Machine Learning
A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists
Information Retrieval
Dynamic Control of Worm Propagation
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Socio-technical defense against voice spamming
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Fast Worm Containment Using Feedback Control
IEEE Transactions on Dependable and Secure Computing
SIP-based VoIP traffic behavior profiling and its applications
Proceedings of the 3rd annual ACM workshop on Mining network data
Nuisance level of a voice call
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
An offline foundation for online accountable pseudonyms
Proceedings of the 1st Workshop on Social Network Systems
VoIP Security: Attacks and Solutions
Information Security Journal: A Global Perspective
Email Spam Filtering: A Systematic Review
Foundations and Trends in Information Retrieval
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Have I met you before?: using cross-media relations to reduce SPIT
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
Simulation of SPIT filtering: quantitative evaluation of parameter tuning
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Behavior-based adaptive call predictor
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A speaker recognition based approach for identifying voice spammer
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
An anomaly-based approach to the analysis of the social behavior of VoIP users
Computer Networks: The International Journal of Computer and Telecommunications Networking
ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks
The Journal of Supercomputing
SPIDER: A platform for managing SIP-based Spam over Internet Telephony SPIT
Journal of Computer Security
Hi-index | 0.00 |
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based networks. The problem of spam in VoIP networks has to be solved in real time compared to e-mail systems. Many of the techniques devised for e-mail spam detection rely upon content analysis and in the case of VoIP it is too late to analyze the media after picking up the receiver. So we need to stop the spam calls before the telephone rings. From our observation, when it comes to receiving or rejecting a voice call people use social meaning of trust and reputation of the calling party. In this paper, we describe a multi-stage spam filter based on trust, and reputation for detecting the spam. In particular we used closed loop feedback between different stages in deciding if the incoming call is a spam or not. For verifying the concepts, we used a laboratory setup of several thousand soft-phones and a commercial grade proxy server. We verified our filtering mechanisms by simulating the spam calls and measured the accuracy of the filter. Results show that multistage feedback loop fares better than any single stage. Also, the larger the network size, the harder to detect a spam call. Further work includes understanding the behavior of different controlling parameters in trust and reputation calculations and deriving meaningful relationships between them.