Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Caller-REP: Detecting unwanted calls with caller social strength
Publication

Publications

Caller-REP: Detecting unwanted calls with caller social strength

Title
Caller-REP: Detecting unwanted calls with caller social strength
Type
Article in International Scientific Journal
Year
2013
Authors
Azad, MA
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Ricardo Morla
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Journal
Title: COMPUTERS & SECURITYImported from Authenticus Search for Journal Publications
Vol. 39
Pages: 219-236
ISSN: 0167-4048
Other information
Authenticus ID: P-008-HWH
Abstract (EN): Voice over IP (VoIP) is a cost effective mechanism for telemarketers and criminals to generate bulk spam calls. A challenge in managing a VoIP network is to detect spam calls without user involvement or content analysis. In this paper we present a novel content independent, non-intrusive approach based on caller trust and reputation to block spam callers in a VoIP network. Our approach uses call duration, interaction rate, and caller out-degree distribution to establish a trust network between VoIP users and computes the global reputation of a caller across the network. Our approach uses historical information for automatically determining a global reputation threshold below which a caller is declared as socially non-connected and as a spammer. No VoIP data-set is available for testing the detection mechanism. We verify the accuracy of our approach with synthetic data that we generate by randomly varying the call duration, call rate, and out-degree distributions of spammers and legitimate users. This evaluation shows that our approach can automatically detect spam callers in a network. Our approach achieves a false positive rate of less than 10% and true positive rate of almost 80% in the first two days even in the presence of a significant number of spammers. This increases to a true positive rate of 99% and drops a false positive rate to less than 2% on the third day. In a network with no spammers, our approach achieves a false positive rate of less than 10%. In a network heavily saturated with more than 60% of spam callers, our approach achieves a true positive rate of 98% and no false positives. We compare the performance of our approach with a closely related spam detection approach named Call-Rank. The results show that our approach outperforms Call-Rank in terms of detection accuracy and detection time.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 18
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Systems and methods for SPIT detection in VoIP: Survey and future directions (2018)
Article in International Scientific Journal
Azad, MA; Ricardo Morla; Salah, K
Early identification of spammers through identity linking, social network and call features (2017)
Article in International Scientific Journal
Azad, MA; Ricardo Morla
Clustering VoIP caller for SPIT identification (2016)
Article in International Scientific Journal
Azad, MA; Ricardo Morla; Arshad, J; Salah, K
ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User (2015)
Article in International Conference Proceedings Book
Azad, MA; Ricardo Morla

Of the same journal

Triple-Similarity Mechanism for alarm management in the cloud (2018)
Article in International Scientific Journal
Dalmazo, BL; João P. Vilela; Curado, M
Systems and methods for SPIT detection in VoIP: Survey and future directions (2018)
Article in International Scientific Journal
Azad, MA; Ricardo Morla; Salah, K
IoT security certifications: Challenges and potential approaches (2022)
Article in International Scientific Journal
Cirne, A; Sousa, PR; Resende, JS; antunes, l
Hardening cryptographic operations through the use of secure enclaves (2021)
Article in International Scientific Journal
Brandao, A; Resende, JS; Martins, R
Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication (2023)
Article in International Scientific Journal
Freitas, T; Soares, J; Manuel E Correia; Martins, R

See all (6)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-15 at 02:18:47 | Privacy Policy | Personal Data Protection Policy | Whistleblowing