CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Concept and typical types of IP multimedia spam 
        6.1     VoIP spam
        6.2     IP multimedia message spam          
        6.3     Instant messaging spam      
        6.4     Chat spam 
        6.5     Multimodal spam   
        6.6     Spam over P2P based file sharing service   
        6.7     Website spam        
 7     Classification of IP multimedia spam         
        7.1     Real-time voice spam         
        7.2     Real-time text spam           
        7.3     Real-time video spam        
        7.4     Non real-time voice spam  
        7.5     Non real-time text spam     
        7.6     Non real-time video spam  
 8     Technical issue for countering IP multimedia spam
        8.1     Creation and delivery of spam        
        8.2     Detection and filtering of spam       
        8.3     Action for the received spam          
 9     Security threats related to spam    
        9.1     Security threats related to spam      
        9.2     Classification of spam security threats         
        9.3     Countermeasures   
10     Applicability of well-known countering spam mechanisms for IP multimedia applications   
       10.1     Identification filtering         
       10.2     Address masking  
       10.3     Human interactive proof    
       10.4     Content filtering    
       10.5     Authentication by key exchange    
       10.6     Network-based spam filtering       
       10.7     Online stamp        
       10.8     Authorization-based spam filtering 
       10.9     Legal action and regulations          
11     Considerations in countering IP multimedia application spam        
       11.1     Service user (service subscriber)   
       11.2     Service provider   
       11.3     Network operator
       11.4     Public organization
       11.5     Other considerations         
Bibliography