Behavior-based approach to detect spam over IP telephony attacks

被引:9
|
作者
Ben Chikha, Randa Jabeur [1 ]
Abbes, Tarek [1 ]
Ben Chikha, Wassim [2 ]
Bouhoula, Adel [1 ]
机构
[1] Univ Carthage, Higher Sch Commun Tunis SupCom, Digital Secur Res Unit, Cite El Ghazala, Tunisia
[2] Carthage Univ, Tunisia Polytech Sch, SERCOM Lab, La Marsa 2078, Tunisia
关键词
VoIP; SPIT detection; Behavior-based approach; Supervised learning methods; ROC; ROC CURVE;
D O I
10.1007/s10207-015-0281-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spam over IP telephony (SPIT) is expected to become a serious problem as the use of voice over IP grows. This kind of spam is appreciated by spammers due to its effectiveness and low cost. Many anti-SPIT solutions are applied to resolve this problem but there are still limited in some cases. Thus, in this paper, we propose a system to detect SPIT attacks through behavior-based approach. Our framework operates in three steps: (1) collecting significant calls attributes by exploring and analyzing network traces using OPNET environment; (2) applying sliding windows strategy to properly maintain the callers profiles; and (3) classifying caller (i.e., legitimate or SPITter) using ten supervised learning methods: Na < veBayes, BayesNet, SMO RBFKernel, SMO PolyKernel, MultiLayerPerceptron with two and three layers, NBTree, J48, Bagging and AdaBoostM1. The results of our experiments demonstrate the great performance of these methods. Our study, based on receiver operating characteristics curves, shows that the AdaBoostM1 classifier is more efficient than the other methods and achieve an almost perfect detection rate with acceptable training time.
引用
收藏
页码:131 / 143
页数:13
相关论文
共 50 条
  • [21] Artificial immune system inspired behavior-based anti-spam filter
    Yue, Xun
    Abraham, Ajith
    Chi, Zhong-Xian
    Hao, Yan-You
    Mo, Hongwei
    SOFT COMPUTING, 2007, 11 (08) : 729 - 740
  • [22] Replacement attacks: automatically evading behavior-based software birthmark
    Xin, Zhi
    Chen, Huiyu
    Wang, Xinche
    Liu, Peng
    Zhu, Sencun
    Mao, Bing
    Xie, Li
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (05) : 293 - 304
  • [23] A behavior-based anti-spam technology based on immune-inspired clustering algorithm
    Yue, X
    Chi, ZX
    Yu, ZB
    SOFT COMPUTING AS TRANSDISCIPLINARY SCIENCE AND TECHNOLOGY, 2005, : 213 - 222
  • [24] An approach to detect TCP/IP based attack
    Ugtakhbayar, N.
    Usukhbayar, B.
    Nyamjav, J.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 37 - 40
  • [25] A Behavior-Based Approach for Educational Robotics Activities
    De Cristoforis, Pablo
    Pedre, Sol
    Nitsche, Matias
    Fischer, Thomas
    Pessacg, Facundo
    Di Pietro, Carlos
    IEEE TRANSACTIONS ON EDUCATION, 2013, 56 (01) : 61 - 66
  • [26] Behavior-Based Approach for User Interests Prediction
    Amri, Chayma
    Bambia, Mariem
    Faiz, Rim
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 541 - 548
  • [27] A behavior-based approach to securing email systems
    Stolfo, SJ
    Hershkop, S
    Wang, K
    Nimeskern, O
    Hu, CW
    COMPUTER NETWORK SECURITY, 2003, 2776 : 57 - 81
  • [28] A hierarchical behavior-based approach to manipulation tasks
    Wasik, Z
    Saffiotti, A
    2003 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOLS 1-3, PROCEEDINGS, 2003, : 2780 - 2785
  • [29] Spam Detection with Complex-Valued Neural Network using Behavior-based Characteristics
    Hu, Jun
    Li, Zhitang
    Hu, Zhengbing
    Yao, Dezhong
    Yu, Junfeng
    SECOND INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING: WGEC 2008, PROCEEDINGS, 2008, : 166 - 169
  • [30] BEHAVIOR OF THE ETHERNET NETWORK WITH TCP/IP PROTOCOL BASED ON SPAM MAILS
    Martinez Tapia, Sofia Virginia
    TELEMATIQUE, 2006, 5 (01): : 73 - U164