Unsolicited Communication / SPIT / multimedia-spam
|
|
- Blaise Byrd
- 5 years ago
- Views:
Transcription
1 Unsolicited Communication / SPIT / multimedia-spam overview of this topic in different SDOs Thilo Ewald NGN Group, NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page <date> 1
2 Jan 08-2 Overview Problem statement Definition of Unsolicited communication Forecast of next generation SPAM? Classification on identifying UC Classification on reacting on UC Possible Deployment scenarios Ongoing work IETF ITU 3GPP TISPAN Other.. NEC s VoIP SEAL Demonstrator of feasibility to identify and prevent UC for VoIP AOB
3 Jan 08-3 Problem statement SMS/MMS SPAM, SPIT, multimedia-spam, etc Similar wording for the same problem Unsolicited communication Social threat More stress at home and in office, Reduced performance at work More difficult to establish communication e.g. phone switched off to prevent it from ringing Voice mailbox filling with voice spam messages no means to distinguish spam from good voice messages, information lost Business Market will develop more slowly Customers will be disappointed by new technology (NGN) Good call Riiing... Riiing... SPIT calls
4 Jan 08-4 Forecast of next generation SPAM? NGN devices will become ubiquitous as accounts nowadays are Number of VoIP subscribers will increase dramatically within the NGN Residential VoIP subscribers growing linearly already since year 2000 Today SPAM keeps on increasing 3600 spam messages per day for a small enterprise 100 SPAM messages per day for a end users Voice SPAM over PSTN in Germany 2 calls per week per residential subscriber Conclusion SPIT is ~ 1000 time cheaper than voice spam over PSTN 2000 SPIT calls per week per residential subscriber!
5 Jan 08-5 Classification on identifying UC knowledge base feedback system system callee system callee Stage 1: non-intrusive Stage 2: caller interaction Stage 3: feedback before call Stage 4: feedback during call Stage 5: feedback after call Non-intrusive test Blacklisting / white listing Message/Call rate analysis Simultaneous call analysis Call behavior analysis Statistically analysis... Caller Interactions touring test... FB before call buddy list integration consent-based communications... FB during call SPIT hang-up button FB after call service center General & Personalized Personalized
6 Jan 08-6 Classification on Reacting on UC Legal aspect No operator is allowed to intercept communication attempts Only with contractual power operators are allowed to react in behalf of the customer to communication attempts Technical means Block Re-route (i.e. mailbox) Indicate
7 Jan 08-7 Possible Deployment scenarios Caller (SPITer) (Optional) Identify mark Access node Access network (Optional) Identify mark Core border Core network Identify mark prevent Border gateway User profiles Callee (Bob) UC detection in the NGN network Legacy device UC detection in the NGN network IMS device Caller (SPITer) Identify mark Access node Access network Identify mark Core border Core network Identify mark Border gatewa y Callee (Bob) Identify mark prevent
8 Ongoing work in the SDOs IETF, ITU, 3GPP, TISPAN Other.. Page <date> 8
9 Jan 08-9 UC in the IETF (SPIT) Draft-ietf-sipping-spam-03 The Session Initiation Protocol (SIP) and SPAM draft-niccolini-sipping-spitstop Signalling TO Prevent SPIT (SPITSTOP) Reference Scenario draft-niccolini-sipping-feedback-spit SIP Extensions for SPIT identification draft-jung-sipping-authentication-spit Authentication between the Inbound Proxy and the UAS for Protecting SPIT in the Session Initiation Protocol (SIP) draft-schwartz-sipping-spit-saml SPAM for Internet Telephony (SPIT) Prevention using the Security Assertion Markup Language (SAML) draft-froment-sipping-spit-authz-policies Authorization Policies for Preventing SPIT
10 Jan UC in the ITU (multimedia SPAM) The ITU is working on the thread Countering spam by technical means in the ITU-T Study Group 17 - Question 17/17 (Study Period ). X.ocsip Overview of countering SPAM for IP multimedia application - TD 2499 Rev.1 This Recommendation specifies basic concepts, characteristics, and effects of Spam in IP multimedia applications such as IP Telephony, instant messaging, multimedia conference, etc. It provides technical issues, requirements for technical solutions, and applicability of countering mechanism of spam into IP multimedia spam. It provides basis and guideline for developing further technical solutions on countering Spam. X.fcsip Technical Framework of Countering IP Multimedia SPAM TD 2498 This Recommendation will specify general architecture of countering spam system on IP multimedia applications such as IP Telephony, instant messaging, multimedia conference, etc. It will provide functional blocks of necessary network entities to counter spam and their functionalities, and describe interfaces among the entities. To build secure session against spam attack, User Terminals and Edge Service Entities such as proxy server or application servers will be extended to have spam control functions. We will also show interfaces between these extended peer entities, and interfaces with other network entities which can involve for countering spam. X.csreq Requirement on countering SPAM TD 2496 Requirements on countering spam are clarified in this recommendation. There are many types of spam, such as spam, Mobile messaging spam and IP multimedia spam. Various types of spam may have both common and specific requirements on countering it. For one type of spam, the requirement in different entities should also be clarified.
11 Jan UC in 3GPP (SMS/MMS SPAM) ETSI TR V6.0.0 / ETSI TS V / ETSI TS V6.0.0 Fraud Information Gathering System (FIGS) FIGS provides the means for the HPLMN to monitor a defined set of subscriber activities. The aim is to enable service providers/network operators to a service to limit their financial exposure to large unpaid bills produced on subscriber accounts whilst the subscriber is roaming 3GPP TR XXX XXX Protection against SMS, MMS and IMS SPAM; Study of Different SPAM Protection Mechanisms This TR studies existing and new mechanisms to enable to limit the effects of the SPAM. The following services are considered into the scope of this TR: SMS, MMS, IMS messaging/presence/call and also messages. The scope is indeed large and ambitious, but as the trend is too converge all medias, the anti SPAM solution has to be adapted to this concept. Investigation based on the 3GPP architecture regarding SMS/MMS/IM SPAM were done Potential solution to counter this threat were analyzed and defence mechanisms were proposed
12 Jan UC in TISPAN (unsolicited communication) ETSI TS MCID (Malicious call identification) This service enables the callee to indicate that an incoming communication is considered to be malicious and it should be identified and registered. ETSI TS OIR (Originating Identification Restriction ) The OIR service enables the originating party to prevent presentation of any network-provided identity to the terminating party, and is applicable to all session-based services of the NGN. The OIR supplementary service is described in. ETSI EN ACR (Anonymous Communication Rejection) This service ACR allows a user to reject incoming communications when the caller is anonymous. ETSI TS ICB (Incoming Communication Barring) ICB allows a user to block incoming communications based on the identity of the caller. TR WI07025 UC (Feasibility study of preventing unsolicited communication in the NGN) The document WI07025 reports on the feasibility of counteracting the occurrence of Unsolicited Communications (UC) in the NGN. It also addresses the methodologies on preventing the terminating party from receiving UC. The report takes the form of a TVRA and quantifies the likelihood and impact of UC in the NGN where UC is initiated in a variety of forms. A definition of the term unsolicited communication and its context is given as used in NGN. Relevant objectives and requirements are extracted for the NGN architecture, signalling and security.
13 Jan UC in other SDOs GSMA Mobile Spam Code of Practice Code of conduction within GSM network OMA OMA has drafted a set of requirements and architecture for Categorization Based Content Screening (CBCS) suggesting among other things usage of ICAP protocol to transfer content categorization information. Content Screening is defined as the act of blocking, allowing or amending content, thereby, it also includes malware. It is suggested that the OMA requirements and architecture are considered for the unsolicited communication study as appropriate. The current OMA work can be found in the following specifications: Categorization Based Content Screening Framework Requirements, Candidate Version July 2006 (a newer one may already exist), Open Mobile Alliance OMA-RD-CBCS-V1_ C The document describes Use Cases for categorization based content screening and high level requirements on the functionality of such a system. Categorization-based Content Screening Framework Architecture, Draft Version Aug 2006, Open Mobile Alliance OMA-AD-CBCS-V1_ D The document presents an architectural model for a two-tier solution of a CBCS Enabler. The CBCS Enabler evaluates and/or enforces Screening Rules.
14 VoIP SEAL (VoIP SEcure Application Layer Firewall) NEC s demonstrator for identifying, analyzing and preventing UC in the environment of VoIP VoIP SEAL Page <date> 14
15 Jan NEC VoIP SEAL : Characteristics Covers multiple aspects of VoIP Security Provide protection against wide range of attacks Key issues Flexible protection technology is required Encryption and authentication will not be enough No single method of protection Solution VoIP SEcure Application Level firewall (VoIP SEAL) Modular and extensible platform prevention of SPIT and (D)DoS attacks Multiple different VoIP protection modules cooperate On-line plug-and-play integration of new modules On-line configuration of modules On-line update of modules Good call Good call SPIT calls SPIT calls SIP Proxy SIP Proxy with additional modules VoIP SEAL now with NEC solution
16 Jan Building Blocks for SPIT Prevention (Classification) No Interactions With Call Participants black/white-listing call-rate analysis Caller-side Interactions Turing test Feedback from callee before call Import buddy-list Specify personal black/whitelist Feedback from callee during call Special hang-up button Feedback from callee After Call IVM-system Special number (i.e. #7748) Web-frontend knowledge base feedback system system callee system callee Stage 1: non-intrusive Stage 2: caller interaction Stage 3: feedback before call Stage 4: feedback during call Stage 5: feedback after call
17 VoIP SEAL: Characteristics Covers multiple aspects of VoIP Security Provide protection against wide range of attacks Standard-based SIP-based for Next Generation Networks (NGN) SIP extensions currently entering the standardization process (D)DoS attacker Phone Proxy Server Application Server VoIP SEAL Firewall Peering Point (SBC) SPIT caller Jan Good caller
18 Jan VoIP SEAL: Internal Architecture VoIP SEAL covers different stages with different modules mix of open and closed loops Stage 1 modules are combined using a scoring system Stage 2 modules are combined based on the output of the previous stage Stage 3/4/5 use the information coming from feedbacks to work in collaboration with Stage 1 modules Module 1 Module 2... Module n Scoring System Module 1 Module 2... Module n Dispatcher Stage 1 accept / reject Stage 2 accept / reject VoIP SEAL Feedback Processing Terminals Stage 3/4/5
19 Jan Advanced SPIT Prevention Mechanisms analyze signaling messages voice signal energy interact with caller caller VoIP SEAL callee 0 time 0 ringing greeti ng & ques tion answer time calling bob@nec.de suspicious caller: additional tests 1. Energy level of conversation during greeting/question? unknown@somewhere.com Too high SPIT block the call Close to zero: process further or accept the call
20 Jan Screenshot of Prototype GUI
21 Jan AOB Question & Answers
Unsolicited Communication in the NGN
Unsolicited Communication in the NGN Overview of Status and Activities in different SDOs Thilo Ewald Research Scientist NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page
More informationTowards Standardized Prevention of Unsolicited Communications and Phishing Attacks
Towards Standardized Prevention of Unsolicited Communications and Phishing Attacks JaeSeung Song and Andreas Kunz NEC Laboratories Europe Received 3 April 2013; Accepted 14 May 2013 Abstract The world
More informationStandardization Trends of the Next Generation Network in ETSI TISPAN
Standardization Trends of the Next Generation Network in ETSI TISPAN Akira Kurokawa and Isao Higashi Abstract International standardization of the Next Generation Network is being actively discussed in
More informationINCREASING TRUST IN CALLING LINE IDENTIFICATION AND ORIGINATING IDENTIFICATION
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) INCREASING TRUST IN CALLING LINE IDENTIFICATION AND ORIGINATING IDENTIFICATION
More informationWorkshop Report. ETSI TISPAN The Home of NGN Standards. Beijing, China, 28 May, 2008
Workshop Report ETSI TISPAN The Home of NGN Standards Beijing, China, 28 May, 2008 Since 2003, ETSI TISPAN has been the key standardization body for building up Next Generation Networks (NGN) specifications
More informationdraft ETSI TR V0.5.0 ( )
Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Prevention of Unsolicited Communication in the NGN CAUTION: This DRAFT document is provided
More informationNGN Security standards for Fixed-Mobile Convergence
NGN Security standards for Fixed-Mobile Convergence Judith E. Y. Rossebø Telenor R&I ETSI TISPAN WG7 Chairman (judith.rossebo@telenor.com) 2nd ETSI Security Workshop: Future Security 16-17 - Sophia-Antipolis,
More informationOverview and Status of NGN Standardization Activities. Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories
Overview and Status of NGN Standardization Activities Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories Contents 1. Outline of NGN 2. Key Technologies of NGN 3. Summary and
More informationVoIP Security Threat Analysis
2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service
More informationTelecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN):
ITU-BDT Regional Seminar on Fixed Mobile Convergence and new network architecture for the Arab Region Tunis (Tunisia), 21-24 November 2005 Day 1 Session 1.2: International Framework Telecommunications
More informationETSI TISPAN Vision on Convergence. FMCA Convergence & Customer Experience 26 June 2008 Sophia-Antipolis, France
ETSI TISPAN Vision on Convergence FMCA Convergence & Customer Experience 26 June 2008 Sophia-Antipolis, France Richard Brennan Vice Chair ETSI TISPAN Vice Director Industry Standards Huawei Technologies
More information3GPP TS V ( )
TS 29.165 V10.10.0 (2012-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Inter-IMS Network to Network Interface (NNI) (Release
More informationISO/IEC TR TECHNICAL REPORT
TECHNICAL REPORT ISO/IEC TR 16167 First edition 2010-08-01 Information technology Telecommunications and information exchange between systems Next Generation Corporate Networks (NGCN) Emergency calls Technologies
More informationSIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)
security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General
More informationIngate SIParator /Firewall SIP Security for the Enterprise
Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3
More informationFederated Identity Management and Network Virtualization
Federated Identity Management and Network Virtualization Yang Cui and Kostas Pentikousis 3rd ETSI Future Networks Workshop 10 April 2013 Sophia Antipolis, France The opinions expressed in this presentation
More informationCisco Unified Presence 8.0
Cisco Unified Presence 8.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from any workspace.
More informationETSI TC INT ACTIVITIES IN THE FIELD OF IMS STANDARDIZATION AND TESTING. Giulio Maggiore ETSI TC INT Chairman Martin Brand ETSI TC INT Vice Chairman
ETSI TC INT ACTIVITIES IN THE FIELD OF IMS STANDARDIZATION AND TESTING Giulio Maggiore ETSI TC INT Chairman Martin Brand ETSI TC INT Vice Chairman Outline of presentation Core Network Testing 3GPP specs
More informationUnified Communications Manager Express Toll Fraud Prevention
Unified Communications Manager Express Toll Fraud Prevention Document ID: 107626 Contents Introduction Prerequisites Requirements Components Used Conventions Overview Internal vs. External Threats Toll
More information3GPP TS V9.3.0 ( )
TS 29.165 V9.3.0 (2010-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Inter-IMS Network to Network Interface (NNI) (Release 9)
More informationTISPAN. Defining the Next Generation Network
World Class Standards TISPAN Defining the Next Generation Network Chairman TISPAN, Rainer Münch R.Muench@alcatel-lucent.de TISPAN Workshop Beijing May 2008 World Class Standards Presentation Roadmap 1.
More informationNairobi (Kenya), 9-12 May 2005 Session 1.2 "International Framework"
Regional Seminar for Africa on Fixed Mobile Convergence and Guidelines on the smooth transition of existing mobile networks to IMT-2000 for Developing Countries Nairobi (Kenya), 9-12 May 2005 Session 1.2
More informationWhat is NGN? Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011
What is NGN? Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Next Generation Network (NGN) Definition Applications Requirements Network Architecture QoS Issues 2 What
More informationCOMMUNICATIONS ALLIANCE LTD REPORT FROM THE IP LOCATION INFORMATION WORKING GROUP
COMMUNICATIONS ALLIANCE LTD REPORT FROM THE IP LOCATION INFORMATION WORKING GROUP Comments on this report can be sent to James Duck, Project Manager IP Location Information Working Group j.duck@commsalliance.com.au
More informationETSI TS V8.1.0 ( ) Technical Specification
TS 124 173 V8.1.0 (2008-10) Technical Specification Universal Mobile Telecommunications System (UMTS); IMS Multimedia telephony service and supplementary services; Stage 3 (3GPP TS 24.173 version 8.1.0
More informationCisco Converged Services Platform
Data Sheet Cisco Converged Services Platform Mobile subscribers are demanding the same type of services that are provided over the Internet on their mobile phones including messaging, social networking,
More information3GPP TS V8.9.0 ( )
TS 24.604 V8.9.0 (2011-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Communication Diversion (CDIV) using IP Multimedia (IM)
More informationISO/IEC TR TECHNICAL REPORT
TECHNICAL REPORT ISO/IEC TR 12860 First edition 2009-04-15 Information technology Telecommunications and information exchange between systems Next Generation Corporate Networks (NGCN) General Technologies
More informationPresented at MarcusEvans Conference VoIP Business Strategies Forum, Berlin, 9-11 November 2005
VoIP interconnection between Internet, Cable, Mobile and Fixed Worlds Dr.ir. M. Oskar van Deventer, Dr. Iko Keesmaat Project data Author(s) Project title Contract number Report number Version Date Customer
More informationTIM Specification for Gm Interface between an User Equipment and the Fixed IMS Network: MultiMedia Telephony Supplementary Services
TIM Specification for Gm Interface between an User Equipment and the Fixed IMS Network: MultiMedia Telephony Supplementary Services Rev. 1.1 06/11/2018 1 INDICE DEGLI ARGOMENTI 1. SCOPE... 3 2. APPLICABILITY...
More informationInterconnection & Roaming IMS Signalling Profile (Release 2.0) May 2013
INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (www.i3forum.org) (i3 FORUM) Source: Workstream Technical Aspects i3 forum keyword: IMS, Signalling Interconnection & Roaming IMS Signalling Profile
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationWHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points
WHITE PAPER Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS Starting Points...1 The Four Essentials...2 The Business Case for SIP Trunks...3 To benefit from the latest
More informationatl IP Telephone SIP Compatibility
atl IP Telephone SIP Compatibility Introduction atl has released a new range of IP Telephones the IP 300S (basic business IP telephone) and IP400 (Multimedia over IP telephone, MOIP or videophone). The
More informationOpen Standards and Interoperability for IP Multimedia Subsystem (IMS)
Open Standards and Interoperability for IP Multimedia Subsystem (IMS) Jonas SUNDBORG Director of Standardization and Regulation Telefonaktiebolaget LM Ericsson Group Function R&D, Standardization Standards,
More informationWhite Paper. SIP Trunking: Deployment Considerations at the Network Edge
SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively recently,
More informationServices and Related Issues of NGN Standards Activities
International Telecommunication Union Services and Related Issues of Standards Activities Dick Knight BT Group plc ITU Focus Group Vice-Chairman Jeju, Korea March 14-15, 2005 Contents 1. Business Models
More informationTelecom MISP. Building a Telecom Information Sharing Platform. Alexandre De Oliveira
Telecom MISP Building a Telecom Information Sharing Platform Alexandre De Oliveira MISP history Actively developed and maintained by CIRCL Computer Incident Response Center Luxembourg Open Source Software
More informationMonAM ( ) at TUebingen Germany
MonAM (28-29.09.2006) at TUebingen Germany Security Threats and Solutions for Application Server of IP Multimedia Subsystem (IMS-AS) Muhammad Sher Technical University Berlin, Germany & Fraunhofer Institute
More informationETSI LI Standards Overview
http://eustandards.in/ ETSI LI Standards Overview Alex Leadbeater - Chairman 3GPP SA3LI What is LI/DR/DD Lawful Interception (LI) is the real-time capture of a Target s use of communications (including
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More informationETSI TS V2.1.1 ( ) Technical Specification
TS 186 014-1 V2.1.1 (2009-05) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); PSTN/ISDN simulation services: Communication Diversion
More informationThe leader in session border control. for trusted, first class interactive communications
The leader in session border control for trusted, first class interactive communications VoIP security at the carrier network edge Kevin Mitchell Director, Solutions Marketing kmitchell@acmepacket.com
More informationUsing Cross-Media Relations to Identify Important Communication Requests: Testing the Concept and Implementation
Using Cross-Media Relations to Identify Important Communication Requests: Testing the Concept and Implementation Kumiko Ono and Henning Schulzrinne {kumiko, hgs}@cs.columbia.edu Outline 1. Introduction
More informationDigital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model
Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist
More informationA Policy Framework for Personalized and Role-Based SPIT Prevention
A Policy Framework for Personalized and Role-Based SPIT Prevention Nico d Heureuse NEC Europe Kurfürsten-Anlage 36 Heidelberg, germany dheureuse@nw.neclab.eu Jan Seedorf NEC Europe Kurfürsten-Anlage 36
More informationNGN interconnection: technology challenges. Dr. Rochdi ZOUAKIA.
ITU/ Arab Regional Workshop on NGN interconnection: technology challenges Dr. Rochdi ZOUAKIA zouakia@anrt.net.ma TODAY We have different networks offering different services. Networks with Different architectures.
More informationENUM in the UK..and the NGN standards arena
ENUM in the UK..and the NGN standards arena Tony Holmes Head of NNA Policy & Strategy BT Group PLC Chairman ETSI TISPAN WG4 (Numbering Addressing & Routeing) ENUM in the UK and in the standards arena Has
More informationUnified Communications For Enterprise
Unified Communications For Enterprise Lou Fulco Presence Status Mobility Collaboration A Unified Strategy UC enables customers to experience greater productivity through the convergence of communication
More informationStatus of IMS-Based Next Generation Networks for Fixed Mobile Convergence
Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence Prepared for: WOCC 2007 Fuchun Joseph Lin Chief Scientist fjlin@research.telcordia.com Telcordia Technologies, Inc. April 28, 2007
More informationUnified Communications Platform
Platforms (Products/Software) Unified Communications Platform TSUTSUI Kensaku, ARAO Shinya, SERADA Teruharu, HOKARI Makoto Abstract Integration of communications services used by an enterprise on an IP
More informationRequirements and capabilities for. NGN services Marco Carugi Nortel Networks March 2005 Jeju Island, South Korea
Requirements and capabilities for Phone: +33-1-6955-7027 Email: marco.carugi@nortel.com NGN services Marco Carugi Nortel Networks 14-15 March 2005 Jeju Island, South Korea Outline NGN Services Service
More informationETSI TS V ( ) Technical Specification
TS 124 173 V10.0.0 (2011-05) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; IMS Multimedia telephony communication service and supplementary services; Stage 3 (3GPP TS
More informationETSI TS V ( )
TS 122 519 V14.0.0 (2017-03) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Business communication requirements (3GPP TS 22.519 version 14.0.0 Release 14) 1 TS 122 519
More informationSkype for Business Mobile Client Comparison Guide
Mobile Client Introduction can be used on a personal mobile device through the mobile application (app). The mobile app allows users to view presence information, send and receive instant messages and
More informationCybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives
Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives Wayne Zeuch Rapporteur: Standards, Conformance, and Interoperability CITEL PCC.I ITU /CITEL Regional Cybersecurity Workshop
More informationEvolutionary steps towards NGN communications services in Australia
Evolutionary steps towards NGN communications services in Australia Kevin Sutherland Manager Communications Engineering ITU/APT Workshop on NGN Planning 16 17 March 2007 Topics NGN definition, standards
More informationETSI TS V1.2.2 ( )
TS 183 010 V1.2.2 (2007-04) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN Signalling Control Protocol; Communication HOLD
More informationwhite paper MMTel a standard for multimedia services over IMS
white paper 284 23-3121 Uen Rev A October 2008 MMTel a standard for multimedia services over IMS With interoperability, performance and fixed mobile convergence, MMTel (multimedia telephony) is a standardized
More informationLocation in SIP/IP Core (LOCSIP)
in SIP/IP Core (LOCSIP) Conveyance with IMS: the OMA LOCSIP Service Enabler Don Lukacs Telcordia Applied Research 2010, Telcordia Technologies Inc. in SIP/IP Core (LOCSIP) Topics General Background Material
More informationFixed Mobile Convergence s Role in In-building Coverage. Charles Bradshaw Leader, Wireless Core Marketing May 2, 2007
Fixed Mobile Convergence s Role in In-building Coverage Charles Bradshaw Leader, Wireless Core Marketing May 2, 2007 2 Technology and Markets Have Changed Wireline substitution gaining momentum Wireless
More informationSecure Telephony Enabled Middle-box (STEM)
Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components
More information3GPP support for IP based Emergency Calls - April 2007 Status
3GPP support for IP based Emergency Calls - April 2007 Status 2 nd SDO Emergency Services Coordination Workshop (ESW07) Library of Congress, Washington, DC, USA April 10-12, 2007 Stephen Edge, Qualcomm,
More informationINSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #5. Roch H. Glitho- Ericsson/Concordia University
INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #5 1 Legacy based service architectures Expectations and Legacy based service architectures. A big gap 1. Re-using
More informationETSI TS V2.0.0 ( ) Technical Specification
TS 181 019 V2.0.0 (2007-11) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Business Communication Requirements 2 TS 181 019 V2.0.0
More informationETSI TS V ( )
TS 122 228 V12.8.0 (2014-10) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Service requirements for the Internet
More informationINFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE
More informationIP MULTIMEDIA SUBSYSTEM (IMS) SECURITY MODEL
International Journal of Advance Research, IJOAR.org ISSN 2320-9194 1 International Journal of Advance Research, IJOAR.org Volume 1, Issue 3, March 2013, Online: ISSN 2320-9194 IP MULTIMEDIA SUBSYSTEM
More informationTC32 presentation to ECMA General Assembly, Edinburgh, 22nd June 2000
TC32 presentation to ECMA General Assembly, Edinburgh, 22nd June 2000 John Elwell, Chairman ECMA TC32 Siemens Communications (International) Limited john.elwell@siemenscomms.co.uk ECMA/TC32/2000/103 ECMA/GA/2000/69
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationGerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved
ETSITC TC LI STANDARDS OVERVIEW Gerald McQuaid, Chairman ETSI TC LI ETSI 2014. All rights reserved 9 th ETSI Security Workshop, 15 16 January 2014 Lawful Interception (LI) & Data Retention (DR) Delivery
More informationFixed Mobile Convergence
Fixed Mobile Convergence Daniel McHugh Solutions Manager dmchugh2@alcatel-lucent.com www.alcatel-lucent.com Fixed Mobile Convergence Fixed Mobile Convergence (FMC) provides common and seamless services
More informationCompeting with OTT Services: RCS e without IMS. November 15, 2011
Competing with OTT Services: RCS e without IMS November 15, 2011 An Introduction to Interop All Gen Short Message Service Center (SMSC) 4 Series Message Personalization & Control (MPAC) Multimedia Message
More information3GPP in Public Safety and Security 2nd ETSI Security Workshop: Future Security January 2007 Sophia Antipolis, France
Doc-No 3GPP in Public Safety and Security 2nd ETSI Security Workshop: Future Security 16-17 January 2007 Sophia Antipolis, France Dr. Jörg Swetina (3GPP SA1 vice-chair) what s cooking in 3GPP I Overview
More informationIMS in the Next Generation Network
Proceedings of the 11th WSEAS International Conference on COMMUNICATIONS, Agios Nikolaos, Crete Island, Greece, July 26-28, 2007 45 IMS in the Next Generation Network TATIANA KOVACIKOVA, PAVOL SEGEC, MILAN
More informationAdaptive Quality of Service Management for Next Generation Residential Gateways
Adaptive Quality of Service Management for Next Generation Residential Gateways Iván Vidal, Jaime García, Francisco Valera, Ignacio Soto, and Arturo Azcorra Universidad Carlos III de Madrid Avda. Universidad
More informationETSI TS V ( )
TS 122 173 V11.5.0 (2013-07) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP Multimedia Core Network Subsystem
More information3GPP TS V ( )
TS 23.167 V7.11.0 (2008-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS) emergency sessions (Release
More informationSESSION BORDER CONTROL IN IMS AN ANALYSIS OF THE REQUIREMENTS FOR SESSION BORDER CONTROL IN IMS NETWORKS
SESSION BORDER CONTROL IN IMS AN ANALYSIS OF THE REQUIREMENTS FOR SESSION BORDER CONTROL IN IMS NETWORKS CONTENTS Executive Summary 4 About the Author 4 Introduction 5 1.1 Scope 5 1.2 Session Border Controllers
More information4G: Convergence, Openness for Excellence and Opportunity Cisco Systems, Inc
4G: Convergence, Openness for Excellence and Opportunity, Inc 1 4G Not Just for Mobility This next generation of mobility networks will have over the air throughput speeds that will approach those of wireless
More informationThe Spoofing/Authentication Threat
The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally
More informationService delivery platform: Critical enabler to service provider s new revenue stream
Service delivery platform: Critical enabler to service provider s new revenue stream ANETT SCHÜLKE, DANIELE ABBADESSA, FLORIAN WINKLER NEC Network Laboratories, NEC Europe Ltd., Germany {anett.schuelke,
More information2. SA1 Release 11 Standardization Trends
3GPP SA1 Release 11 Standardization Trends 3GPP SA1 Service Requirements Release 11 3GPP SA1 Release 11 Standardization Trends NTT DOCOMO Technical Journal At the 3GPP, which standardizes mobile communications
More informationEUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA
Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011
More informationCDMA2000 Workshop. Paul Le Rossignol. Nortel Networks, OMA Board Director
CDMA2000 Workshop Paul Le Rossignol Nortel Networks, OMA Board Director Open Mobile Alliance 1 2 3 4 Vision and Mission of OMA OMA s Market Position & Industry Benefits Structure & Scope OMA Interoperability
More informationETSI TS V1.2.1 ( )
TS 183 007 V1.2.1 (2007-03) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); PSTN/ISDN simulation services; Originating Identification
More informationETSI TS V ( )
TS 124 196 V15.0.0 (2018-07) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; 5G; Enhanced Calling Name (ecnam) (3GPP TS 24.196 version 15.0.0 Release 15) 1 TS 124 196 V15.0.0
More informationETSI TC STQ Speech and multimedia Transmission Quality
ETSI TC STQ Speech and multimedia Transmission Quality Jean-Yves Monfort ETSI TC STQ Chairman Jeanyves.monfort.6@orange.fr ETSI STQ Workshop ETSI, Sophia Antipolis, France, 1-2 July 2009 Description World
More informationEvolution and Migration to IMT-2000 & Systems beyond
Evolution and Migration to IMT-2000 & Systems beyond 2.1.6: Mobile Network Evolution to NGN ITU-BDT Regional Seminar on IMT-2000 for CEE and Baltic States Ljubljana, Slovenia 1-3 December 2003 John Visser,
More informationPROPOSAL THESIS RESEACH IP MULTIMEDIA PACKET DELAY AND TRAFFIC ANALYSIS
PROPOSAL THESIS RESEACH IP MULTIMEDIA PACKET DELAY AND TRAFFIC ANALYSIS Author DHANNY PERMATASARI PUTRI 55412110012 MAGISTER TELECOMMUNICATION PROGRAMME ELECTRO DEPARTEMENT UNIVERSITAS MERCU BUANA JAKARTA
More informationFT ETSI STANDARDS FOR PUBLIC COMMENT
FT ETSI STANDARDS FOR PUBLIC COMMENT The following ETSI documents are issued under the Public Enquiry PE20081017. Comments are welcome and should be addressed to the named contact to arrive by 12 September
More informationDraft Recommendation X.sdnsec-3 Security guideline of Service Function Chain based on software defined network
Draft Recommendation X.sdnsec-3 Security guideline of Service Function Chain based on software defined network Summary This recommendation is to analyze the security threats of the SDN-based Service Function
More informationETSI TS V1.1.1 ( )
TS 183 028 V1.1.1 (2006-04) Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Common basic communication procedures; Protocol specification
More informationABC SBC: Secure Peering. FRAFOS GmbH
ABC SBC: Secure Peering FRAFOS GmbH Introduction While an increasing number of operators have already replaced their SS7 based telecommunication core network with a SIP based solution, the interconnection
More informationBusiness Considerations for Migration to IMT-2000
Business Considerations for Migration to IMT-2000 Bosco Eduardo Fernandes Siemens AG, ICM N PG SP NI IB Vice President International Affairs Email:bosco.fernandes@siemens.com ontent The Services Delivery
More informationIP Possibilities Conference & Expo. Minneapolis, MN April 11, 2007
IP Possibilities Conference & Expo Minneapolis, MN April 11, 2007 Rural VoIP Protocol, Standards and Technologies Presented by: Steven P. Senne, P.E Chief Technology Officer Finley Engineering Company,
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationi-mcs Italtel IMS & VoLTE solution 1/ Italtel S.p.A. All rights reserved
i-mcs Italtel IMS & VoLTE solution 1/7 Introduction Telecommunication Market is nowadays stressed between the aggressive and fast on the market Over The Top (OTT) players that provides voice, video and
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More information