Behavior-based approach to detect spam over IP telephony attacks

被引:9
|
作者
Ben Chikha, Randa Jabeur [1 ]
Abbes, Tarek [1 ]
Ben Chikha, Wassim [2 ]
Bouhoula, Adel [1 ]
机构
[1] Univ Carthage, Higher Sch Commun Tunis SupCom, Digital Secur Res Unit, Cite El Ghazala, Tunisia
[2] Carthage Univ, Tunisia Polytech Sch, SERCOM Lab, La Marsa 2078, Tunisia
关键词
VoIP; SPIT detection; Behavior-based approach; Supervised learning methods; ROC; ROC CURVE;
D O I
10.1007/s10207-015-0281-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spam over IP telephony (SPIT) is expected to become a serious problem as the use of voice over IP grows. This kind of spam is appreciated by spammers due to its effectiveness and low cost. Many anti-SPIT solutions are applied to resolve this problem but there are still limited in some cases. Thus, in this paper, we propose a system to detect SPIT attacks through behavior-based approach. Our framework operates in three steps: (1) collecting significant calls attributes by exploring and analyzing network traces using OPNET environment; (2) applying sliding windows strategy to properly maintain the callers profiles; and (3) classifying caller (i.e., legitimate or SPITter) using ten supervised learning methods: Na < veBayes, BayesNet, SMO RBFKernel, SMO PolyKernel, MultiLayerPerceptron with two and three layers, NBTree, J48, Bagging and AdaBoostM1. The results of our experiments demonstrate the great performance of these methods. Our study, based on receiver operating characteristics curves, shows that the AdaBoostM1 classifier is more efficient than the other methods and achieve an almost perfect detection rate with acceptable training time.
引用
收藏
页码:131 / 143
页数:13
相关论文
共 50 条
  • [1] Behavior-based approach to detect spam over IP telephony attacks
    Randa Jabeur Ben Chikha
    Tarek Abbes
    Wassim Ben Chikha
    Adel Bouhoula
    International Journal of Information Security, 2016, 15 : 131 - 143
  • [2] Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
    Muhammad Ali Akbar
    Muddassar Farooq
    Knowledge and Information Systems, 2014, 38 : 491 - 510
  • [3] Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
    Akbar, Muhammad Ali
    Farooq, Muddassar
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 38 (02) : 491 - 510
  • [4] Prevention of spam over IP telephony (SPIT)
    Quittek, Juergen
    Niccolini, Saverio
    Tartarelli, Sandra
    Schlegel, Roman
    NEC TECHNICAL JOURNAL, 2006, 1 (02): : 114 - 119
  • [5] Risk Management for Spam over IP Telephony using Combined Countermeasures
    Ben Chikha, R. Jabeur
    Abbes, Tarek
    Bouhoula, Adel
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 240 - 246
  • [6] Spam Over IP Telephony prevention using Dendritic Cell Algorithm
    Srihari, V.
    Kalpana, P.
    Anitha, R.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [7] Risk Management for Spam over IP Telephony using Optimal Countermeasure
    Ben Chikha, Randa Jabeur
    Abbes, Tarek
    Bouhoula, Adel
    2016 INTERNATIONAL CONFERENCE ON DIGITAL ECONOMY (ICDEC), 2016, : 53 - 59
  • [8] Securing Behavior-based Opinion Spam Detection
    Ge, Shuaijun
    Ma, Guixiang
    Xie, Sihong
    Yu, Philip S.
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 112 - 117
  • [9] Detection and Filtering Spam over Internet Telephony - A User-behavior-aware Intermediate-network-based Approach
    Bai, Yan
    Su, Xiao
    Bhargava, Bharat
    ICME: 2009 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-3, 2009, : 726 - +
  • [10] Content-based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results
    Lentzen, Dirk
    Grutzek, Gary
    Knospe, Heiko
    Poerschmann, Christoph
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,