Committed to connecting the world

  •  
wtisd

ITU-T work programme

[2013-2016] : [SG17] : [Q4/17]

[Declared patent(s)]  - [Publication]

Work item: X.sbb
Subject/title: Security capability requirements for countering smartphone-based botnets
Status: [Carried to next study period]
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: -
Liaison: -
Supporting members: China, China Unicom, ETRI, KISA, ZTE Corporation.
Summary: Along with the fast development of mobile Internet and the widespread use of smartphones, surveys from worldwide companies/organizations show the trend that the formerly personal computer (PC)-based botnets are being replicated very quickly on smartphones. Though currently in different continents/regions and under different national conditions there are different ecosystems that have different levels of constraints on the propagation of smartphone-based botnets, and in the meantime analytical reports from different security companies and investigation organizations show noticeably different statistical data on the severity of the propagation of smartphone-based botnets, the potential threats behind the curtain remains the same. The potential threat of smartphone-based botnets is increasing very quickly in some regions and it could possibly spread worldwide and turn from a regional issue into a serious global issue. On the other hand, compared with PCs and servers, smartphones have less processing power, storage space and battery life. However, the adversarial influence of smartphone-based botnets might have more repercussions on users due to the following reasons: (1) much important personal identifiable information (PII) is stored on the smartphones; and (2) if attacks on smartphones or on the operator's infrastructure occur, user experience may degrade significantly due to the prevalence of and user dependence on smartphones. Recommendation ITU-T X.sbb analyses the background and potential security threats of smartphone-based botnets, and provides security capability requirements.
Comment: -
Reference(s):
  Historic references:
Contact(s):
Jae Hoon Nah, Editor
Junjie Xia, Editor
Heung Youl Youm, Editor
Bo Yu, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2014-02-14 12:08:21
Last update: 2016-09-19 16:57:28