Go to:
Logótipo
Você está em: Start > Publications > View > Clustering VoIP caller for SPIT identification
Map of Premises
Principal
Publication

Clustering VoIP caller for SPIT identification

Title
Clustering VoIP caller for SPIT identification
Type
Article in International Scientific Journal
Year
2016
Authors
Azad, MA
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Ricardo Morla
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Arshad, J
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Salah, K
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 9
Pages: 4827-4838
ISSN: 1939-0114
Publisher: Hindawi
Other information
Authenticus ID: P-00M-DFD
Abstract (EN): The number of unsolicited and advertisement telephony calls over traditional and Internet telephony has rapidly increased over recent few years. Every year, the telecommunication regulators, law enforcement agencies and telecommunication operators receive a very large number of complaints against these unsolicited, unwanted calls. These unwanted calls not only bring financial loss to the users of the telephony but also annoy them with unwanted ringing alerts. Therefore, it is important for the operators to block telephony spammers at the edge of the network so to gain trust of their customers. In this paper, we propose a novel spam detection system by incorporating different social network features for combating unwanted callers at the edge of the network. To this extent the reputation of each caller is computed by processing call detailed records of user using three social network features that are the frequency of the calls between caller and the callee, the duration between caller and the callee and the number of outgoing partners associated with the caller. Once the reputation of the caller is computed, the caller is then places in a spam and non-spam clusters using unsupervised machine learning. The performance of the proposed approach is evaluated using a synthetic dataset generated by simulating the social behaviour of the spammers and the non-spammers. The evaluation results reveal that the proposed approach is highly effective in blocking spammer with 2% false positive rate under a large number of spammers. Moreover, the proposed approach does not require any change in the underlying VoIP network architecture, and also does not introduce any additional signalling delay in a call set-up phase. (C) 2016 John Wiley & Sons, Ltd.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 12
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Security and privacy issues for the network of the future (2012)
Another Publication in an International Scientific Journal
G. F. Marias; João Barros; M. Fiedler; A. Fischer; H. Hauff; R. Herkenhoener; A. Grillo; A. Lentini; Luísa Lima; C. Lorentzen; W. Mazurczyk; Hermann de Meer; Paulo Oliveira; George C. Polyzos; Enric Pujo; Krzysztof Szczypiorski; João P. Vilela; Tiago Vinhoza
Virtual network stacks: from theory to practice (2012)
Article in International Scientific Journal
Matos, A; Ferreira, R; Sargento, S; Aguiar, RL
Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-17 at 09:22:59 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book