VoIP spam prevention

Khan, Saeed Farooq, Portmann, Marius and Bergmann, Neil W. (2013). VoIP spam prevention. In: Lisa O’Conner, Proceedings. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2013. 11th IEEE International Symposium on Parallel and Distributed Processing with Applications: ISPA-13. 12th IEEE International Conference on Ubiquitous Computing and Communications: IUCC-2013. IEEE TrustCom-13: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia, (1463-1470). 16-18 July, 2013. doi:10.1109/TrustCom.2013.177


Author Khan, Saeed Farooq
Portmann, Marius
Bergmann, Neil W.
Title of paper VoIP spam prevention
Conference name IEEE TrustCom-13: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Conference location Melbourne, VIC, Australia
Conference dates 16-18 July, 2013
Proceedings title Proceedings. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2013. 11th IEEE International Symposium on Parallel and Distributed Processing with Applications: ISPA-13. 12th IEEE International Conference on Ubiquitous Computing and Communications: IUCC-2013
Journal name Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013
Place of Publication Piscataway, NJ, USA
Publisher The Institute of Electrical and Electronics Engineers (IEEE)
Publication Year 2013
Sub-type Fully published paper
DOI 10.1109/TrustCom.2013.177
ISBN 9780769550220
ISSN 2324-898X
Editor Lisa O’Conner
Start page 1463
End page 1470
Total pages 8
Language eng
Formatted Abstract/Summary
Like email and conventional telephony, Voice over IP telephony is subject to spam. This paper discusses the problem of spam over IP telephony and investigates techniques which use the Session Initiation Protocol (SIP) to reject likely nuisance callers. Existing techniques include content filtering, black lists, white lists, gray lists, call rate monitoring, IP/domain correlation, consent-based communications, reputation systems, address obfuscation, limited-use addresses, computational puzzles, payments at risk, legislation, circles of trust, centralized SIP providers, and authenticated identity. A new technique using a text-based Turing test is proposed and demonstrated to be compatible with the SIP protocol.
Keyword Internet telephony
Privacy
Spam
Voice over IP
Q-Index Code E1
Q-Index Status Confirmed Code
Institutional Status UQ

 
Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in Thomson Reuters Web of Science Article | Citations
Scopus Citation Count Cited 2 times in Scopus Article | Citations
Google Scholar Search Google Scholar
Created: Fri, 14 Feb 2014, 23:41:26 EST by Professor Neil Bergmann on behalf of School of Information Technol and Elec Engineering