Skip to main content

2018 | OriginalPaper | Buchkapitel

SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis

verfasst von : Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz

Erschienen in: Guide to Vulnerability Analysis for Computer Networks and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Spam and unwanted content has been a significant challenge for the Internet technologies (email, social networks, search engines, etc.) for decades. However, in recent years, the advent of modern and cheap telephony technologies and larger user base (more than six billion users) has attracted scammers to use telephony for distributing unwanted content via instant messaging and calls. Detection of unwanted caller in the telephony has become challenging because the content is available only after the call has already been answered by the recipients and thus is too late to block the unwanted caller after the call has already been established. One of the interesting possibilities is to develop a telephony blacklist database using social behaviour of users towards their friends and family circle by modelling call meta-data as a weighted network graph. In this chapter, we model user’s behaviour as a weighted call graph network and identify malicious users by analysing different network features of users. To this extent, we have identified a set of features that help represent malicious and non-malicious behaviour of users in a network. We have conducted rigorous experimentation of the proposed system via its implementation with data set collected by small-scale telecommunication operator. We present the outcomes of our evaluation highlighting the efficacy of the system’s performance and identifying possible directions for future work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The terms SPIT, SPAM, and SoT are interchangeable in the chapter.
 
Literatur
1.
Zurück zum Zitat Oscar Boykin P, Roychowdhury Vwani P (2005) Leveraging social networks to fight spam. IEEE Comput 38:61–68CrossRef Oscar Boykin P, Roychowdhury Vwani P (2005) Leveraging social networks to fight spam. IEEE Comput 38:61–68CrossRef
2.
Zurück zum Zitat Chirita PA, Diederich J, Nejdl W (2005) MailRank: using ranking for spam detections. In: 14th ACM international conference on information and knowledge management, CIKM ’05, pp 373–380 Chirita PA, Diederich J, Nejdl W (2005) MailRank: using ranking for spam detections. In: 14th ACM international conference on information and knowledge management, CIKM ’05, pp 373–380
3.
Zurück zum Zitat Lam H, Yeung D (2007) A learning approach to spam detection based on social networks. In: Proceedings of the collaboration, electronic messaging, anti-abuse and spam conference Lam H, Yeung D (2007) A learning approach to spam detection based on social networks. In: Proceedings of the collaboration, electronic messaging, anti-abuse and spam conference
4.
Zurück zum Zitat Hai Wang A (2010) Don’t follow me: spam detection in twitter. In: 2010 international conference on security and cryptography (SECRYPT), pp 1–10 Hai Wang A (2010) Don’t follow me: spam detection in twitter. In: 2010 international conference on security and cryptography (SECRYPT), pp 1–10
5.
Zurück zum Zitat Zheng X, Zeng Z, Chen Z, Yu Y, Rong C (2015) Detecting spammers on social networks. J Neurocomput 27–34 Zheng X, Zeng Z, Chen Z, Yu Y, Rong C (2015) Detecting spammers on social networks. J Neurocomput 27–34
6.
Zurück zum Zitat Spirin N, Hanh J (2011) Survey on web spam detection: principles and algorithms. ACM SIGKDD explorations newsletter, pp 50–64 Spirin N, Hanh J (2011) Survey on web spam detection: principles and algorithms. ACM SIGKDD explorations newsletter, pp 50–64
7.
Zurück zum Zitat Balasubramaniyan VA, Ahamad M, Park H (2007) CallRank: combating SPIT using call duration, social networks and global reputation. In: Fourth CEAS2007 Balasubramaniyan VA, Ahamad M, Park H (2007) CallRank: combating SPIT using call duration, social networks and global reputation. In: Fourth CEAS2007
8.
Zurück zum Zitat Dantu R, Kolan P (2005) Detecting spam in VoIP networks. In: The steps to reducing unwanted traffic on the internet, Berkeley, CA, USA. USENIX, pp 31–37 Dantu R, Kolan P (2005) Detecting spam in VoIP networks. In: The steps to reducing unwanted traffic on the internet, Berkeley, CA, USA. USENIX, pp 31–37
9.
Zurück zum Zitat Keromytis A (2009) A survey of voice over IP security research. Information systems security. Springer, Berlin, pp 1–17 Keromytis A (2009) A survey of voice over IP security research. Information systems security. Springer, Berlin, pp 1–17
10.
Zurück zum Zitat Sengar H, Wang X, Nichols A (2012) Call behavioral analysis to thwart SPIT attacks on VoIP networks. Secur Priv Commun Netw 96:501–510CrossRef Sengar H, Wang X, Nichols A (2012) Call behavioral analysis to thwart SPIT attacks on VoIP networks. Secur Priv Commun Netw 96:501–510CrossRef
11.
Zurück zum Zitat Bokharaei HK, Sahraei A, Ganjali Y, Keralapura R, Nucci A (2011) You can SPIT, but You can’t hide: spammer identification in telephony networks. In: 2011 IEEE INFOCOM, pp 41–45 Bokharaei HK, Sahraei A, Ganjali Y, Keralapura R, Nucci A (2011) You can SPIT, but You can’t hide: spammer identification in telephony networks. In: 2011 IEEE INFOCOM, pp 41–45
12.
Zurück zum Zitat Opsahl T, Agneessens F, Skvoretz J (2010) Node centrality in weighted networks: generalizing degree and shortest paths. Soc Netw 32(3):245–251CrossRef Opsahl T, Agneessens F, Skvoretz J (2010) Node centrality in weighted networks: generalizing degree and shortest paths. Soc Netw 32(3):245–251CrossRef
13.
Zurück zum Zitat Ehlert S, Geneiatakis D, Magedanz T (2010) Survey of network security systems to counter SIP-based denial-of-service attacks. Comput Secur 29(2):225–243CrossRef Ehlert S, Geneiatakis D, Magedanz T (2010) Survey of network security systems to counter SIP-based denial-of-service attacks. Comput Secur 29(2):225–243CrossRef
14.
Zurück zum Zitat Keromytis A (2011) A comprehensive survey of voice over IP security research. IEEE Commun Surv Tutor PP(99):1–24 Keromytis A (2011) A comprehensive survey of voice over IP security research. IEEE Commun Surv Tutor PP(99):1–24
15.
Zurück zum Zitat Hansen M, Hansen M, Mller J, Rohwer T, Tolkmit C, Waack H (2006) Developing a legally compliant reachability management system as a countermeasure against SPIT. In: 3rd Annual VoIP security workshop Hansen M, Hansen M, Mller J, Rohwer T, Tolkmit C, Waack H (2006) Developing a legally compliant reachability management system as a countermeasure against SPIT. In: 3rd Annual VoIP security workshop
16.
Zurück zum Zitat Rosenberg J, Jennings C (2008) The session initiation protocol (SIP) and spam. RFC 5039 Rosenberg J, Jennings C (2008) The session initiation protocol (SIP) and spam. RFC 5039
17.
Zurück zum Zitat Nassar M, Niccolini S, State R, Ewald T (2007) Holistic VoIP intrusion detection and prevention system. In: 1st IPTCOMM Nassar M, Niccolini S, State R, Ewald T (2007) Holistic VoIP intrusion detection and prevention system. In: 1st IPTCOMM
18.
Zurück zum Zitat Zhang R, Wang X, Yang X, Jiang X (2007) Billing attacks on SIP-based VoIP systems. In: Ist USENIX workshop on offensive technologies Zhang R, Wang X, Yang X, Jiang X (2007) Billing attacks on SIP-based VoIP systems. In: Ist USENIX workshop on offensive technologies
19.
Zurück zum Zitat Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743–753CrossRef Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743–753CrossRef
20.
Zurück zum Zitat Spam Phone Calls Cost U.S. Small Businesses Half-Billion Dollars in Lost Productivity, Marchex Study Finds Spam Phone Calls Cost U.S. Small Businesses Half-Billion Dollars in Lost Productivity, Marchex Study Finds
21.
Zurück zum Zitat US Federal Trade Commission (FTC) (2016) Blocking unwanted calls US Federal Trade Commission (FTC) (2016) Blocking unwanted calls
22.
Zurück zum Zitat Kerr Jennifer C (2015) Complaints about automated calls up sharply. Accessed Aug 2015 Kerr Jennifer C (2015) Complaints about automated calls up sharply. Accessed Aug 2015
23.
Zurück zum Zitat Communications Fraud Control association (CFCA) (2016) Announces results of worldwide telecom fraud survey, 01 Dec 2016 Communications Fraud Control association (CFCA) (2016) Announces results of worldwide telecom fraud survey, 01 Dec 2016
24.
Zurück zum Zitat Rebahi Y, Sisalem D, Magedanz T (2006) SIP spam detection. In: ICDT ’06, pp 68–74 Rebahi Y, Sisalem D, Magedanz T (2006) SIP spam detection. In: ICDT ’06, pp 68–74
25.
Zurück zum Zitat Tu H, Doupé A, Zhao Z, Ahn G (2016) SoK: everyone hates robocalls: a survey of techniques against telephone spam. In: 37th IEEE symposium on security and privacy Tu H, Doupé A, Zhao Z, Ahn G (2016) SoK: everyone hates robocalls: a survey of techniques against telephone spam. In: 37th IEEE symposium on security and privacy
26.
Zurück zum Zitat Study of Mechanisms for Protection against Unsolicited Communication for IMS (PUCI) (2012) In: Release 3GPP technical specification, 3GPP Study of Mechanisms for Protection against Unsolicited Communication for IMS (PUCI) (2012) In: Release 3GPP technical specification, 3GPP
27.
Zurück zum Zitat Shin D, Ahn J, Shim C (2006) Progressive multi gray-leveling: a voice spam protection algorithm. In: IEEE Network, pp 18–24 Shin D, Ahn J, Shim C (2006) Progressive multi gray-leveling: a voice spam protection algorithm. In: IEEE Network, pp 18–24
28.
Zurück zum Zitat Hong Y, Kunwadee S, Hui Z, ZonYin S, Debanjan S (2006) Incorporating active fingerprinting into SPIT prevention systems. In: The 3rd annual VoIP security workshop Hong Y, Kunwadee S, Hui Z, ZonYin S, Debanjan S (2006) Incorporating active fingerprinting into SPIT prevention systems. In: The 3rd annual VoIP security workshop
29.
Zurück zum Zitat Lentzen D, Grutzek G, Knospe H, Porschmann C (2011) Content-based detection and prevention of spam over IP telephony - system design, prototype and first results. In: IEEEICC2011, Japan, pp 1–5 Lentzen D, Grutzek G, Knospe H, Porschmann C (2011) Content-based detection and prevention of spam over IP telephony - system design, prototype and first results. In: IEEEICC2011, Japan, pp 1–5
30.
Zurück zum Zitat Iranmanesh Seyed A, Hemant S, Haining W (2012) A voice spam filter to clean subscriber’s mailbox. In: 8th International conference on security and privacy in communication networks, pp 349–367 Iranmanesh Seyed A, Hemant S, Haining W (2012) A voice spam filter to clean subscriber’s mailbox. In: 8th International conference on security and privacy in communication networks, pp 349–367
31.
Zurück zum Zitat Zhang G, Fischer-Hübner S (2011) Detecting near-duplicate SPITs in voice mailboxes using hashes. In: 14th international conference on information security, ISC’11, pp 152–167 Zhang G, Fischer-Hübner S (2011) Detecting near-duplicate SPITs in voice mailboxes using hashes. In: 14th international conference on information security, ISC’11, pp 152–167
32.
Zurück zum Zitat Kolan P, Dantu R (2007) Socio-technical defense against voice spamming. ACM Trans Auton Adapt Syst 2(1) Kolan P, Dantu R (2007) Socio-technical defense against voice spamming. ACM Trans Auton Adapt Syst 2(1)
33.
Zurück zum Zitat Ono K, Schulzrinne H (2009) Have i met you before?: using cross-media relations to reduce SPIT. In: 3rd IPTCOMM, pp 1–7 Ono K, Schulzrinne H (2009) Have i met you before?: using cross-media relations to reduce SPIT. In: 3rd IPTCOMM, pp 1–7
34.
Zurück zum Zitat Gupta P, Srinivasan B, Balasubramaniyan V, Ahamad M (2015) Phoneypot: data-driven understanding of telephony threats. In: 20th NDSS Gupta P, Srinivasan B, Balasubramaniyan V, Ahamad M (2015) Phoneypot: data-driven understanding of telephony threats. In: 20th NDSS
35.
Zurück zum Zitat Balduzzi M, Gupta P, Gu L, Gao D, Ahamad M (2016) MobiPot: understanding mobile telephony threats with honeycards. In: 11th ACM ASIACCS Balduzzi M, Gupta P, Gu L, Gao D, Ahamad M (2016) MobiPot: understanding mobile telephony threats with honeycards. In: 11th ACM ASIACCS
36.
Zurück zum Zitat Consumers Union, Robocalls Keep Coming (2014) Consumers Union, Robocalls Keep Coming (2014)
37.
Zurück zum Zitat Lindqvist J, Komu M (2007) Cure for spam over internet telephony. In: 4th IEEE CCNC, pp 896–900 Lindqvist J, Komu M (2007) Cure for spam over internet telephony. In: 4th IEEE CCNC, pp 896–900
38.
Zurück zum Zitat Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46:80–86CrossRef Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46:80–86CrossRef
39.
Zurück zum Zitat Quittek J, Niccolini S, Tartarelli S, Stiemerling M, Brunner M, Ewald T (2007) Detecting SPIT calls by checking human communication patterns. In: IEEE ICC, Scotland, pp 1979–1984 Quittek J, Niccolini S, Tartarelli S, Stiemerling M, Brunner M, Ewald T (2007) Detecting SPIT calls by checking human communication patterns. In: IEEE ICC, Scotland, pp 1979–1984
40.
Zurück zum Zitat Reaves B, Blue L, Abdullah H, Vargas L, Traynor P, Shrimpton T (2017) Authenticall: efficient identity and content authentication for phone calls. In: 26th USENIX security symposium (USENIX Security 17), Vancouver, BC. USENIX Association, pp 575–592 Reaves B, Blue L, Abdullah H, Vargas L, Traynor P, Shrimpton T (2017) Authenticall: efficient identity and content authentication for phone calls. In: 26th USENIX security symposium (USENIX Security 17), Vancouver, BC. USENIX Association, pp 575–592
41.
Zurück zum Zitat Banerjee N, Saklikar S, Saha S (2006) Anti-vamming trust enforcement in peer-to-peer VoIP networks. In: 2006 international conference on wireless communications and mobile computing, IWCMC ’06. ACM, pp 201–206 Banerjee N, Saklikar S, Saha S (2006) Anti-vamming trust enforcement in peer-to-peer VoIP networks. In: 2006 international conference on wireless communications and mobile computing, IWCMC ’06. ACM, pp 201–206
42.
Zurück zum Zitat Sengar H, Wang X, Nichols A (2011) Thwarting spam over internet telephony (SPIT) attacks on VoIP networks. In: 19th IWQoS, pp 1–3 Sengar H, Wang X, Nichols A (2011) Thwarting spam over internet telephony (SPIT) attacks on VoIP networks. In: 19th IWQoS, pp 1–3
43.
Zurück zum Zitat Vennila G, Manikandan MSK, Suresh MN (2018) Dynamic voice spammers detection using hidden markov model for voice over internet protocol network. Comput Secur 73:1–16CrossRef Vennila G, Manikandan MSK, Suresh MN (2018) Dynamic voice spammers detection using hidden markov model for voice over internet protocol network. Comput Secur 73:1–16CrossRef
44.
Zurück zum Zitat Wu Y-S, Bagchi S, Singh N, Wita R (2009) Spam detection in voice- over-IP calls through semi-supervised clustering. In: 39th Annual IEEE/IFIP DSN, Portugal, pp 307–316 Wu Y-S, Bagchi S, Singh N, Wita R (2009) Spam detection in voice- over-IP calls through semi-supervised clustering. In: 39th Annual IEEE/IFIP DSN, Portugal, pp 307–316
45.
Zurück zum Zitat Azad MA, Morla R (2012) Mitigating SPIT with social strength. In: 2012 IEEE TrustCom, pp 393–1398 Azad MA, Morla R (2012) Mitigating SPIT with social strength. In: 2012 IEEE TrustCom, pp 393–1398
46.
Zurück zum Zitat Azad MA, Morla R (2013) Caller-Rep: detecting unwanted calls with caller social strength. Comput Secur 39(Part B):219–236CrossRef Azad MA, Morla R (2013) Caller-Rep: detecting unwanted calls with caller social strength. Comput Secur 39(Part B):219–236CrossRef
47.
Zurück zum Zitat Azad MA, Morla R (2011) Multistage SPIT detection in transit VoIP. In: 19 IEEE SoftCOM, pp 1–9 Azad MA, Morla R (2011) Multistage SPIT detection in transit VoIP. In: 19 IEEE SoftCOM, pp 1–9
48.
Zurück zum Zitat Sorge C, Seedorf J (2009) A provider-level reputation system for assessing the quality of SPIT mitigation algorithms. In: IEEE ICC ’09, pp 1–6 Sorge C, Seedorf J (2009) A provider-level reputation system for assessing the quality of SPIT mitigation algorithms. In: IEEE ICC ’09, pp 1–6
49.
Zurück zum Zitat Bou-Harb E, Pourzandi M, Debbabi M, Assi C (2012) A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. John Wiley Secur Commun Netw Bou-Harb E, Pourzandi M, Debbabi M, Assi C (2012) A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. John Wiley Secur Commun Netw
50.
Zurück zum Zitat Schmidt AU, Leicher A, Shah Y, Cha I, Guccione L (2011) Sender scorecards. IEEE Veh Technol Mag 6:52–59CrossRef Schmidt AU, Leicher A, Shah Y, Cha I, Guccione L (2011) Sender scorecards. IEEE Veh Technol Mag 6:52–59CrossRef
51.
Zurück zum Zitat Azad MA, Morla R (2017) Early identification of spammers through identity linking, social network and call features. J Comput Sci 157–172 Azad MA, Morla R (2017) Early identification of spammers through identity linking, social network and call features. J Comput Sci 157–172
52.
Zurück zum Zitat Azad MA, Morla R (2018) Rapid detection of spammers through collaborative information sharing across multiple service providers. Future Gener Comput Syst Azad MA, Morla R (2018) Rapid detection of spammers through collaborative information sharing across multiple service providers. Future Gener Comput Syst
53.
Zurück zum Zitat Azad MA, Bag S (2017) Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network. In: Proceedings of the 32nd symposium on applied computing, pp 1711–1717 Azad MA, Bag S (2017) Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network. In: Proceedings of the 32nd symposium on applied computing, pp 1711–1717
54.
Zurück zum Zitat Azad MA, Bag S, Tabassum S, Hao F (2017) privy: privacy preserving collaboration across multiple service providers to combat telecoms spam. IEEE Trans Emerg Top Comput Azad MA, Bag S, Tabassum S, Hao F (2017) privy: privacy preserving collaboration across multiple service providers to combat telecoms spam. IEEE Trans Emerg Top Comput
Metadaten
Titel
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis
verfasst von
Muhammad Ajmal Azad
Junaid Arshad
Farhan Riaz
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_10