Skip to main content
Top

2018 | OriginalPaper | Chapter

SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis

Authors : Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz

Published in: Guide to Vulnerability Analysis for Computer Networks and Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Spam and unwanted content has been a significant challenge for the Internet technologies (email, social networks, search engines, etc.) for decades. However, in recent years, the advent of modern and cheap telephony technologies and larger user base (more than six billion users) has attracted scammers to use telephony for distributing unwanted content via instant messaging and calls. Detection of unwanted caller in the telephony has become challenging because the content is available only after the call has already been answered by the recipients and thus is too late to block the unwanted caller after the call has already been established. One of the interesting possibilities is to develop a telephony blacklist database using social behaviour of users towards their friends and family circle by modelling call meta-data as a weighted network graph. In this chapter, we model user’s behaviour as a weighted call graph network and identify malicious users by analysing different network features of users. To this extent, we have identified a set of features that help represent malicious and non-malicious behaviour of users in a network. We have conducted rigorous experimentation of the proposed system via its implementation with data set collected by small-scale telecommunication operator. We present the outcomes of our evaluation highlighting the efficacy of the system’s performance and identifying possible directions for future work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
The terms SPIT, SPAM, and SoT are interchangeable in the chapter.
 
Literature
1.
go back to reference Oscar Boykin P, Roychowdhury Vwani P (2005) Leveraging social networks to fight spam. IEEE Comput 38:61–68CrossRef Oscar Boykin P, Roychowdhury Vwani P (2005) Leveraging social networks to fight spam. IEEE Comput 38:61–68CrossRef
2.
go back to reference Chirita PA, Diederich J, Nejdl W (2005) MailRank: using ranking for spam detections. In: 14th ACM international conference on information and knowledge management, CIKM ’05, pp 373–380 Chirita PA, Diederich J, Nejdl W (2005) MailRank: using ranking for spam detections. In: 14th ACM international conference on information and knowledge management, CIKM ’05, pp 373–380
3.
go back to reference Lam H, Yeung D (2007) A learning approach to spam detection based on social networks. In: Proceedings of the collaboration, electronic messaging, anti-abuse and spam conference Lam H, Yeung D (2007) A learning approach to spam detection based on social networks. In: Proceedings of the collaboration, electronic messaging, anti-abuse and spam conference
4.
go back to reference Hai Wang A (2010) Don’t follow me: spam detection in twitter. In: 2010 international conference on security and cryptography (SECRYPT), pp 1–10 Hai Wang A (2010) Don’t follow me: spam detection in twitter. In: 2010 international conference on security and cryptography (SECRYPT), pp 1–10
5.
go back to reference Zheng X, Zeng Z, Chen Z, Yu Y, Rong C (2015) Detecting spammers on social networks. J Neurocomput 27–34 Zheng X, Zeng Z, Chen Z, Yu Y, Rong C (2015) Detecting spammers on social networks. J Neurocomput 27–34
6.
go back to reference Spirin N, Hanh J (2011) Survey on web spam detection: principles and algorithms. ACM SIGKDD explorations newsletter, pp 50–64 Spirin N, Hanh J (2011) Survey on web spam detection: principles and algorithms. ACM SIGKDD explorations newsletter, pp 50–64
7.
go back to reference Balasubramaniyan VA, Ahamad M, Park H (2007) CallRank: combating SPIT using call duration, social networks and global reputation. In: Fourth CEAS2007 Balasubramaniyan VA, Ahamad M, Park H (2007) CallRank: combating SPIT using call duration, social networks and global reputation. In: Fourth CEAS2007
8.
go back to reference Dantu R, Kolan P (2005) Detecting spam in VoIP networks. In: The steps to reducing unwanted traffic on the internet, Berkeley, CA, USA. USENIX, pp 31–37 Dantu R, Kolan P (2005) Detecting spam in VoIP networks. In: The steps to reducing unwanted traffic on the internet, Berkeley, CA, USA. USENIX, pp 31–37
9.
go back to reference Keromytis A (2009) A survey of voice over IP security research. Information systems security. Springer, Berlin, pp 1–17 Keromytis A (2009) A survey of voice over IP security research. Information systems security. Springer, Berlin, pp 1–17
10.
go back to reference Sengar H, Wang X, Nichols A (2012) Call behavioral analysis to thwart SPIT attacks on VoIP networks. Secur Priv Commun Netw 96:501–510CrossRef Sengar H, Wang X, Nichols A (2012) Call behavioral analysis to thwart SPIT attacks on VoIP networks. Secur Priv Commun Netw 96:501–510CrossRef
11.
go back to reference Bokharaei HK, Sahraei A, Ganjali Y, Keralapura R, Nucci A (2011) You can SPIT, but You can’t hide: spammer identification in telephony networks. In: 2011 IEEE INFOCOM, pp 41–45 Bokharaei HK, Sahraei A, Ganjali Y, Keralapura R, Nucci A (2011) You can SPIT, but You can’t hide: spammer identification in telephony networks. In: 2011 IEEE INFOCOM, pp 41–45
12.
go back to reference Opsahl T, Agneessens F, Skvoretz J (2010) Node centrality in weighted networks: generalizing degree and shortest paths. Soc Netw 32(3):245–251CrossRef Opsahl T, Agneessens F, Skvoretz J (2010) Node centrality in weighted networks: generalizing degree and shortest paths. Soc Netw 32(3):245–251CrossRef
13.
go back to reference Ehlert S, Geneiatakis D, Magedanz T (2010) Survey of network security systems to counter SIP-based denial-of-service attacks. Comput Secur 29(2):225–243CrossRef Ehlert S, Geneiatakis D, Magedanz T (2010) Survey of network security systems to counter SIP-based denial-of-service attacks. Comput Secur 29(2):225–243CrossRef
14.
go back to reference Keromytis A (2011) A comprehensive survey of voice over IP security research. IEEE Commun Surv Tutor PP(99):1–24 Keromytis A (2011) A comprehensive survey of voice over IP security research. IEEE Commun Surv Tutor PP(99):1–24
15.
go back to reference Hansen M, Hansen M, Mller J, Rohwer T, Tolkmit C, Waack H (2006) Developing a legally compliant reachability management system as a countermeasure against SPIT. In: 3rd Annual VoIP security workshop Hansen M, Hansen M, Mller J, Rohwer T, Tolkmit C, Waack H (2006) Developing a legally compliant reachability management system as a countermeasure against SPIT. In: 3rd Annual VoIP security workshop
16.
go back to reference Rosenberg J, Jennings C (2008) The session initiation protocol (SIP) and spam. RFC 5039 Rosenberg J, Jennings C (2008) The session initiation protocol (SIP) and spam. RFC 5039
17.
go back to reference Nassar M, Niccolini S, State R, Ewald T (2007) Holistic VoIP intrusion detection and prevention system. In: 1st IPTCOMM Nassar M, Niccolini S, State R, Ewald T (2007) Holistic VoIP intrusion detection and prevention system. In: 1st IPTCOMM
18.
go back to reference Zhang R, Wang X, Yang X, Jiang X (2007) Billing attacks on SIP-based VoIP systems. In: Ist USENIX workshop on offensive technologies Zhang R, Wang X, Yang X, Jiang X (2007) Billing attacks on SIP-based VoIP systems. In: Ist USENIX workshop on offensive technologies
19.
go back to reference Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743–753CrossRef Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743–753CrossRef
20.
go back to reference Spam Phone Calls Cost U.S. Small Businesses Half-Billion Dollars in Lost Productivity, Marchex Study Finds Spam Phone Calls Cost U.S. Small Businesses Half-Billion Dollars in Lost Productivity, Marchex Study Finds
21.
go back to reference US Federal Trade Commission (FTC) (2016) Blocking unwanted calls US Federal Trade Commission (FTC) (2016) Blocking unwanted calls
22.
go back to reference Kerr Jennifer C (2015) Complaints about automated calls up sharply. Accessed Aug 2015 Kerr Jennifer C (2015) Complaints about automated calls up sharply. Accessed Aug 2015
23.
go back to reference Communications Fraud Control association (CFCA) (2016) Announces results of worldwide telecom fraud survey, 01 Dec 2016 Communications Fraud Control association (CFCA) (2016) Announces results of worldwide telecom fraud survey, 01 Dec 2016
24.
go back to reference Rebahi Y, Sisalem D, Magedanz T (2006) SIP spam detection. In: ICDT ’06, pp 68–74 Rebahi Y, Sisalem D, Magedanz T (2006) SIP spam detection. In: ICDT ’06, pp 68–74
25.
go back to reference Tu H, Doupé A, Zhao Z, Ahn G (2016) SoK: everyone hates robocalls: a survey of techniques against telephone spam. In: 37th IEEE symposium on security and privacy Tu H, Doupé A, Zhao Z, Ahn G (2016) SoK: everyone hates robocalls: a survey of techniques against telephone spam. In: 37th IEEE symposium on security and privacy
26.
go back to reference Study of Mechanisms for Protection against Unsolicited Communication for IMS (PUCI) (2012) In: Release 3GPP technical specification, 3GPP Study of Mechanisms for Protection against Unsolicited Communication for IMS (PUCI) (2012) In: Release 3GPP technical specification, 3GPP
27.
go back to reference Shin D, Ahn J, Shim C (2006) Progressive multi gray-leveling: a voice spam protection algorithm. In: IEEE Network, pp 18–24 Shin D, Ahn J, Shim C (2006) Progressive multi gray-leveling: a voice spam protection algorithm. In: IEEE Network, pp 18–24
28.
go back to reference Hong Y, Kunwadee S, Hui Z, ZonYin S, Debanjan S (2006) Incorporating active fingerprinting into SPIT prevention systems. In: The 3rd annual VoIP security workshop Hong Y, Kunwadee S, Hui Z, ZonYin S, Debanjan S (2006) Incorporating active fingerprinting into SPIT prevention systems. In: The 3rd annual VoIP security workshop
29.
go back to reference Lentzen D, Grutzek G, Knospe H, Porschmann C (2011) Content-based detection and prevention of spam over IP telephony - system design, prototype and first results. In: IEEEICC2011, Japan, pp 1–5 Lentzen D, Grutzek G, Knospe H, Porschmann C (2011) Content-based detection and prevention of spam over IP telephony - system design, prototype and first results. In: IEEEICC2011, Japan, pp 1–5
30.
go back to reference Iranmanesh Seyed A, Hemant S, Haining W (2012) A voice spam filter to clean subscriber’s mailbox. In: 8th International conference on security and privacy in communication networks, pp 349–367 Iranmanesh Seyed A, Hemant S, Haining W (2012) A voice spam filter to clean subscriber’s mailbox. In: 8th International conference on security and privacy in communication networks, pp 349–367
31.
go back to reference Zhang G, Fischer-Hübner S (2011) Detecting near-duplicate SPITs in voice mailboxes using hashes. In: 14th international conference on information security, ISC’11, pp 152–167 Zhang G, Fischer-Hübner S (2011) Detecting near-duplicate SPITs in voice mailboxes using hashes. In: 14th international conference on information security, ISC’11, pp 152–167
32.
go back to reference Kolan P, Dantu R (2007) Socio-technical defense against voice spamming. ACM Trans Auton Adapt Syst 2(1) Kolan P, Dantu R (2007) Socio-technical defense against voice spamming. ACM Trans Auton Adapt Syst 2(1)
33.
go back to reference Ono K, Schulzrinne H (2009) Have i met you before?: using cross-media relations to reduce SPIT. In: 3rd IPTCOMM, pp 1–7 Ono K, Schulzrinne H (2009) Have i met you before?: using cross-media relations to reduce SPIT. In: 3rd IPTCOMM, pp 1–7
34.
go back to reference Gupta P, Srinivasan B, Balasubramaniyan V, Ahamad M (2015) Phoneypot: data-driven understanding of telephony threats. In: 20th NDSS Gupta P, Srinivasan B, Balasubramaniyan V, Ahamad M (2015) Phoneypot: data-driven understanding of telephony threats. In: 20th NDSS
35.
go back to reference Balduzzi M, Gupta P, Gu L, Gao D, Ahamad M (2016) MobiPot: understanding mobile telephony threats with honeycards. In: 11th ACM ASIACCS Balduzzi M, Gupta P, Gu L, Gao D, Ahamad M (2016) MobiPot: understanding mobile telephony threats with honeycards. In: 11th ACM ASIACCS
36.
go back to reference Consumers Union, Robocalls Keep Coming (2014) Consumers Union, Robocalls Keep Coming (2014)
37.
go back to reference Lindqvist J, Komu M (2007) Cure for spam over internet telephony. In: 4th IEEE CCNC, pp 896–900 Lindqvist J, Komu M (2007) Cure for spam over internet telephony. In: 4th IEEE CCNC, pp 896–900
38.
go back to reference Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46:80–86CrossRef Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46:80–86CrossRef
39.
go back to reference Quittek J, Niccolini S, Tartarelli S, Stiemerling M, Brunner M, Ewald T (2007) Detecting SPIT calls by checking human communication patterns. In: IEEE ICC, Scotland, pp 1979–1984 Quittek J, Niccolini S, Tartarelli S, Stiemerling M, Brunner M, Ewald T (2007) Detecting SPIT calls by checking human communication patterns. In: IEEE ICC, Scotland, pp 1979–1984
40.
go back to reference Reaves B, Blue L, Abdullah H, Vargas L, Traynor P, Shrimpton T (2017) Authenticall: efficient identity and content authentication for phone calls. In: 26th USENIX security symposium (USENIX Security 17), Vancouver, BC. USENIX Association, pp 575–592 Reaves B, Blue L, Abdullah H, Vargas L, Traynor P, Shrimpton T (2017) Authenticall: efficient identity and content authentication for phone calls. In: 26th USENIX security symposium (USENIX Security 17), Vancouver, BC. USENIX Association, pp 575–592
41.
go back to reference Banerjee N, Saklikar S, Saha S (2006) Anti-vamming trust enforcement in peer-to-peer VoIP networks. In: 2006 international conference on wireless communications and mobile computing, IWCMC ’06. ACM, pp 201–206 Banerjee N, Saklikar S, Saha S (2006) Anti-vamming trust enforcement in peer-to-peer VoIP networks. In: 2006 international conference on wireless communications and mobile computing, IWCMC ’06. ACM, pp 201–206
42.
go back to reference Sengar H, Wang X, Nichols A (2011) Thwarting spam over internet telephony (SPIT) attacks on VoIP networks. In: 19th IWQoS, pp 1–3 Sengar H, Wang X, Nichols A (2011) Thwarting spam over internet telephony (SPIT) attacks on VoIP networks. In: 19th IWQoS, pp 1–3
43.
go back to reference Vennila G, Manikandan MSK, Suresh MN (2018) Dynamic voice spammers detection using hidden markov model for voice over internet protocol network. Comput Secur 73:1–16CrossRef Vennila G, Manikandan MSK, Suresh MN (2018) Dynamic voice spammers detection using hidden markov model for voice over internet protocol network. Comput Secur 73:1–16CrossRef
44.
go back to reference Wu Y-S, Bagchi S, Singh N, Wita R (2009) Spam detection in voice- over-IP calls through semi-supervised clustering. In: 39th Annual IEEE/IFIP DSN, Portugal, pp 307–316 Wu Y-S, Bagchi S, Singh N, Wita R (2009) Spam detection in voice- over-IP calls through semi-supervised clustering. In: 39th Annual IEEE/IFIP DSN, Portugal, pp 307–316
45.
go back to reference Azad MA, Morla R (2012) Mitigating SPIT with social strength. In: 2012 IEEE TrustCom, pp 393–1398 Azad MA, Morla R (2012) Mitigating SPIT with social strength. In: 2012 IEEE TrustCom, pp 393–1398
46.
go back to reference Azad MA, Morla R (2013) Caller-Rep: detecting unwanted calls with caller social strength. Comput Secur 39(Part B):219–236CrossRef Azad MA, Morla R (2013) Caller-Rep: detecting unwanted calls with caller social strength. Comput Secur 39(Part B):219–236CrossRef
47.
go back to reference Azad MA, Morla R (2011) Multistage SPIT detection in transit VoIP. In: 19 IEEE SoftCOM, pp 1–9 Azad MA, Morla R (2011) Multistage SPIT detection in transit VoIP. In: 19 IEEE SoftCOM, pp 1–9
48.
go back to reference Sorge C, Seedorf J (2009) A provider-level reputation system for assessing the quality of SPIT mitigation algorithms. In: IEEE ICC ’09, pp 1–6 Sorge C, Seedorf J (2009) A provider-level reputation system for assessing the quality of SPIT mitigation algorithms. In: IEEE ICC ’09, pp 1–6
49.
go back to reference Bou-Harb E, Pourzandi M, Debbabi M, Assi C (2012) A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. John Wiley Secur Commun Netw Bou-Harb E, Pourzandi M, Debbabi M, Assi C (2012) A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. John Wiley Secur Commun Netw
50.
go back to reference Schmidt AU, Leicher A, Shah Y, Cha I, Guccione L (2011) Sender scorecards. IEEE Veh Technol Mag 6:52–59CrossRef Schmidt AU, Leicher A, Shah Y, Cha I, Guccione L (2011) Sender scorecards. IEEE Veh Technol Mag 6:52–59CrossRef
51.
go back to reference Azad MA, Morla R (2017) Early identification of spammers through identity linking, social network and call features. J Comput Sci 157–172 Azad MA, Morla R (2017) Early identification of spammers through identity linking, social network and call features. J Comput Sci 157–172
52.
go back to reference Azad MA, Morla R (2018) Rapid detection of spammers through collaborative information sharing across multiple service providers. Future Gener Comput Syst Azad MA, Morla R (2018) Rapid detection of spammers through collaborative information sharing across multiple service providers. Future Gener Comput Syst
53.
go back to reference Azad MA, Bag S (2017) Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network. In: Proceedings of the 32nd symposium on applied computing, pp 1711–1717 Azad MA, Bag S (2017) Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network. In: Proceedings of the 32nd symposium on applied computing, pp 1711–1717
54.
go back to reference Azad MA, Bag S, Tabassum S, Hao F (2017) privy: privacy preserving collaboration across multiple service providers to combat telecoms spam. IEEE Trans Emerg Top Comput Azad MA, Bag S, Tabassum S, Hao F (2017) privy: privacy preserving collaboration across multiple service providers to combat telecoms spam. IEEE Trans Emerg Top Comput
Metadata
Title
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis
Authors
Muhammad Ajmal Azad
Junaid Arshad
Farhan Riaz
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_10

Premium Partner