This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
SDRS: A Voice-over-IP Spam Detection and Reaction System
November/December 2008 (vol. 6 no. 6)
pp. 52-59
Bertrand Mathieu, Orange Labs
Saverio Niccolini, NEC Laboratories Europe
Dorgham Sisalem, Tekelec
As with email, SIP-based services such as voice over IP or instant messaging can distribute information to numerous recipients at low cost. With SIP's increased popularity, it's reasonable to expect that, also similar to email, the level of spam over Internet telephony (SPIT) will increase in the coming years. To enable VoIP service providers to detect and react to SPIT calls, the authors present a SPIT Detection and Reaction System that incorporates multiple detection methods. To enable a higher flexibility and customization level, the system takes into account operators' and users' policies for identifying and reacting to SPIT calls.

1. J. Rosenberg et al., SIP: Session Initiation Protocol, IETF RFC 3261 (updates: 3265, 3853), June 2002; www.ietf.org/rfcrfc3261.txt.
2. B. McCarty, "Botnets: Big and Bigger," IEEE Security &Privacy, vol. 1, no. 4, 2003, pp. 87–90.
3. S. Niccolini et al., "SIP Extensions for SPIT Identification," IETF Internet draft, work in progress, 23 Feb. 2007.
4. J. Quittek et al., "Detecting SPIT Calls by Checking Human Communication Patterns," Proc. IEEE Int'l Conf. Comm. (ICC 07), IEEE Press, 2007, pp. 1979–1984.
5. V. Radhakrishan and R. Mukundan, "Voice Printing and Reachability Code (VPARC) Mechanism for SPIT," white paper, Wipro Technologies, Aug. 2005.
6. J. Peterson and C. Jennings Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP), IETF RFC 4474, Aug. 2006; www.ietf.org/rfcrfc4474.txt.
7. D. Bryan et al., , "Concepts and Terminology for Peer to Peer SIP," IETF Internet draft, work in progress, Nov. 2007.
1. J. Rosenberg and C. Jennings, The Session Initiation Protocol (SIP) and Spam, IETF RFC 5039, Jan. 2008; www.ietf.org/rfcrfc5039.txt.
2. D. Sisalem and Y. Rebahi, "SIP Service Providers and the Spam Problem, Proc. 2nd Voice Over IP Security Workshop (VSW 05), 2005; www.snocer.org/PaperSIP%20Service%20Providers%20and%20The%20Spam%20Problem_rebahi.pdf .
3. M. Hansen et al., "Developing a Legally Compliant Reachability Management System as a Countermeasure against SPIT," Proc. 3rd Voice Over IP Security Workshop (VSW 06), ACM Press, 2006; https://tepin.aiki.de/blog/uploadsspit-al.pdf .
4. D. Shin and C. Shim, "Voice Spam Control with Gray Leveling, Proc. 2nd Voice Over IP Security Workshop (VSW 05), 2005; www.vopsecurity.org/papersQovia_Voice_Spam_control_algorithm-VoIPSecurityWorkshop_5B1_5D.pdf .
5. H. Yan et al., "Incorporating Active Fingerprinting into SPIT Prevention Systems," Proc. 3rd Voice Over IP Security Workshop (VSW 06), ACM Press, 2006; http://kunwadee.googlepages.comvsw06.pdf .
6. V. Radhakrishan and R. Mukundan, "Voice Printing and Reachability Code (VPARC) Mechanism for SPIT, white paper, Wipro Technologies, Aug. 2005.
7. J. Quittek et al., "Detecting SPIT Calls by Checking Human Communication Patterns," Proc. IEEE Int'l Conf. Comm. (ICC 07), IEEE Press, 2007, pp. 1979–1984.
8. S. Jung et al., "Authentication between the Inbound Proxy and the UAS for Protecting SPIT in the Session Initiation Protocol (SIP)," IETF Internet draft, work in progress, 14 Oct. 2006.
9. S. Niccolini et al., "SIP Extensions for SPIT Identification," IETF Internet draft, work in progress, 23 Feb. 2007.

Index Terms:
SPIT, spam, VoIP, mitigation, detection, prevention, reaction, voice over IP
Citation:
Bertrand Mathieu, Saverio Niccolini, Dorgham Sisalem, "SDRS: A Voice-over-IP Spam Detection and Reaction System," IEEE Security & Privacy, vol. 6, no. 6, pp. 52-59, Nov.-Dec. 2008, doi:10.1109/MSP.2008.149
Usage of this product signifies your acceptance of the Terms of Use.