DEVS-Based modeling of VoIP spam callers' behavior for SPIT level calculation

Abstract At the present time the VoIP (Voice over Internet Protocol) service is generally accepted as an alternative for people seeking cheaper means to make a phone call. Users of VoIP service may fall anywhere along a spectrum between types at two extremes: one of which is an ordinary caller who doesn’t use the telephone for commercial purposes, while the other is a person who generates spam calls for commercial purposes. The focus of this paper concerns modeling of spam callers’ behavior to calculate the SPIT (Spam over Internet Telephony) level for management of the quality of service. From the perspective of a VoIP service provider’s view, spam callers are also a type of customer and sometimes they are valuable for increasing revenue. However, if a service provider does not manage spam calls, it can harm their business, because ordinary users might not receive phone calls using the phone numbers of the VoIP service. Thus, there is a trade-off between revenues and usability in managing spam calls in the VoIP service. This work presents a model of spam caller’s behavior using the DEVS (Discrete Event System Specification) formalism. The DEVS formalism is applicable as a model of behavior, by defining the state and state transition of the target of the model. In our model, we use six main parameters to define the states and state transitions. Each state is represented by a number which indicates the SPIT level of a caller. If the value is 1.0 then the caller is more similar to a spam caller. Based on the model definition, we constructed a SPIT level Calculation UI (User Interface) that is used to manage spam calls to improve VoIP service quality.

[1]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[2]  Bernard P. Zeigler,et al.  Multifacetted Modelling and Discrete Event Simulation , 1984 .

[3]  Eric Noel,et al.  Initial Simulation Results That Analyze SIP Based VoIP Networks Under Overload , 2007, International Teletraffic Congress.

[4]  Saverio Niccolini,et al.  Signaling TO Prevent SPIT (SPITSTOP) Reference Scenario , 2008 .

[5]  David Schwartz SPAM for Internet Telephony (SPIT) Prevention using the Security Assertion Markup Language (SAML) , 2006 .

[6]  Haesun Park,et al.  CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation , 2007, CEAS.

[7]  Joseph D. Langford,et al.  Models for analysis of packet voice communications systems , 1986, IEEE J. Sel. Areas Commun..

[8]  Khaled Salah,et al.  An OPNET-based simulation approach for deploying VoIP , 2006, Int. J. Netw. Manag..

[9]  Yufen Jiang Performance evaluation of SIP based voice conferencing over the IEEE 802.11 wireless networks , 2006 .

[10]  Bernard P. Zeigler,et al.  Theory of modeling and simulation , 1976 .

[11]  Cullen Jennings,et al.  The Session Initiation Protocol (SIP) and Spam , 2008, RFC.

[12]  Benxiong Huang,et al.  P2P-AVS: P2P Based Cooperative VoIP Spam Filtering , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[13]  Bernard P. Zeigler,et al.  Object-oriented simulation with hierarchical, modular models , 1990 .

[14]  Vanu G. Bose Opportunities and challenges in software radio design for interference management , 2006, Int. J. Netw. Manag..