Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships
スポンサーリンク
概要
- 論文の詳細を見る
Spam over Internet Telephony (SPIT) will become a serious threat in the near future because of the growing number of Voice over IP (VoIP) users, the ease of spam implementation, and the low cost of VoIP service. Due to the real-time processing requirements of voice communication, SPIT is more difficult to filter than email spam. In this paper, we propose a trust-based mechanism that uses the duration of calls and call direction between users to distinguish legitimate callers from spammers. The trust value is adjustable according to the calling behavior. We also propose a trust inference mechanism in order to calculate a trust value for an unknown caller to a callee. Realistic simulation results show that our approaches are effective in discriminating spam calls from legitimate calls.
著者
-
Okuda Takeshi
Nara Inst. Of Sci. And Technol. Nara Jpn
-
Yamaguchi Suguru
Nara Inst. Of Sci. And Technol. Nara Jpn
-
Yamaguchi Suguru
Nara Institutute of Science and Technology
-
Chaisamran Noppawat
Nara Institutute of Science and Technology
関連論文
- Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control(System Programs)
- Special Issue on Internet Technology III
- A benchmark tool for network I/O management architectures (特集:新しいパラダイムの中での分散システム/インターネット運用・管理)
- The Effects of Server Placement and Server Selection for Internet Services
- SB-9-8 An Analysis on Intra-Domain Routing Instability
- AI^3 Satellite Internet Infrastructure and the Deployment in Asia (Special Issue on Internet Technology)
- Design and implementation of an inter-device authentication framework guaranteeing explicit ownership (特集:情報洪水時代のネットワークサービス)
- A Self-Confirming Engine for Preventing Man-in-the-Middle Attack(Security)(Internet Technology IV)
- Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships
- Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships
- Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership
- A Benchmark Tool for Network I/O Management Architectures
- Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership
- A Benchmark Tool for Network I/O Management Architectures
- Measurement Results of IEEE802.11a WiFi Signal Attenuation Under Different Rain Conditions