2008
DOI: 10.1109/mcom.2008.4597108
|View full text |Cite
|
Sign up to set email alerts
|

On Spam over Internet Telephony (SPIT) Prevention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(22 citation statements)
references
References 7 publications
0
22
0
Order By: Relevance
“…In the case of spam e-mails, which cause the bulk of e-mail traffic, the Spam over Internet Telephony (SPIT) [17] system uses blacklists and whitelists to filter undesired e-mails -this is considered an adequate solution to the problem. Since similar threats are expected to occur in large-scale networks that are based on the IP Multimedia Subsystem (IMS), the 3rd Generation Partnership Project (3GPP) has been working on the standardization of SPIT-similar solutions, so-called protection against unsolicited communication over IMS (PUCI) [18].…”
Section: Related Workmentioning
confidence: 99%
“…In the case of spam e-mails, which cause the bulk of e-mail traffic, the Spam over Internet Telephony (SPIT) [17] system uses blacklists and whitelists to filter undesired e-mails -this is considered an adequate solution to the problem. Since similar threats are expected to occur in large-scale networks that are based on the IP Multimedia Subsystem (IMS), the 3rd Generation Partnership Project (3GPP) has been working on the standardization of SPIT-similar solutions, so-called protection against unsolicited communication over IMS (PUCI) [18].…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation focuses on scalability, by measuring the response time to calls as call volumes increase. A similar architecture, with some additional components, is described by Quittek et al [55] and later extended [56].…”
Section: D) Captchas and Puzzles (4 Items)mentioning
confidence: 99%
“…Such a framework is presented in (Quittek et al, 2008). The idea is that at each layer of processing, a call can be classified into one of three classes-a valid call which is passed onto the receiver, a spam call which is rejected, or an undecided call which is passed onto the next stages of processing.…”
Section: Framework For Spit Preventionmentioning
confidence: 99%
“…7, No. 7;2013 The framework proposed by Quittek et al (2008) consists of three layers. Stage 3 above is not considered in the framework, since it is really an ancillary part of white lists and does not involve a voice call.…”
Section: Framework For Spit Preventionmentioning
confidence: 99%