{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:30:51Z","timestamp":1762032651738},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2007,3]]},"abstract":"<jats:p>Voice over IP (VoIP) is a key enabling technology for migration of circuit-switched PSTN (Public Switched Telephone Network) architectures to packet-based networks. One problem of the present VoIP networks is filtering spam calls referred to as SPIT (Spam over Internet Telephony). Unlike spam in e-mail systems, VoIP spam calls have to be identified in real time. Many of the techniques devised for e-mail spam detection rely upon content analysis, and in the case of VoIP, it is too late to analyze the content (voice) as the user would have already attended the call. Therefore, the real challenge is to block a spam call before the telephone rings. In addition, we believe it is imperative that spam filters integrate human behavioral aspects to gauge the legitimacy of voice calls. We know that, when it comes to receiving or rejecting a voice call, people use the social meaning of trust, reputation, friendship of the calling party and their own mood. In this article, we describe a multi-stage, adaptive spam filter based on presence (location, mood, time), trust, and reputation to detect spam in voice calls. In particular, we describe a closed-loop feedback control between different stages to decide whether an incoming call is spam. We further propose formalism for voice-specific trust and reputation analysis. We base this formal model on a human intuitive behavior for detecting spam based on the called party's direct and indirect relationships with the calling party. No VoIP corpus is available for testing the detection mechanism. Therefore, for verifying the detection accuracy, we used a laboratory setup of several soft-phones, real IP phones and a commercial-grade proxy server that receives and processes incoming calls. We experimentally validated the proposed filtering mechanisms by simulating spam calls and measured the filter's accuracy by applying the trust and reputation formalism. We observed that, while the filter blocks a second spam call from a spammer calling from the same end IP host and domain, the filter needs only a maximum of three calls---even in the case when spammer moves to a new host and domain. Finally, we present a detailed sensitivity analysis for examining the influence of parameters such as spam volume and network size on the filter's accuracy.<\/jats:p>","DOI":"10.1145\/1216895.1216897","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:20:08Z","timestamp":1175800808000},"page":"2","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Socio-technical defense against voice spamming"],"prefix":"10.1145","volume":"2","author":[{"given":"Prakash","family":"Kolan","sequence":"first","affiliation":[{"name":"University of North Texas, Denton, Texas"}]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, Texas"}]}],"member":"320","published-online":{"date-parts":[[2007,3]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Biever C. 2004. Move over spam make way for \u201cspit\u201d. http:\/\/www.newscientist.com\/article.ns?id=dn6445  Biever C. 2004. Move over spam make way for \u201cspit\u201d. http:\/\/www.newscientist.com\/article.ns?id=dn6445"},{"key":"e_1_2_1_2_1","unstructured":"Boykin P.O. and Roychowdhury V. 2004. Personal Email networks: An effective Anti-spam tool. Preprint http:\/\/www.arxiv.org\/abs\/cond-mat\/0402143  Boykin P.O. and Roychowdhury V. 2004. Personal Email networks: An effective Anti-spam tool. Preprint http:\/\/www.arxiv.org\/abs\/cond-mat\/0402143"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1228527"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access.","author":"Cohen W. W.","year":"1996"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2004.36"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the IEEE GlobeComm Workshop on VoIP Security. IEE Computer Society Press, Los ALamitos, CA.","author":"Dantu R."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of USENIX, SRUTI(Steps for Reducing Unwanted Traffic on the Internet) Workshop.","author":"Dantu R."},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the IEEE International Conference on Information Technology (ITCC).","author":"Dantu R."},{"key":"e_1_2_1_9_1","unstructured":"Evett D. 2006. Spam Statistics 2006. http:\/\/spam-filter-review.toptenreviews.com\/spam-statistics.html.  Evett D. 2006. Spam Statistics 2006. http:\/\/spam-filter-review.toptenreviews.com\/spam-statistics.html."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_7"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the Workshop on Privacy in Digital Environments: Empowering Users. Proceedings of CSCW.","author":"Goecks J."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the IEEE conference on Email and Anti Spam. IEEE Computer Society Press, Los ALamitos, CA.","author":"Golbeck J."},{"key":"e_1_2_1_13_1","unstructured":"Good I. J. 1965. The estimation of probabilities: An essay on modern Bayesian methods. M.I.T Press Cambridge MA.  Good I. J. 1965. The estimation of probabilities: An essay on modern Bayesian methods. M.I.T Press Cambridge MA."},{"key":"e_1_2_1_14_1","unstructured":"Hepburn M. and Wright D. 2003. Execution contexts for determining trust in a higher-order &pi; calculus. School of Computing University of Tasmania Technical Report.  Hepburn M. and Wright D. 2003. Execution contexts for determining trust in a higher-order &pi; calculus. School of Computing University of Tasmania Technical Report."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"J\u00f8sang A. Ismail R. and Boyd C. 2006. A survey of trust and reputation systems for online service provision. Decision Support Systems.  J\u00f8sang A. Ismail R. and Boyd C. 2006. A survey of trust and reputation systems for online service provision. Decision Support Systems.","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of Formal Aspects in Security and Trust.","author":"Krukow K."},{"key":"e_1_2_1_17_1","unstructured":"Lacy S. 2006. Is your VoIP phone vulnerable&quest; http:\/\/www.businessweek.com\/technology\/content\/jun2006\/tc20060613_799282.htm  Lacy S. 2006. Is your VoIP phone vulnerable&quest; http:\/\/www.businessweek.com\/technology\/content\/jun2006\/tc20060613_799282.htm"},{"key":"e_1_2_1_18_1","unstructured":"Lancaster K. 2003. Resilient packet ring: Enabling VoIP delivery. Internet Telephony.  Lancaster K. 2003. Resilient packet ring: Enabling VoIP delivery. Internet Telephony."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EEE.2005.7"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the IEEE Symposium on Advances in Wired and Wireless Communication. IEEE Computer Society Press, Los ALamitos, CA. 49--52","author":"Macintosh R."},{"key":"e_1_2_1_21_1","unstructured":"Marsh S. 1994. Formalizing trust as a computational concept. Ph.D. dissertation. University of Stirling.  Marsh S. 1994. Formalizing trust as a computational concept. Ph.D. dissertation. University of Stirling."},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 35th Hawaii International Conference on System Science. 280--287","author":"Mui L."},{"key":"e_1_2_1_23_1","unstructured":"Niccolini S. Tartarelli S. Stiemerling M. and Srivastava S. 2006. SIP extensions for SPIT identification. IETF SIP draft draft-niccolini-sipping-feedback-spit-02.  Niccolini S. Tartarelli S. Stiemerling M. and Srivastava S. 2006. SIP extensions for SPIT identification. IETF SIP draft draft-niccolini-sipping-feedback-spit-02."},{"key":"e_1_2_1_24_1","unstructured":"Ono K. and Schulzrinne H. 2005. Trust path discovery. IETF Internet Draft.  Ono K. and Schulzrinne H. 2005. Trust path discovery. IETF Internet Draft."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796897002906"},{"key":"e_1_2_1_26_1","volume-title":"Detecting Phishing in Emails. Spam Conference, MIT.","author":"Palla S."},{"key":"e_1_2_1_27_1","unstructured":"Rago S. 2006. VoIP spells equipment oppurtunities now. Networking and Optical Communications---Q3 Topical Report Isuppli.  Rago S. 2006. VoIP spells equipment oppurtunities now. Networking and Optical Communications---Q3 Topical Report Isuppli."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of 9th European Symposium on Research in Computer Security (ESORICS'04)","author":"Ray I."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of Voice over IP Secuity Workshop","author":"Rebahi Y."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 1st Conference on E-mail and Anti-Spam.","author":"Rigoutsos I."},{"key":"e_1_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Rosenberg J. Shulzrinne H. Camerillo G. Johnston A. Peterson J. Sparks R. Handley M. and Schooler E. 2002. Session Initiation Protocol. RFC 3261  Rosenberg J. Shulzrinne H. Camerillo G. Johnston A. Peterson J. Sparks R. Handley M. and Schooler E. 2002. Session Initiation Protocol. RFC 3261","DOI":"10.17487\/rfc3261"},{"key":"e_1_2_1_33_1","unstructured":"Rosenberg J. Jennings C. and Peterson J. 2006. The session initiation protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt  Rosenberg J. Jennings C. and Peterson J. 2006. The session initiation protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"e_1_2_1_35_1","unstructured":"Sahami M. Dumais S. Heckerman D. and Horvitz E. 1998. A Bayesian approach to filtering junk e-mail. Learning for Text Categorization---Papers from the AAAI Workshop pp. 55--62 Madison WI. AAAI Technical Report WS-98-05.  Sahami M. Dumais S. Heckerman D. and Horvitz E. 1998. A Bayesian approach to filtering junk e-mail. Learning for Text Categorization---Papers from the AAAI Workshop pp. 55--62 Madison WI. AAAI Technical Report WS-98-05."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022948414856"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST'04)","author":"Seigneur J. M."},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of 2nd VoIP Security Workshop","author":"Shin D."},{"key":"e_1_2_1_39_1","volume-title":"IEEE Proceedings ICSP. IEE Computer Society Press, Los ALamitos, CA.","author":"Soonthornphisaj N."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/946251.946986"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the Workshop on \u201cDeception, Fraud and Trust in Agent Societies\u201d at the Autonomous Agents and Multi Agent Systems (AAMAS-03)","author":"Wang Y."},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 1st Conference on Email and Anti-Spam (CEAS).","author":"Wattson B.","year":"2004"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544809"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of 4th Workshop on Deception, Fraud and Trust in Agent Societies","author":"Yu B."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839510050144868"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of 32nd Hawaii International Conference on System Sciences.","author":"Zacharia G."},{"key":"e_1_2_1_47_1","unstructured":"Zimmerman P. R. 1995. The Official PGP User's Guide. MIT Press Cambridge MA.   Zimmerman P. R. 1995. The Official PGP User's Guide. MIT Press Cambridge MA."}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1216895.1216897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T18:18:19Z","timestamp":1672251499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1216895.1216897"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,3]]}},"alternative-id":["10.1145\/1216895.1216897"],"URL":"https:\/\/doi.org\/10.1145\/1216895.1216897","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"value":"1556-4665","type":"print"},{"value":"1556-4703","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,3]]},"assertion":[{"value":"2007-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}