Towards Measuring the Effectiveness of Telephony Blacklists

Presented on February 9, 2018 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116W.

[1]  Adam Doupé,et al.  SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[2]  Wenyuan Xu,et al.  You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[3]  Don R. Hush,et al.  Network constraints and multi-objective optimization for one-class classification , 1996, Neural Networks.

[4]  Aurélien Francillon,et al.  SoK: Fraud in Telephony Networks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[5]  Nan Jiang,et al.  Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis , 2012, MobiSys '12.

[6]  Che-Wei Huang,et al.  FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection , 2015, KDD.

[7]  Xiao Su,et al.  Detection and filtering Spam over Internet Telephony — a user-behavior-aware intermediate-network-based approach , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[8]  Mark Collier,et al.  Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions , 2006 .

[9]  Juan Enrique Ramos,et al.  Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .

[10]  Ram Dantu,et al.  Detecting Spam in VoIP Networks , 2005, SRUTI.

[11]  Patrick Traynor,et al.  AuthentiCall: Efficient Identity and Content Authentication for Phone Calls , 2017, USENIX Security Symposium.

[12]  Ramana Rao Kompella,et al.  PhishNet: Predictive Blacklisting to Detect Phishing Attacks , 2010, 2010 Proceedings IEEE INFOCOM.

[13]  Daniel Povey,et al.  The Kaldi Speech Recognition Toolkit , 2011 .

[14]  Aurélien Francillon,et al.  The role of phone numbers in understanding cyber-crime schemes , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[15]  Adam Doupé,et al.  Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation , 2016, 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT).

[16]  Vincent D. Blondel,et al.  A survey of results on mobile phone datasets analysis , 2015, EPJ Data Science.

[17]  Nick Feamster,et al.  Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.

[18]  José María Gómez Hidalgo,et al.  Content based SMS spam filtering , 2006, DocEng '06.

[19]  Patrick Traynor,et al.  PinDr0p: using single-ended audio features to determine call provenance , 2010, CCS '10.

[20]  Danah Boyd,et al.  Detecting Spam in a Twitter Network , 2009, First Monday.

[21]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[22]  Roger Piqueras Jover,et al.  Crime scene investigation: SMS spam data analysis , 2012, IMC '12.

[23]  Martín Abadi,et al.  Heat-seeking honeypots: design and experience , 2011, WWW.

[24]  Andrew McCallum,et al.  Optimizing Semantic Coherence in Topic Models , 2011, EMNLP.

[25]  Qiang Yang,et al.  SMS Spam Detection Using Noncontent Features , 2012, IEEE Intelligent Systems.

[26]  Jens Grossklags,et al.  “Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).

[27]  Nick Nikiforakis,et al.  Dial One for Scam: A Large-Scale Analysis of Technical Support Scams , 2016, NDSS.

[28]  Patrick Traynor,et al.  AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels , 2016, USENIX Security Symposium.

[29]  Terry Nelms Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud , 2017 .

[30]  Mustaque Ahamad,et al.  Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.

[31]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[32]  Nick Feamster,et al.  Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.

[33]  Vern Paxson,et al.  On the Potential of Proactive Domain Blacklisting , 2010, LEET.

[34]  Hyung-Jong Kim,et al.  DEVS-Based modeling of VoIP spam callers' behavior for SPIT level calculation , 2009, Simul. Model. Pract. Theory.

[35]  Roberta Presta,et al.  An anomaly-based approach to the analysis of the social behavior of VoIP users , 2013, Comput. Networks.

[36]  Nick Feamster,et al.  Can DNS-Based Blacklists Keep Up with Bots? , 2006, CEAS.

[37]  Haesun Park,et al.  CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation , 2007, CEAS.

[38]  Christian Rossow,et al.  Empirical research of IP blacklists , 2008, ISSE.

[39]  T. Landauer,et al.  Indexing by Latent Semantic Analysis , 1990 .