{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:19Z","timestamp":1740099139474,"version":"3.37.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319926230"},{"type":"electronic","value":"9783319926247"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92624-7_10","type":"book-chapter","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T06:46:11Z","timestamp":1536043571000},"page":"235-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis"],"prefix":"10.1007","author":[{"given":"Muhammad Ajmal","family":"Azad","sequence":"first","affiliation":[]},{"given":"Junaid","family":"Arshad","sequence":"additional","affiliation":[]},{"given":"Farhan","family":"Riaz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,5]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MC.2005.132","volume":"38","author":"P Oscar Boykin","year":"2005","unstructured":"Oscar Boykin P, Roychowdhury Vwani P (2005) Leveraging social networks to fight spam. IEEE Comput 38:61\u201368","journal-title":"IEEE Comput"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Chirita PA, Diederich J, Nejdl W (2005) MailRank: using ranking for spam detections. In: 14th ACM international conference on information and knowledge management, CIKM \u201905, pp 373\u2013380","DOI":"10.1145\/1099554.1099671"},{"key":"10_CR3","unstructured":"Lam H, Yeung D (2007) A learning approach to spam detection based on social networks. In: Proceedings of the collaboration, electronic messaging, anti-abuse and spam conference"},{"key":"10_CR4","unstructured":"Hai Wang A (2010) Don\u2019t follow me: spam detection in twitter. In: 2010 international conference on security and cryptography (SECRYPT), pp 1\u201310"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Zheng X, Zeng Z, Chen Z, Yu Y, Rong C (2015) Detecting spammers on social networks. J Neurocomput 27\u201334","DOI":"10.1016\/j.neucom.2015.02.047"},{"key":"10_CR6","unstructured":"Spirin N, Hanh J (2011) Survey on web spam detection: principles and algorithms. ACM SIGKDD explorations newsletter, pp 50\u201364"},{"key":"10_CR7","unstructured":"Balasubramaniyan VA, Ahamad M, Park H (2007) CallRank: combating SPIT using call duration, social networks and global reputation. In: Fourth CEAS2007"},{"key":"10_CR8","unstructured":"Dantu R, Kolan P (2005) Detecting spam in VoIP networks. In: The steps to reducing unwanted traffic on the internet, Berkeley, CA, USA. USENIX, pp 31\u201337"},{"key":"10_CR9","first-page":"1","volume-title":"Information systems security","author":"A Keromytis","year":"2009","unstructured":"Keromytis A (2009) A survey of voice over IP security research. Information systems security. Springer, Berlin, pp 1\u201317"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-642-31909-9_31","volume":"96","author":"H Sengar","year":"2012","unstructured":"Sengar H, Wang X, Nichols A (2012) Call behavioral analysis to thwart SPIT attacks on VoIP networks. Secur Priv Commun Netw 96:501\u2013510","journal-title":"Secur Priv Commun Netw"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Bokharaei HK, Sahraei A, Ganjali Y, Keralapura R, Nucci A (2011) You can SPIT, but You can\u2019t hide: spammer identification in telephony networks. In: 2011 IEEE INFOCOM, pp 41\u201345","DOI":"10.1109\/INFCOM.2011.5935195"},{"issue":"3","key":"10_CR12","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.socnet.2010.03.006","volume":"32","author":"T Opsahl","year":"2010","unstructured":"Opsahl T, Agneessens F, Skvoretz J (2010) Node centrality in weighted networks: generalizing degree and shortest paths. Soc Netw 32(3):245\u2013251","journal-title":"Soc Netw"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.cose.2009.09.004","volume":"29","author":"S Ehlert","year":"2010","unstructured":"Ehlert S, Geneiatakis D, Magedanz T (2010) Survey of network security systems to counter SIP-based denial-of-service attacks. Comput Secur 29(2):225\u2013243","journal-title":"Comput Secur"},{"issue":"99","key":"10_CR14","first-page":"1","volume":"PP","author":"A Keromytis","year":"2011","unstructured":"Keromytis A (2011) A comprehensive survey of voice over IP security research. IEEE Commun Surv Tutor PP(99):1\u201324","journal-title":"IEEE Commun Surv Tutor"},{"key":"10_CR15","unstructured":"Hansen M, Hansen M, Mller J, Rohwer T, Tolkmit C, Waack H (2006) Developing a legally compliant reachability management system as a countermeasure against SPIT. In: 3rd Annual VoIP security workshop"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Rosenberg J, Jennings C (2008) The session initiation protocol (SIP) and spam. RFC 5039","DOI":"10.17487\/rfc5039"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Nassar M, Niccolini S, State R, Ewald T (2007) Holistic VoIP intrusion detection and prevention system. In: 1st IPTCOMM","DOI":"10.1145\/1326304.1326306"},{"key":"10_CR18","unstructured":"Zhang R, Wang X, Yang X, Jiang X (2007) Billing attacks on SIP-based VoIP systems. In: Ist USENIX workshop on offensive technologies"},{"issue":"8","key":"10_CR19","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1016\/j.cose.2009.05.003","volume":"28","author":"R Dantu","year":"2009","unstructured":"Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743\u2013753","journal-title":"Comput Secur"},{"key":"10_CR20","unstructured":"Spam Phone Calls Cost U.S. Small Businesses Half-Billion Dollars in Lost Productivity, Marchex Study Finds"},{"key":"10_CR21","unstructured":"US Federal Trade Commission (FTC) (2016) Blocking unwanted calls"},{"key":"10_CR22","unstructured":"Kerr Jennifer C (2015) Complaints about automated calls up sharply. Accessed Aug 2015"},{"key":"10_CR23","unstructured":"Communications Fraud Control association (CFCA) (2016) Announces results of worldwide telecom fraud survey, 01 Dec 2016"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Rebahi Y, Sisalem D, Magedanz T (2006) SIP spam detection. In: ICDT \u201906, pp 68\u201374","DOI":"10.1109\/ICDT.2006.69"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Tu H, Doup\u00e9 A, Zhao Z, Ahn G (2016) SoK: everyone hates robocalls: a survey of techniques against telephone spam. In: 37th IEEE symposium on security and privacy","DOI":"10.1109\/SP.2016.27"},{"key":"10_CR26","unstructured":"Study of Mechanisms for Protection against Unsolicited Communication for IMS (PUCI) (2012) In: Release 3GPP technical specification, 3GPP"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Shin D, Ahn J, Shim C (2006) Progressive multi gray-leveling: a voice spam protection algorithm. In: IEEE Network, pp 18\u201324","DOI":"10.1109\/MNET.2006.1705879"},{"key":"10_CR28","unstructured":"Hong Y, Kunwadee S, Hui Z, ZonYin S, Debanjan S (2006) Incorporating active fingerprinting into SPIT prevention systems. In: The 3rd annual VoIP security workshop"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Lentzen D, Grutzek G, Knospe H, Porschmann C (2011) Content-based detection and prevention of spam over IP telephony - system design, prototype and first results. In: IEEEICC2011, Japan, pp 1\u20135","DOI":"10.1109\/icc.2011.5963108"},{"key":"10_CR30","unstructured":"Iranmanesh Seyed A, Hemant S, Haining W (2012) A voice spam filter to clean subscriber\u2019s mailbox. In: 8th International conference on security and privacy in communication networks, pp 349\u2013367"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Zhang G, Fischer-H\u00fcbner S (2011) Detecting near-duplicate SPITs in voice mailboxes using hashes. In: 14th international conference on information security, ISC\u201911, pp 152\u2013167","DOI":"10.1007\/978-3-642-24861-0_11"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Kolan P, Dantu R (2007) Socio-technical defense against voice spamming. ACM Trans Auton Adapt Syst 2(1)","DOI":"10.1145\/1216895.1216897"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Ono K, Schulzrinne H (2009) Have i met you before?: using cross-media relations to reduce SPIT. In: 3rd IPTCOMM, pp 1\u20137","DOI":"10.1145\/1595637.1595641"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Gupta P, Srinivasan B, Balasubramaniyan V, Ahamad M (2015) Phoneypot: data-driven understanding of telephony threats. In: 20th NDSS","DOI":"10.14722\/ndss.2015.23176"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Balduzzi M, Gupta P, Gu L, Gao D, Ahamad M (2016) MobiPot: understanding mobile telephony threats with honeycards. In: 11th ACM ASIACCS","DOI":"10.1145\/2897845.2897890"},{"key":"10_CR36","unstructured":"Consumers Union, Robocalls Keep Coming (2014)"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Lindqvist J, Komu M (2007) Cure for spam over internet telephony. In: 4th IEEE CCNC, pp 896\u2013900","DOI":"10.1109\/CCNC.2007.181"},{"key":"10_CR38","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2008.4597108","volume":"46","author":"J Quittek","year":"2008","unstructured":"Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46:80\u201386","journal-title":"IEEE Commun Mag"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Quittek J, Niccolini S, Tartarelli S, Stiemerling M, Brunner M, Ewald T (2007) Detecting SPIT calls by checking human communication patterns. In: IEEE ICC, Scotland, pp 1979\u20131984","DOI":"10.1109\/ICC.2007.329"},{"key":"10_CR40","unstructured":"Reaves B, Blue L, Abdullah H, Vargas L, Traynor P, Shrimpton T (2017) Authenticall: efficient identity and content authentication for phone calls. In: 26th USENIX security symposium (USENIX Security 17), Vancouver, BC. USENIX Association, pp 575\u2013592"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Banerjee N, Saklikar S, Saha S (2006) Anti-vamming trust enforcement in peer-to-peer VoIP networks. In: 2006 international conference on wireless communications and mobile computing, IWCMC \u201906. ACM, pp 201\u2013206","DOI":"10.1145\/1143549.1143590"},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Sengar H, Wang X, Nichols A (2011) Thwarting spam over internet telephony (SPIT) attacks on VoIP networks. In: 19th IWQoS, pp 1\u20133","DOI":"10.1109\/IWQOS.2011.5931335"},{"key":"10_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.10.003","volume":"73","author":"G Vennila","year":"2018","unstructured":"Vennila G, Manikandan MSK, Suresh MN (2018) Dynamic voice spammers detection using hidden markov model for voice over internet protocol network. Comput Secur 73:1\u201316","journal-title":"Comput Secur"},{"key":"10_CR44","unstructured":"Wu Y-S, Bagchi S, Singh N, Wita R (2009) Spam detection in voice- over-IP calls through semi-supervised clustering. In: 39th Annual IEEE\/IFIP DSN, Portugal, pp 307\u2013316"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Azad MA, Morla R (2012) Mitigating SPIT with social strength. In: 2012 IEEE TrustCom, pp 393\u20131398","DOI":"10.1109\/TrustCom.2012.204"},{"issue":"Part B","key":"10_CR46","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.cose.2013.07.006","volume":"39","author":"MA Azad","year":"2013","unstructured":"Azad MA, Morla R (2013) Caller-Rep: detecting unwanted calls with caller social strength. Comput Secur 39(Part B):219\u2013236","journal-title":"Comput Secur"},{"key":"10_CR47","unstructured":"Azad MA, Morla R (2011) Multistage SPIT detection in transit VoIP. In: 19 IEEE SoftCOM, pp 1\u20139"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Sorge C, Seedorf J (2009) A provider-level reputation system for assessing the quality of SPIT mitigation algorithms. In: IEEE ICC \u201909, pp 1\u20136","DOI":"10.1109\/ICC.2009.5198660"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Bou-Harb E, Pourzandi M, Debbabi M, Assi C (2012) A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. John Wiley Secur Commun Netw","DOI":"10.1002\/sec.413"},{"key":"10_CR50","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MVT.2010.939906","volume":"6","author":"AU Schmidt","year":"2011","unstructured":"Schmidt AU, Leicher A, Shah Y, Cha I, Guccione L (2011) Sender scorecards. IEEE Veh Technol Mag 6:52\u201359","journal-title":"IEEE Veh Technol Mag"},{"key":"10_CR51","doi-asserted-by":"crossref","unstructured":"Azad MA, Morla R (2017) Early identification of spammers through identity linking, social network and call features. J Comput Sci 157\u2013172","DOI":"10.1016\/j.jocs.2016.10.019"},{"key":"10_CR52","doi-asserted-by":"crossref","unstructured":"Azad MA, Morla R (2018) Rapid detection of spammers through collaborative information sharing across multiple service providers. Future Gener Comput Syst","DOI":"10.1016\/j.future.2017.12.026"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"Azad MA, Bag S (2017) Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network. In: Proceedings of the 32nd symposium on applied computing, pp 1711\u20131717","DOI":"10.1145\/3019612.3019792"},{"key":"10_CR54","unstructured":"Azad MA, Bag S, Tabassum S, Hao F (2017) privy: privacy preserving collaboration across multiple service providers to combat telecoms spam. IEEE Trans Emerg Top Comput"}],"container-title":["Computer Communications and Networks","Guide to Vulnerability Analysis for Computer Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92624-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T11:37:23Z","timestamp":1571830643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92624-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319926230","9783319926247"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92624-7_10","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2018]]}}}