Unsupervised Clustering-based SPITters Detection Scheme

VoIP /SIP is taking place of conventional telephony because of very low call charge but it is also attractive for SPITters who advertise or spread phishing calls toward many callees. Although there exist many feature-based SPIT detection methods, none of them provides the flexibility against multiple features and thus complex threshold settings and training phases cannot be avoided. In this paper, we propose an unsupervised and threshold-free SPITters detection scheme based on a clustering algorithm. Our scheme does not use multiple features directly to trap SPITters but uses them to find the dissimilarity among each caller pair and tries to separate the callers into a SPITters cluster and a legitimate one based on the dissimilarity. By computer simulation, we show that the combination of Random Forests dissimilarity and PAM clustering brings the best classification accuracy and our scheme works well when the SPITters account for more than 20% of the entire caller.

[1]  Jiawei Han,et al.  Efficient and Effective Clustering Methods for Spatial Data Mining , 1994, VLDB.

[2]  Andy Liaw,et al.  Classification and Regression by randomForest , 2007 .

[3]  Hai Huang,et al.  A SPIT Detection Method Using Voice Activity Analysis , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[4]  Xiao Su,et al.  Adaptive Voice Spam Control with User Behavior Analysis , 2009, 2009 11th IEEE International Conference on High Performance Computing and Communications.

[5]  Heiko Knospe,et al.  An efficient search method for the content-based identification of telephone-SPAM , 2012, 2012 IEEE International Conference on Communications (ICC).

[6]  Eric Y. Chen,et al.  Using Call Patterns to Detect Unwanted Communication Callers , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.

[7]  Etienne Huens,et al.  Data for Development: the D4D Challenge on Mobile Phone Data , 2012, ArXiv.

[8]  Paul Judge,et al.  VISOR: VoIP Security Using Reputation , 2008, 2008 IEEE International Conference on Communications.

[9]  Iwao Sasase,et al.  SPIT callers detection with unsupervised Random Forests classifier , 2013, 2013 IEEE International Conference on Communications (ICC).

[10]  James Irvine,et al.  Nodobo: Mobile Phone as a Software Sensor for Social Network Research , 2011, 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring).

[11]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[12]  Xinyuan Wang,et al.  Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks , 2011, SecureComm.

[13]  Antonio Nucci,et al.  You can SPIT, but you can't hide: Spammer identification in telephony networks , 2011, 2011 Proceedings IEEE INFOCOM.

[14]  S. Horvath,et al.  Unsupervised Learning With Random Forest Predictors , 2006 .

[15]  Mohammad Hossein Yaghmaee Moghaddam,et al.  New method for evaluating anti-SPIT in VoIP networks , 2013, ICCKE 2013.

[16]  Gregory Blanc,et al.  Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships , 2011, 2011 IEEE/IPSJ International Symposium on Applications and the Internet.

[17]  Jürgen Quittek,et al.  Detecting SPIT Calls by Checking Human Communication Patterns , 2007, 2007 IEEE International Conference on Communications.

[18]  Fei Wang,et al.  Voice Spam Detecting Technique Based on User Behavior Pattern Model , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[19]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[20]  Suguru Yamaguchi,et al.  Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships , 2013, J. Inf. Process..

[21]  Haesun Park,et al.  CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation , 2007, CEAS.

[22]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[23]  Ulrich Dieter,et al.  Discrete Optimization Approximating k-cuts using network strength as a Lagrangean relaxation , 2000 .

[24]  Dongwook Shin,et al.  Progressive multi gray-leveling: a voice spam protection algorithm , 2006, IEEE Network.

[25]  Saverio Niccolini,et al.  Simulation and Optimization of SPIT Detection Frameworks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[26]  Angelos D. Keromytis,et al.  A Comprehensive Survey of Voice over IP Security Research , 2012, IEEE Communications Surveys & Tutorials.

[27]  Ali S. Hadi,et al.  Finding Groups in Data: An Introduction to Chster Analysis , 1991 .

[28]  Muhammad Ajmal Azad,et al.  Caller-REP: Detecting unwanted calls with caller social strength , 2013, Comput. Secur..

[29]  Christoph Pörschmann,et al.  Content-Based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results , 2011, 2011 IEEE International Conference on Communications (ICC).