Lentzen et al., 2011 - Google Patents
Content-based detection and prevention of spam over IP telephony-system design, prototype and first resultsLentzen et al., 2011
- Document ID
- 5211919911560302760
- Author
- Lentzen D
- Grutzek G
- Knospe H
- Porschmann C
- Publication year
- Publication venue
- 2011 IEEE International Conference on Communications (ICC)
External Links
Snippet
Spam over IP-telephony (SPIT) may emerge as a major threat requiring effective protection mechanisms. A number of anti-SPIT frameworks have been proposed in the last years. These are mainly based on call pattern and signaling analysis as well as caller reputation …
- 238000001514 detection method 0 title description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/56—Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1066—Session control
- H04L65/1076—Screening
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/40—Electronic components, circuits, software, systems or apparatus used in telephone systems using speech recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Interconnection arrangements between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
- H04M7/0078—Security; Fraud detection; Fraud prevention
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/18—Comparators
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lentzen et al. | Content-based detection and prevention of spam over IP telephony-system design, prototype and first results | |
US11818164B2 (en) | System and method for omnichannel social engineering attack avoidance | |
US11948553B2 (en) | Systems and methods of speaker-independent embedding for identification and verification from audio | |
Prasad et al. | Who's calling? characterizing robocalls through audio and metadata analysis | |
Azad et al. | Rapid detection of spammers through collaborative information sharing across multiple service providers | |
Strobl et al. | An efficient search method for the content-based identification of telephone-SPAM | |
Iranmanesh et al. | A voice spam filter to clean subscribers’ mailbox | |
Bäckström | Privacy in speech technology | |
Azad et al. | Clustering VoIP caller for SPIT identification | |
Zhang et al. | Detecting near-duplicate spits in voice mailboxes using hashes | |
Mathov et al. | Stop bugging me! Evading modern-day wiretapping using adversarial perturbations | |
Vennila et al. | Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network | |
Prasad et al. | Characterizing Robocalls with Multiple Vantage Points | |
Lentzen | Cologne University of Applied Sciences, Germany Email: d. lentzen@ gesid. com,{gary. grutzek| heiko. knospe| christoph. poerschmann}@ fh-koeln. de Abstract—Spam over IP telephony (SPIT) may emerge as a major threat requiring effective protection | |
Vaidya et al. | Whisper: A unilateral defense against voip traffic re-identification attacks | |
US20250291899A1 (en) | Diffusion-based audio purification for defending against adversarial deepfake attacks | |
US20250029614A1 (en) | Centralized synthetic speech detection system using watermarking | |
Azad et al. | ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph | |
Jeevitha et al. | A review on voice over internet protocol on conference call with mobile phone | |
Rebahi et al. | A SPIT Detection Mechanism Based on Audio Analysis. | |
Çinar | Voip Security in Public Networks | |
HK40077150A (en) | System and method for social engineering identification and alerting | |
HK40077150B (en) | System and method for social engineering identification and alerting | |
Azad et al. | Caller-Centrality: Identifying Telemarketers in a VoIP Network | |
Ajmal Azad et al. | ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph |