An investigation into defense against SPIT

Research works related to defense against Spam over Internet Telephony consist of the following categories:

#1. Machine learning. This work uses semi-supervised machine learning for detection of SPIT calls. It extends K-Means algorithm to classify the  callers. But they focus too much on the implementation of algorithm. It leverages too many features, many of which are difficult to obtain. And it rejects all the possible fraud calls, which violates the original purpose of VoIP.

 

#2. Filter model based on credits. There are some works use the interval/duration of a call to determine the callers’ and callees’ reputation. The papers consider that low-reputation customers always avoid talking too long, worrying about being discovered. I don’t think it’s a reasonable way because it costs much time to gain the victims’ belief.  Some others

 

#3. Filter model on the basis of user patterns. Namely, through the call habits (such as the frequency of incoming calls and outgoing calls), we can evaluate and establish the user’s profile of call activity, which can be used to determine the good or bad callers (e.g., as for a bad caller, he always/almost has few outgoing calls instead of incoming calls).

 

#4. Other work tries to establish a call record reservation system in the cloud, which is expensive. It proposes to implement a communication and reservation server added in the existed telephony infrastructures and then transfer the collected data into cloud to analyze.

 

In my opinion, most existed works have noticed the importance of SPIT. However, there are few works aimed at the spoofed caller id fraud. Most of them lack a detailed and specific solution. I intend to secure people from vishing with two-side protection,rejection and real-time warning. Rejection takes before alerting the callees via the mismatching between the specified caller IDs and their URIs. Real-time warning is implemented by an attestation of identified spoofed id in the attestation center in the cloud.

 

CCS’10: PinDr0p: Using Single-Ended Audio Features To Determine Call Provenance.

Research background: The current telephony infrastructure allows users to communicate using a variety of technologies, mainly classified into 3 categories: PSTN, cellular and VoIP.


Terminologies explanation

PSTN represents traditional circuit-switched telephony, which supports lossless connections and high fidelity audio.

VoIP runs on top of IP links and generally shares the same paths as all other Internet-based traffic.

Cellular can be treated as the mixture of PSTN and VoIP, namely it is the PSTN network with partial replacement of the Internet.

Voice is encoded and decoded in each of these networks using a variety of codecs and they use different codecs. Thus, transition of these codecs take place frequently.

 

Research Issue: The diversification of telephony technologies admits a call data transfer without verification, namely call ID spoofing,which can be exploited by scammers to criminalize victims.

 

Research Solution: This paper aims at identifying the provenance of a call. The authors believe that the data loss of these codecs transitions can be manipulated by the scammers although they can modify the phone number.Thus, they analyze the data loss of the call data while being transformed among different telephony networks. And then use neural algorithm to classify the call provenance by the data loss profile.

 

One interesting method is that they measure data loss by conserving the energy trace of the signal instead of analyzing the datagram. Namely, it’s sometime convenient to obtain one’s profile in another perspective. Energy. Energy!

人类对于信息的表征和处理是一个复杂的过程,需要进行计算机的研究来进一步探索。 基于计算机的研究方式,可以帮助我们理解人类对于信息的表征方式,以及信息的处理方式。首先,我们可以通过计算机模拟人类信息的表征过程,根据人们的神经网络等相关数据构建模型,进而研究大脑中的信息存储和激活机制。这样的计算模型可以通过模拟神经网络的联结和活动来近似人类大脑的信息处理过程。 其次,我们还可以利用计算机技术来实验和观测人类的信息处理行为。通过收集大量的实验数据,我们可以使用计算机对这些数据进行分析和建模,以了解人类在不同认知任务中的信息处理机制。计算机能够对大数据进行快速处理和分析,从而帮助我们理解人类在认知任务中的表征方式。 此外,计算机技术还可以帮助人类解决一些特定的认知问题。比如,利用机器学习算法和人工智能技术,我们可以构建能够模拟人类认知过程的计算机程序,从而解决一些复杂的认知任务。这种基于计算机的研究方法可以提供新的视角和方法来理解人类的认知过程。 综上所述,通过计算机的研究方法,我们可以更深入地探索人类对于信息的表征和处理方式。计算机模拟和实验观测是两种主要的研究手段,它们可以帮助我们揭示人类认知的基本原理,同时也为解决一些实际的认知问题提供了新的思路和方法。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值