Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23176
|View full text |Cite
|
Sign up to set email alerts
|

Phoneypot: Data-driven Understanding of Telephony Threats

Abstract: Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to craft attacks that are being used to scam unsuspecting users who have traditionally trusted the telephone. It is necessary to better understand telephony threats to effectively combat them. Although there exist crowd sourced complaint datasets about telephony abuse, such complaints are often filed after a user receives multiple calls over a period of time, and sometimes they lack important information. We believe honey… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
31
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(35 citation statements)
references
References 26 publications
4
31
0
Order By: Relevance
“…Similarly, the two other lines are drawn by considering incoming calls of TouchPal users and all benign users. From the figure, we observe a long tail distribution, which is consistent with earlier reports using a [15]. However, we observe that the tails of malicious call numbers and TouchPal users are significantly higher than benign phone numbers.…”
Section: E Phone Number Distributions Based On Incoming Call Volume supporting
confidence: 90%
See 3 more Smart Citations
“…Similarly, the two other lines are drawn by considering incoming calls of TouchPal users and all benign users. From the figure, we observe a long tail distribution, which is consistent with earlier reports using a [15]. However, we observe that the tails of malicious call numbers and TouchPal users are significantly higher than benign phone numbers.…”
Section: E Phone Number Distributions Based On Incoming Call Volume supporting
confidence: 90%
“…We attribute this to the fact that only less than 700 call records are collected in [9], and thus the results in [9] may not be statistically robust. On the other hand, similar observations have been made based on US's data [15], though some details are different. For example, the hourly call volume histogram from [15] looks more similar to Figure 4a All above observations suggest that the call time may be a useful indicator to distinguish malicious calls from benign ones.…”
Section: Call Distribution Across Different Dates and Timesupporting
confidence: 69%
See 2 more Smart Citations
“…There are surveys on mobile applications such as secure messaging systems [12] and mobile operating systems, e. g., Android [13]. On the other hand, there are generic Internet security surveys [14] and telephony security contributions focusing on fraud attacks [15], [16], [17].…”
Section: Introductionmentioning
confidence: 99%