timetextspam
7.3Real-timevideospam
7.4Nonreal-timevoicespam
7.5Nonreal-timetextspam
7.6Nonreal-timevideospam
8TechnicalissueforcounteringIPmultimediaspam
8.1Creationanddeliveryofspam
8.2Detectionandfilteringofspam
8.3Actionforthereceivedspam
9Securitythreatsrelatedtospam
9.1Securitythreatsrelatedtospam
9.2Classificationofspamsecuritythreats
9.3Countermeasures
10Applicabilityofwell-knowncounteringspammechanismsfor
IPmultimediaapplications
10.1Identificationfiltering
10.2Addressmasking
10.3Humaninteractiveproof
10.4Contentfiltering
10.5Authenticationbykeyexchange
10.6Network-basedspamfiltering
10.7Onlinestamp
10.8Authorization-basedspamfiltering
10.9Legalactionandregulations
11ConsiderationsincounteringIPmultimediaapplicationspam
11.1Serviceuser(servicesubscriber)
11.2Serviceprovider
11.3Networkoperator
11.4Publicorganization
11.5Otherconsiderations
Bibliography Abstract
Describes the basic concepts, characteristics, and technical issues related to countering spam in IP multimedia applications such as IP telephony, instant messaging, etc.