2015
DOI: 10.2197/ipsjjip.23.81
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Clustering-based SPITters Detection Scheme

Abstract: VoIP/SIP is taking place of conventional telephony because of very low call charge but it is also attractive for SPITters who advertise or spread phishing calls toward many callees. Although there exist many feature-based SPIT detection methods, none of them provides the flexibility against multiple features and thus complex threshold settings and training phases cannot be avoided. In this paper, we propose an unsupervised and threshold-free SPITters detection scheme based on a clustering algorithm. Our scheme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Owing to the exponential growth of the spam calls, researchers have paved various ways for mitigating the SPIT calls using various techniques such as policy based, turing test based, reputation based, payment at risk, Completely Automated Public Turing test to tell the Computers and Humans Apart (CAPTCHA), machine learning algorithms based and content based over the period of 2006 to 2015 …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Owing to the exponential growth of the spam calls, researchers have paved various ways for mitigating the SPIT calls using various techniques such as policy based, turing test based, reputation based, payment at risk, Completely Automated Public Turing test to tell the Computers and Humans Apart (CAPTCHA), machine learning algorithms based and content based over the period of 2006 to 2015 …”
Section: Related Workmentioning
confidence: 99%
“…These methods extract appropriate features from both legitimate and spam callers and store them in a training set. Then, the training set is applied to machine learning algorithms in association with a test set to classify the unknown class using pre‐defined set of rules . However, some of the spammers are judged as legitimate user because of the misclassification nature of the machine learning algorithms.…”
Section: Related Workmentioning
confidence: 99%