2012
DOI: 10.1007/978-3-642-31909-9_31
|View full text |Cite
|
Sign up to set email alerts
|

Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks

Abstract: Abstract. The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real and contemporary problem. If the problem remains unchecked then it may become as potent as email spam today. In this paper, we present two approaches to detect and prevent SPITting over the Internet. Both of our approaches are based on the anomaly detection of the distributions of selected call features (i.e., day and time of calling, call durations etc.). The first approach uses Mahalanobis Distance as a summar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…Features like call frequency and average call duration are used to compare previous call pattern with the current one , . Sengar et al use day, time of calling, and call duration parameters of users to create a pattern and use Mahalanobis distance between the current observation and pattern to detect anomalies.…”
Section: Prior Workmentioning
confidence: 99%
“…Features like call frequency and average call duration are used to compare previous call pattern with the current one , . Sengar et al use day, time of calling, and call duration parameters of users to create a pattern and use Mahalanobis distance between the current observation and pattern to detect anomalies.…”
Section: Prior Workmentioning
confidence: 99%
“…These and more are proofs that simply using spam detectors in e-mails to solve spam in VoIP is not the right solution [11].…”
Section: Spitmentioning
confidence: 99%
“…However, the current generation of telephone sets do not provide an option to give feedback of a call to service provider's system. Sengar et al [18] used callers calling behavior (day and time of calling, call duration etc.) to detect an onslaught of spam attack.…”
Section: Related Workmentioning
confidence: 99%