2021
DOI: 10.3390/electronics10030353
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Nuisance Calls over Internet Telephony Using Caller Reputation

Abstract: Internet telephony permit callers to manage self-asserted profiles without any subscription contract nor identification proof. These cost-free services have attracted many telemarketers and spammers who generate unsolicited nuisance calls. Upon detection, they simply rejoin the network with a new identity to continue their malicious activities. Nuisance calls are highly disruptive when compared to email and social spam. They not only include annoying telemarketing calls but also contain scam and voice phishing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…The reputation model developed by Javed et al [4] was aimed at detecting spam callers in a network. The caller's reputation was computed in a hybrid manner by considering call features such as call density, call duration, and call rate from CDRs as well as recommendations from reliable callers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The reputation model developed by Javed et al [4] was aimed at detecting spam callers in a network. The caller's reputation was computed in a hybrid manner by considering call features such as call density, call duration, and call rate from CDRs as well as recommendations from reliable callers.…”
Section: Related Workmentioning
confidence: 99%
“…According to the Cisco report, the number of networked devices will be about 29 billion by 2023 [3]. Meanwhile, VoIP users have become vulnerable to many attacks, such as SPIT detection [4]. SPIT is mostly used to promote items, annoy subscribers, induce users to call special numbers, or conduct vishing attempts to obtain private information from call participants [5].…”
Section: Introductionmentioning
confidence: 99%
“…Voice over Internet Protocols (VoIPs) are becoming increasingly popular, and Spam over IP Telephony (SPIT) is expected to become an increasingly serious issue in the near future. These nuisance calls are considered far more bothersome than messages or social spam since they are produced in real-time and have a much greater impact on productivity [1]. There exists a means of transmitting unsolicited calls over the traditional Public Switched Telephone Volume 14 (2022), Issue 6 Network (PSTN), where such calls are commonly initiated by telemarketers.…”
Section: Introductionmentioning
confidence: 99%
“…The cost of sending SPIT is about three orders of magnitude less than traditional PSTN telemarketer calls. Thus, the pricing structure of Internet telephony remains a significant contributor to its growth [1].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the web-based IdM allows users to create self-asserted profiles without performing any identity proofing. Therefore, identity theft is becoming common on web applications to commit scams and frauds [7,8]. Furthermore, centralized IdM has several weaknesses in ensuring data security and privacy [9].…”
Section: Introductionmentioning
confidence: 99%