[go: up one dir, main page]

Lentzen et al., 2011 - Google Patents

Content-based detection and prevention of spam over IP telephony-system design, prototype and first results

Lentzen et al., 2011

Document ID
5211919911560302760
Author
Lentzen D
Grutzek G
Knospe H
Porschmann C
Publication year
Publication venue
2011 IEEE International Conference on Communications (ICC)

External Links

Snippet

Spam over IP-telephony (SPIT) may emerge as a major threat requiring effective protection mechanisms. A number of anti-SPIT frameworks have been proposed in the last years. These are mainly based on call pattern and signaling analysis as well as caller reputation …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/56Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1066Session control
    • H04L65/1076Screening
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/40Electronic components, circuits, software, systems or apparatus used in telephone systems using speech recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Interconnection arrangements between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/18Comparators
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges

Similar Documents

Publication Publication Date Title
Lentzen et al. Content-based detection and prevention of spam over IP telephony-system design, prototype and first results
US11818164B2 (en) System and method for omnichannel social engineering attack avoidance
US11948553B2 (en) Systems and methods of speaker-independent embedding for identification and verification from audio
Prasad et al. Who's calling? characterizing robocalls through audio and metadata analysis
Azad et al. Rapid detection of spammers through collaborative information sharing across multiple service providers
Strobl et al. An efficient search method for the content-based identification of telephone-SPAM
Iranmanesh et al. A voice spam filter to clean subscribers’ mailbox
Bäckström Privacy in speech technology
Azad et al. Clustering VoIP caller for SPIT identification
Zhang et al. Detecting near-duplicate spits in voice mailboxes using hashes
Mathov et al. Stop bugging me! Evading modern-day wiretapping using adversarial perturbations
Vennila et al. Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network
Prasad et al. Characterizing Robocalls with Multiple Vantage Points
Lentzen Cologne University of Applied Sciences, Germany Email: d. lentzen@ gesid. com,{gary. grutzek| heiko. knospe| christoph. poerschmann}@ fh-koeln. de Abstract—Spam over IP telephony (SPIT) may emerge as a major threat requiring effective protection
Vaidya et al. Whisper: A unilateral defense against voip traffic re-identification attacks
US20250291899A1 (en) Diffusion-based audio purification for defending against adversarial deepfake attacks
US20250029614A1 (en) Centralized synthetic speech detection system using watermarking
Azad et al. ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph
Jeevitha et al. A review on voice over internet protocol on conference call with mobile phone
Rebahi et al. A SPIT Detection Mechanism Based on Audio Analysis.
Çinar Voip Security in Public Networks
HK40077150A (en) System and method for social engineering identification and alerting
HK40077150B (en) System and method for social engineering identification and alerting
Azad et al. Caller-Centrality: Identifying Telemarketers in a VoIP Network
Ajmal Azad et al. ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph