Have I met you before?: using cross-media relations to reduce SPIT

Most legitimate calls are from persons or organizations with strong social ties such as friends. Some legitimate calls, however, are from those with weak social ties such as a restaurant the callee booked a table on-line. Since a callee's contact list usually contains only the addresses of persons or organizations with strong social ties, filtering out unsolicited calls using the contact list is prone to false positives. To reduce these false positives, we first analyzed call logs and identified that legitimate calls are initiated from persons or organizations with weak social ties through transactions over the web or email exchanges. This paper proposes two approaches to label incoming calls by using cross-media relations to prior contact. One approach is that a potential caller offers the callee his contact addresses which might be used in future calls. Another is that a callee provides a potential caller with weakly-secret information. In order to be identified as someone the callee contacted before through other means, the caller can convey the information in future calls. The latter approach enables a callee to label incoming calls even without caller identifiers. Reducing false positives during filtering using our proposed approaches will contribute to the reduction in SPIT (SPam over Internet Telephony).

[1]  Tim Howes,et al.  Lightweight Directory Access Protocol , 1995, RFC.

[2]  Roy T. Fielding,et al.  Uniform Resource Identifier (URI): Generic Syntax , 2005, RFC.

[3]  Peter W. Resnick,et al.  Internet Message Format , 2001, RFC.

[4]  Jim Sermersheim,et al.  Lightweight Directory Access Protocol (LDAP): The Protocol , 2006, RFC.

[5]  Kenneth Murchison,et al.  Sieve Email Filtering: Subaddress Extension , 2008, RFC.

[6]  References , 1971 .

[7]  Tim Howes,et al.  vCard MIME Directory Profile , 1998, RFC.

[8]  Ram Dantu,et al.  Detecting Spam in VoIP Networks , 2005, SRUTI.

[9]  Cullen Jennings,et al.  The Session Initiation Protocol (SIP) and Spam , 2008, RFC.

[10]  Gonzalo Camarillo,et al.  A Framework for Consent-Based Communications in the Session Initiation Protocol (SIP) , 2008, RFC.

[11]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[12]  Haesun Park,et al.  CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation , 2007, CEAS.

[13]  Roy T. Fielding,et al.  Uniform Resource Identifiers (URI): Generic Syntax , 1998, RFC.

[14]  Mark R. Crispin Internet Message Access Protocol - Version 4rev1 , 1996, RFC.

[15]  Eric Rescorla,et al.  HTTP Over TLS , 2000, RFC.

[16]  Henning Schulzrinne,et al.  HTTP Header for Future Correspondence Addresses , 2007 .

[17]  Jon Peterson,et al.  Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP) , 2006, RFC.

[18]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[19]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[20]  Henning Schulzrinne,et al.  The tel URI for Telephone Numbers , 2004, RFC.

[21]  Robert J. Sparks,et al.  The Session Initiation Protocol (SIP) Refer Method , 2003, RFC.

[22]  Clemens Heinrich,et al.  Transport Layer Security (TLS) , 2011, Encyclopedia of Cryptography and Security.

[23]  Jürgen Quittek,et al.  Detecting SPIT Calls by Checking Human Communication Patterns , 2007, 2007 IEEE International Conference on Communications.