ETSI TR 187 009-2008 Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN) Feasibility study of prevention of unsolicited communication .pdf
《ETSI TR 187 009-2008 Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN) Feasibility study of prevention of unsolicited communication .pdf》由会员分享,可在线阅读,更多相关《ETSI TR 187 009-2008 Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN) Feasibility study of prevention of unsolicited communication .pdf(26页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 187 009 V2.1.1 (2008-07)Technical Report Telecommunications and Internet Converged Services andProtocols for Advanced Networking (TISPAN);Feasibility study of preventionof unsolicited communication in the NGNETSI ETSI TR 187 009 V2.1.1 (2008-07) 2 Reference DTR/TISPAN-07025-NGN-R2 Keywords
2、Regulation, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the p
3、resent document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In ca
4、se of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this a
5、nd other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authori
6、zed by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2008. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the b
7、enefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TR 187 009 V2.1.1 (2008-07) 3 Contents Intellectual Property Rights5 Foreword.5 1 Scope 6 2 References 6 2.1 Normative references .6 2.2 Informative refe
8、rences7 3 Abbreviations .8 4 General overview .9 5 Threat analysis for UC in the NGN10 5.1 UC attack configurations for basis of TVRA .10 5.1.1 Scenario 1: One-to-One UC10 5.1.2 Scenario 2: One-to-Many UC .11 5.1.3 Scenario 3: Many-to-One UC .11 5.1.4 Scenario 4: Many-to-Many UC 12 5.2 Attack vector
9、 of UC in NGN12 5.3 Risk assessment for UC in NGN 13 5.4 Objectives for the prevention of UC in NGN.13 5.5 Security requirements for prevention of UC in the NGN.14 5.5.1 Functional security requirements14 5.6 Prevention of UC in NGN countermeasure framework14 5.6.1 Existing solutions / countermeasur
10、es14 5.6.1.1 MCID - Malicious call identification 14 5.6.1.2 OIR - Originating Identification Restriction .15 5.6.1.3 ACR - Anonymous Communication Rejection and ICB - Incoming Communication Barring 15 5.7 System management requirements .15 5.7.1 User requirements.15 5.7.2 Architectural requirements
11、16 6 Feasibility of providing UC prevention in the NGN16 6.1 Identifying UC16 6.2 Marking UC17 6.3 Reacting to UC .17 6.4 Architectural impact .17 6.4.1 Technical impact.17 6.4.1.1 User Interaction.17 6.4.2 Identifying and marking UC .17 6.4.3 Handling Essential, or potentially Essential, IPRs notif
12、ied to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can
13、 be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Telecommunications and Inter
14、net converged Services and Protocols for Advanced Networking (TISPAN). ETSI ETSI TR 187 009 V2.1.1 (2008-07) 6 1 Scope The present document seeks to determine if UC is a risk to the NGN user or to the NGN Operator (a CSP using NGN technology to provide services). The present document offers justific
15、ation for UC countermeasures by presenting the results of a Threat Vulnerability and Risk Analysis (TVRA) that quantifies the likelihood and impact of UC in the NGN where UC is initiated in a variety of forms described using a number of scenarios for illustration. The present document defines the te
16、rm unsolicited communication in the context of the NGN. Where risk is shown from UC in the NGN the present document considers means to mitigate the risk using metrics of applicability, effectiveness and architectural instantiation. NOTE: Whilst this document is a technical report it identifies requi
17、rements for future work. In all cases these requirements are considered indicative pending their ratification in formal ETSI Technical Specifications within the TISPAN Work Programme. 2 References References are either specific (identified by date of publication and/or edition number or version numb
18、er) or non-specific. For a specific reference, subsequent revisions do not apply. Non-specific reference may be made only to a complete document or a part thereof and only in the following cases: - if it is accepted that it will be possible to use all future changes of the referenced document for th
19、e purposes of the referring document; - for informative references. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. For online referenced documents, information sufficient to identify and locate the source
20、shall be provided. Preferably, the primary source of the referenced document should be cited, in order to ensure traceability. Furthermore, the reference should, as far as possible, remain valid for the expected life of the document. The reference shall include the method of access to the referenced
21、 document and the full network address, with the same punctuation and use of upper case and lower case letters. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 2.1 Normative references The following referenced d
22、ocuments are indispensable for the application of the present document. For dated references, only the edition cited applies. For non-specific references, the latest edition of the referenced document (including any amendments) applies. Not applicable. ETSI ETSI TR 187 009 V2.1.1 (2008-07) 7 2.2 Inf
23、ormative references The following referenced documents are not essential to the use of the present document but they assist the user with regard to a particular subject area. For non-specific references, the latest version of the referenced document (including any amendments) applies. i.1 OMA-RD-CBC
24、S-V1-0-20060711-C: “Categorization Based Content Screening Framework Requirements“. i.2 OMA-AD-CBCS-V1-0-20060828-D: “Categorization-based Content Screening Framework Architecture“. i.3 IETF RFC 5039: “The Session Initiation Protocol (SIP) and Spam“. i.4 ETSI TS 183 011: “Telecommunications and Inte
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1870092008TELECOMMUNICATIONSANDINTERNETCONVERGEDSERVICESANDPROTOCOLSFORADVANCEDNETWORKINGTISPANFEASIBILITYSTUDYOFPREVENTIONOFUNSOLICITEDCOMMUNICATIONPDF

链接地址:http://www.mydoc123.com/p-737293.html