Clustering VoIP caller for SPIT identification
- School of Computing Newcastle University Newcastle Upon Tyne U.K.
- INESC TEC &, Faculty of Engineering University of Porto Portugal
- School of Computing and Engineering University of West London U.K.
- Khalifa University of Science, Technology &, Research United Arab Emirates
Abstract The number of unsolicited and advertisement telephony calls over traditional and Internet telephony has rapidly increased over recent few years. Every year, the telecommunication regulators, law enforcement agencies and telecommunication operators receive a very large number of complaints against these unsolicited, unwanted calls. These unwanted calls not only bring financial loss to the users of the telephony but also annoy them with unwanted ringing alerts. Therefore, it is important for the operators to block telephony spammers at the edge of the network so to gain trust of their customers. In this paper, we propose a novel spam detection system by incorporating different social network features for combating unwanted callers at the edge of the network. To this extent the reputation of each caller is computed by processing call detailed records of user using three social network features that are the frequency of the calls between caller and the callee, the duration between caller and the callee and the number of outgoing partners associated with the caller. Once the reputation of the caller is computed, the caller is then places in a spam and non‐spam clusters using unsupervised machine learning. The performance of the proposed approach is evaluated using a synthetic dataset generated by simulating the social behaviour of the spammers and the non‐spammers. The evaluation results reveal that the proposed approach is highly effective in blocking spammer with 2% false positive rate under a large number of spammers. Moreover, the proposed approach does not require any change in the underlying VoIP network architecture, and also does not introduce any additional signalling delay in a call set‐up phase. Copyright © 2016 John Wiley & Sons, Ltd.
- Sponsoring Organization:
- USDOE
- OSTI ID:
- 1400586
- Journal Information:
- Security and Communication Networks, Journal Name: Security and Communication Networks Vol. 9 Journal Issue: 18; ISSN 1939-0114
- Publisher:
- Wiley Blackwell (John Wiley & Sons)Copyright Statement
- Country of Publication:
- Country unknown/Code not available
- Language:
- English
Web of Science
Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
|
book | January 2011 |
SIP Spam Detection
|
conference | January 2006 |
The Eigentrust algorithm for reputation management in P2P networks
|
conference | January 2003 |
Sender Scorecards
|
journal | March 2011 |
Have I met you before?: using cross-media relations to reduce SPIT
|
conference | January 2009 |
Mobile call graphs: beyond power-law and lognormal distributions
|
conference | January 2008 |
Cure for Spam Over Internet Telephony
|
conference | January 2007 |
Anti-vamming trust enforcement in peer-to-peer VoIP networks
|
conference | January 2006 |
Modeling Channel Occupancy Times for Voice Traffic in Cellular Networks
|
conference | June 2007 |
Detecting SPIT Calls by Checking Human Communication Patterns
|
conference | June 2007 |
You can SPIT, but you can't hide: Spammer identification in telephony networks
|
conference | April 2011 |
Content-Based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results
|
conference | June 2011 |
SimRank: a measure of structural-context similarity
|
conference | January 2002 |
On Spam over Internet Telephony (SPIT) Prevention
|
journal | August 2008 |
Power laws, Pareto distributions and Zipf's law
|
journal | September 2005 |
Outbound SPIT filter with optimal performance guarantees
|
journal | May 2013 |
Socio-technical defense against voice spamming
|
journal | March 2007 |
A distributed trust model
|
conference | January 1997 |
Survey of network security systems to counter SIP-based denial-of-service attacks
|
journal | March 2010 |
Holistic VoIP intrusion detection and prevention system
|
conference | January 2007 |
Spam detection in voice-over-IP calls through semi-supervised clustering
|
conference | June 2009 |
A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms
|
conference | June 2009 |
Thwarting Spam over Internet Telephony (SPIT) attacks on VoIP networks
|
conference | June 2011 |
On the structural properties of massive telecom call graphs: findings and implications
|
conference | January 2006 |
Similar Records
Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices
5G Service Value Chain and Network Slicing Framework using Ecosystem Modeling, Agile Delivery, and User-Story Automation