1
Scope
2 References
3 Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Concept and typical types of IP
multimedia spam
6.1 VoIP spam
6.2 IP multimedia message spam
6.3 Instant messaging spam
6.4 Chat spam
6.5 Multimodal spam
6.6 Spam over P2P based
file sharing service
6.7 Website spam
7 Classification of IP multimedia
spam
7.1 Real-time voice spam
7.2 Real-time text spam
7.3 Real-time video spam
7.4 Non real-time voice
spam
7.5 Non real-time text
spam
7.6 Non real-time video
spam
8 Technical issue for countering
IP multimedia spam
8.1 Creation and delivery
of spam
8.2 Detection and
filtering of spam
8.3 Action for the
received spam
9 Security threats related to
spam
9.1 Security threats
related to spam
9.2 Classification of spam
security threats
9.3 Countermeasures
10 Applicability of well-known
countering spam mechanisms for IP multimedia applications
10.1 Identification
filtering
10.2 Address masking
10.3 Human interactive
proof
10.4 Content filtering
10.5 Authentication by key
exchange
10.6 Network-based spam
filtering
10.7 Online stamp
10.8 Authorization-based
spam filtering
10.9 Legal action and regulations
11 Considerations in countering IP
multimedia application spam
11.1 Service user (service
subscriber)
11.2 Service provider
11.3 Network operator
11.4 Public organization
11.5 Other considerations
Bibliography