Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196553
|View full text |Cite
|
Sign up to set email alerts
|

Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…The statistics-based detection systems monitor different call statistics of the subscriber during and after the call. These approaches first collect statistics from the raw call detailed records or signaling messages and then apply data mining to characterize the behavior of the caller [128,129,130].…”
Section: Robo or Telemarketing Call Detection Systemsmentioning
confidence: 99%
“…The statistics-based detection systems monitor different call statistics of the subscriber during and after the call. These approaches first collect statistics from the raw call detailed records or signaling messages and then apply data mining to characterize the behavior of the caller [128,129,130].…”
Section: Robo or Telemarketing Call Detection Systemsmentioning
confidence: 99%
“…Therefore, given a large and distributed user population, it is reasonable to consider heavy hitters as candidate spammers. In other words, a caller ID that is reported as unknown by a significant fraction of participating smartphones satisfies the volume and diversity features used in previous work [22,23], and can be considered for blacklisting.…”
Section: Problem Definition and Approachmentioning
confidence: 91%
“…Protecting the IP address and identity of users may be achieved via other security mechanisms that are outside the scope of this work. Approach Overview According to recent work on phone blacklisting [22,23], it is clear that most spammers will tend to call a large number of users, in an attempt to identify a subset of them who may fall for a scam. Therefore, given a large and distributed user population, it is reasonable to consider heavy hitters as candidate spammers.…”
Section: Problem Definition and Approachmentioning
confidence: 99%
“…Azad et al [17] utilize the K-mean clustering algorithm to mark the caller as a spammer or a non-spammer. Liu et al [38] discovered the telephone numbers involved in spam campaigns by using the unsupervised and supervised machine learning methods along with the known spam phone numbers to find out new spammers. Sharbani et al [43] estimate the effectiveness of spam blacklists by measuring their ability to block future unwanted phone calls.…”
Section: Related Work and Motivationmentioning
confidence: 99%