Detection and prevention of spam over Internet telephony in Voice over Internet Protocol networks using Markov chain with incremental SVM

This paper is mainly focused on the detection and prevention of the spammers such as telemarketing callers in Voice over Internet Protocol networks. The existing spam over Internet telephony SPIT detection mechanisms use call characteristics features such as reputation rate, call rejection rate, and user feedback that might increase the computation overhead and communication overhead. In this paper, a 2-tier model is proposed and implemented for detecting, preventing, and mitigating SPIT callers. The 2-tier model consists of a Markov chain MC and an incremental support vector machine ISVM. The MC, in the first tier, detects the telemarketing callers, whereas the ISVM classifier in the second tier segregates these callers from the legitimate users. Also, the ISVM gradually mitigates the arrival of telemarketing callers at the recipient side. The performance of the proposed MC-ISVM classifier is tested using an experimental test bed, and the results show that the 2-tier model reports a promising blockage probability rate of 0.9 against spammers with a false positive rate of less than 0.01.

[1]  Dongwook Shin,et al.  Progressive multi gray-leveling: a voice spam protection algorithm , 2006, IEEE Network.

[2]  J. Gruber,et al.  A Comparison of Measured and Calculated Speech Temporal Parameters Relevant to Speech Activity Detection , 1982, IEEE Trans. Commun..

[3]  Dimitris Gritzalis,et al.  A SIP-oriented SPIT Management Framework , 2008, Comput. Secur..

[4]  Dimitris Gritzalis,et al.  A Formally Verified Mechanism for Countering SPIT , 2010, CRITIS.

[5]  Antonio Nucci,et al.  You can SPIT, but you can't hide: Spammer identification in telephony networks , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Chin-Laung Lei,et al.  Detecting VoIP Traffic Based on Human Conversation Patterns , 2008, IPTComm.

[7]  Damien Ernst,et al.  Outbound SPIT filter with optimal performance guarantees , 2012, Comput. Networks.

[8]  M. Brunner,et al.  ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework , 2006, IEEE Globecom 2006.

[9]  Adel Bouhoula,et al.  A SPIT detection algorithm based on user's call behavior , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).

[10]  Christoph Pörschmann,et al.  Content-Based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results , 2011, 2011 IEEE International Conference on Communications (ICC).

[11]  Jung-Shian Li,et al.  VoIP secure session assistance and call monitoring via building security gateway , 2011, Int. J. Commun. Syst..

[12]  Christian Callegari,et al.  Security and delay issues in SIP systems , 2009 .

[13]  Radu State,et al.  Labeled VoIP Data-Set for Intrusion Detection Evaluation , 2010, EUNICE.

[14]  Benxiong Huang,et al.  ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks , 2010, The Journal of Supercomputing.

[15]  David J. Parish,et al.  Prevention of SPIT using the concept of access number (AN) , 2007 .

[16]  Dimitris Gritzalis,et al.  A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication , 2014, J. Comput. Secur..

[17]  Dimitris Gritzalis,et al.  An Adaptive Policy-Based Approach to SPIT Management , 2008, ESORICS.

[18]  Muhammad Ali Akbar,et al.  Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony , 2012, Knowledge and Information Systems.

[19]  A. Belghith,et al.  A distributed cooperative detection scheme for SPIT attacks in SIP based systems , 2012, 2012 Third International Conference on The Network of the Future (NOF).

[20]  Dimitris Gritzalis,et al.  Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony , 2010, Comput. Secur..

[21]  Haining Wang,et al.  A Voice Spam Filter to Clean Subscribers' Mailbox , 2012, SecureComm.

[22]  Jürgen Quittek,et al.  Detecting SPIT Calls by Checking Human Communication Patterns , 2007, 2007 IEEE International Conference on Communications.

[23]  Haesun Park,et al.  CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation , 2007, CEAS.

[24]  Adel Bouhoula,et al.  Behavior-based approach to detect spam over IP telephony attacks , 2015, International Journal of Information Security.

[25]  Hyung-Jong Kim,et al.  DEVS-Based modeling of VoIP spam callers' behavior for SPIT level calculation , 2009, Simul. Model. Pract. Theory.

[26]  Giannis F. Marias,et al.  SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT) , 2011, J. Comput. Secur..

[27]  Antonio Ruiz-Martínez,et al.  A lightweight payment scheme for real-time services based on SIP , 2012, EURASIP Journal on Wireless Communications and Networking.

[28]  Dimitris Gritzalis,et al.  Formal analysis for robust anti-SPIT protection using model checking , 2012, International Journal of Information Security.

[29]  Fei Wang,et al.  A Speaker Recognition Based Approach for Identifying Voice Spammer , 2012, WISM.

[30]  Ming-Yang Su,et al.  Using data mining approaches to identify voice over IP spam , 2015, Int. J. Commun. Syst..

[31]  Dorgham Sisalem,et al.  SDRS: A Voice-over-IP Spam Detection and Reaction System , 2008, IEEE Security & Privacy.

[32]  Iwao Sasase,et al.  Unsupervised Clustering-based SPITters Detection Scheme , 2015, J. Inf. Process..

[33]  Giannis F. Marias,et al.  SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment , 2007, 2007 16th International Conference on Computer Communications and Networks.

[34]  Muhammad Ajmal Azad,et al.  Caller-REP: Detecting unwanted calls with caller social strength , 2013, Comput. Secur..

[35]  Jinyoung Ahn,et al.  Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm , 2008, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.

[36]  Bettina Schnor,et al.  A SPIT Avoidance Workflow for SIP-Provider , 2012, ICON 2012.