Behavior-based approach to detect spam over IP telephony attacks

被引:9
|
作者
Ben Chikha, Randa Jabeur [1 ]
Abbes, Tarek [1 ]
Ben Chikha, Wassim [2 ]
Bouhoula, Adel [1 ]
机构
[1] Univ Carthage, Higher Sch Commun Tunis SupCom, Digital Secur Res Unit, Cite El Ghazala, Tunisia
[2] Carthage Univ, Tunisia Polytech Sch, SERCOM Lab, La Marsa 2078, Tunisia
关键词
VoIP; SPIT detection; Behavior-based approach; Supervised learning methods; ROC; ROC CURVE;
D O I
10.1007/s10207-015-0281-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spam over IP telephony (SPIT) is expected to become a serious problem as the use of voice over IP grows. This kind of spam is appreciated by spammers due to its effectiveness and low cost. Many anti-SPIT solutions are applied to resolve this problem but there are still limited in some cases. Thus, in this paper, we propose a system to detect SPIT attacks through behavior-based approach. Our framework operates in three steps: (1) collecting significant calls attributes by exploring and analyzing network traces using OPNET environment; (2) applying sliding windows strategy to properly maintain the callers profiles; and (3) classifying caller (i.e., legitimate or SPITter) using ten supervised learning methods: Na < veBayes, BayesNet, SMO RBFKernel, SMO PolyKernel, MultiLayerPerceptron with two and three layers, NBTree, J48, Bagging and AdaBoostM1. The results of our experiments demonstrate the great performance of these methods. Our study, based on receiver operating characteristics curves, shows that the AdaBoostM1 classifier is more efficient than the other methods and achieve an almost perfect detection rate with acceptable training time.
引用
收藏
页码:131 / 143
页数:13
相关论文
共 50 条
  • [31] A Behavior-Based Approach to the Estimation of Poverty in India
    Almas, Ingvild
    Kjelsrud, Anders
    Somanathan, Rohini
    SCANDINAVIAN JOURNAL OF ECONOMICS, 2019, 121 (01): : 182 - 224
  • [32] A Behavior-based Detection Method for Outbreaks of Low-rate Attacks
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    Takeuchi, Jun'ichi
    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 267 - 272
  • [33] BEHAVIOR-BASED CLUSTERING FOR DISCRIMINATION BETWEEN FLASH CROWDS AND DDoS ATTACKS
    Heo, Young Jun
    Oh, Jintae
    Jang, Jongsoo
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 140 - 143
  • [34] A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 79 - 89
  • [36] Privacy Pro: Spam Calls Detection Using Voice Signature Analysis and Behavior-based Filtering
    Kwong, Anne
    Muzamal, Junaid Hussain
    Khan, Zohaib
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 184 - 189
  • [37] A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks
    Agrawal, Neha
    Tapaswi, Shashikala
    2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 118 - 123
  • [38] Reducing Hospital ICU Noise: A Behavior-Based Approach
    Konkani, Avinash
    Oakley, Barbara
    Penprase, Barbara
    JOURNAL OF HEALTHCARE ENGINEERING, 2014, 5 (02) : 229 - 246
  • [39] A behavior-based approach to scheduling in distributed manufacturing systems
    Tharumarajah, A
    Wells, AJ
    INTEGRATED COMPUTER-AIDED ENGINEERING, 1997, 4 (04) : 235 - 249
  • [40] Behavior-based safety: One company's approach
    Dorchester, B
    Dave, N
    INTERNATIONAL ENGINEERING CONFERENCE, BOOKS 1-3, 1998, : 997 - 999