2011 IEEE International Conference on Communications (ICC) 2011
DOI: 10.1109/icc.2011.5963108
|View full text |Cite
|
Sign up to set email alerts
|

Content-Based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…Session initiation protocol (SIP) and real‐time protocol have been widely used session establishment between the caller and the callee, and exchange of voice signals between caller and the callee. The content‐based approaches either analyse content of SIP signalling messages or analyse real‐time protocol contents in a real and a non‐real time . The speech processing requires sophisticated system and signal processing resources for analysing the speech content in real time, and also requires system resources for storing updated voice data sample for pattern matching.…”
Section: Spit Mitigation Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Session initiation protocol (SIP) and real‐time protocol have been widely used session establishment between the caller and the callee, and exchange of voice signals between caller and the callee. The content‐based approaches either analyse content of SIP signalling messages or analyse real‐time protocol contents in a real and a non‐real time . The speech processing requires sophisticated system and signal processing resources for analysing the speech content in real time, and also requires system resources for storing updated voice data sample for pattern matching.…”
Section: Spit Mitigation Schemesmentioning
confidence: 99%
“…Several approaches have been designed for combating the SPIT callers in a telephone network. These approaches can be grouped into following categories: (i) a content‐based approach that processes the speech stream flowing between caller and the callee on fly and block callers if stream is found to be containing unwanted message ; (ii) a list‐based approach that maintains a database of blacked, white, and under observation users ; (iii) a turing and CAPTCHA test‐based approaches that asks caller to solve a specific challenge ; and (iv) a reputation‐based systems that computes reputation of the caller by obtaining feedback from the callee or uses information from the call detail records (CDRs) .…”
Section: Introductionmentioning
confidence: 99%
“…Owing to the exponential growth of the spam calls, researchers have paved various ways for mitigating the SPIT calls using various techniques such as policy based, turing test based, reputation based, payment at risk, Completely Automated Public Turing test to tell the Computers and Humans Apart (CAPTCHA), machine learning algorithms based and content based over the period of 2006 to 2015 …”
Section: Related Workmentioning
confidence: 99%
“…The studies in [19][20] propose a content-based identification mechanism for VoIP SPAM. These studies rely on an analysis of the audio content of the VoIP call.…”
Section: Introductionmentioning
confidence: 99%