ITU-T X 1213-2017 Security capability requirements for countering smartphone-based botnets (Study Group 17).pdf
《ITU-T X 1213-2017 Security capability requirements for countering smartphone-based botnets (Study Group 17).pdf》由会员分享,可在线阅读,更多相关《ITU-T X 1213-2017 Security capability requirements for countering smartphone-based botnets (Study Group 17).pdf(24页珍藏版)》请在麦多课文档分享上搜索。
1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1213 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cyberspace security Cybersecurity Security capability requirements for countering smartphone-
2、based botnets Recommendation ITU-T X.1213 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DIRECTORY X.500X.599 OSI
3、NETWORKING AND SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security management X.1050X.1069 Telebiometri
4、cs X.1080X.1099 SECURE APPLICATIONS AND SERVICES (1) Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols (1) X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV security X.118
5、0X.1199 CYBERSPACE SECURITY Cybersecurity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES (2) Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1319 Smart grid security X.1330X.1339 Certified mail X.1340X.1349
6、 Internet of things (IoT) security X.1360X.1369 Intelligent transportation system (ITS) security X.1370X.1389 Distributed legder technology security X.1400X.1429 Security protocols (2) X.1450X.1459 CYBERSECURITY INFORMATION EXCHANGE Overview of cybersecurity X.1500X.1519 Vulnerability/state exchange
7、 X.1520X.1539 Event/incident/heuristics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured exchange X.1580X.1589 CLOUD COMPUTING SECURITY Overview of cloud computing security X.1600X.1601 Cloud com
8、puting security design X.1602X.1639 Cloud computing security best practices and guidelines X.1640X.1659 Cloud computing security implementation X.1660X.1679 Other cloud computing security X.1680X.1699 For further details, please refer to the list of ITU-T Recommendations. Rec. ITU-T X.1213 (09/2017)
9、 i Recommendation ITU-T X.1213 Security capability requirements for countering smartphone-based botnets Summary Recommendation ITU-T X.1213 analyses the background and potential security threats of smartphone-based botnets, and provides security capability requirements. Along with the rapid developm
10、ent of mobile Internet devices and the widespread use of smartphones, surveys from worldwide organizations show that botnets, formerly targeting mostly personal computer (PC)-based networks, are now being replicated very quickly on smartphones. Currently, countries and regions with differing conditi
11、ons and ecosystems have varying levels of constraints on the propagation of smartphone-based botnets. Analytical reports from various security companies and investigative organizations show noticeably different statistical data on the severity of the propagation of smartphone-based botnets. The pote
12、ntial threat of smartphone-based botnets is increasing very quickly in some regions and could possibly spread worldwide and turn from a regional issue into a serious global issue. Compared with PCs and servers, smartphones have less processing power, storage space and battery life. However, the adve
13、rsarial influence of smartphone-based botnets could have greater repercussions on users for the following reasons: 1) smartphones often store very important personally identifiable information (PII) and 2) if attacks on smartphones or on the operators infrastructure occur, user experience may degrad
14、e significantly due to the prevalence of, and user dependence on, smartphones. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T X.1213 2017-09-06 17 11.1002/1000/13261 Keywords Botnet, command and control (C b) from which identification or contact information of an individual
15、 person can be derived; or c) that is or can be linked to a natural person directly or indirectly. 3.2 Terms defined in this Recommendation None. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: 2G Second Generation of mobile telecommunication 2FA Two F
16、actor Authentication 3G Third Generation of mobile telecommunication 4G Fourth Generation of mobile telecommunication API Application Programming Interface C an ability to continuously expand the functions and capabilities of the phone via the installation of third-party applications; wireless netwo
17、rk access capability including the capability to access mobile Internet through a mobile operators communication network. In recent years, the population of smartphone users has continued to rapidly grow. While providing convenience to peoples lives, security threats to smartphones are also increasi
18、ng. Rec. ITU-T X.1213 (09/2017) 3 6.1 Overview of security considerations Considering the rapidly growing population of smartphone users, smartphone-based botnets must be effectively suppressed and controlled to prevent them from becoming a significant factor that influences societal stability and t
19、hreatens public security. For mobile operators, large-scale botnets could severely impair the effective utilization of the operators network and lower the quality of service (QoS) provided to users, thus leading to user dissatisfaction and loss of subscribers. For users, whose smartphones are hacked
20、 and controlled via botnets, their potential loss can be significant as much of their most important personally identifiable information (PII), such as contact lists and online payment information, is often stored on their smartphones. Therefore, the work of countering smartphone-based botnets is bo
21、th forward-looking and practical. Operators should increase their security awareness in this field to: suppress the rapid growth of botnets, decrease the loss of subscribers, and reduce user complaints, etc. 6.2 The evolution of botnet threats on smartphones The emergence of smartphone viruses can b
22、e traced back to 2004 when Cabir, the first smartphone-based worm, was discovered. In 2009, the malware iKee.B began to possess botnet characteristics and could take control of infected iPhones and send back a users PII to the bot master. In 2011, a representative mobile botnet, Android.Geinimi, was
23、 found. It could conceal communication methods, had abundant attack modules and was considered highly harmful. The widespread use of smartphones has been accompanied by extraordinary growth in smartphone-based malware, which mostly use certain smartphone functions as a propagation medium. After bein
24、g downloaded and installed on a smartphone, malware will frequently and secretly, display advertisements, induce extra smartphone traffic, and deduct fees, etc., causing losses to smartphone users. Moreover, smartphone users may also encounter issues such as: being directed to phishing websites, hav
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTX12132017SECURITYCAPABILITYREQUIREMENTSFORCOUNTERINGSMARTPHONEBASEDBOTNETSSTUDYGROUP17PDF

链接地址:http://www.mydoc123.com/p-804571.html