Technologies involved in countering voice spam in telecommunication organizations |
|
Voice communication is a fundamental service provided by telecommunication networks. With the development of voice communication, voice spam has also been increasing with numerous negative effects on end users and network operators. In general, voice spam has content ranging from commercial advertisement to offensive pornographic material, which has various kinds of negative effects on end users and network operators. Voice spam may allure, annoy, bully or even intimidate users as well as having negative effects on network resources. To avoid these negative influences and to protect users' rights and maintain network stability, network operators may wish to increase their efforts to counter voice spam.
The objective of Recommendation ITU-T X.1246 is to review technical solutions to counter voice spam without consideration of the risk to the authenticity of the spammer identity. This Recommendation gives an overview of voice spam and summarizes the existing anti-spam technologies which are used by users and telecommunication networks alike as well as the collaboration mechanisms between them. Additional proposed technical solutions are also recommended based on these anti-spam technologies and collaboration mechanisms. |
|
Citation: |
https://handle.itu.int/11.1002/1000/12448 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1230-X.1249: Countering spam |
Approval date: |
2015-09-17 |
Provisional name: | X.ticvs |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 6 (09/2009)
|
ITU-T X.1240 series – Supplement on countering spam and associated threats
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|