• Title/Summary/Keyword: VoIP Spam

Search Result 24, Processing Time 0.026 seconds

A Study on Countering SIP-based VoIP Spam using VoIP-RBL (VoIP-RBL을 이용한 SIP기반 VoIP스팸 차단 방법)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Park, Hae-Ryoung;Won, Yoo-Jae;Yoo, Hyeong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.135-136
    • /
    • 2011
  • The more VoIP service is widely used, the more VoIP spam becomes threatened. Both VoIP spam violates the user's privacy and VoIP spam can cause money trouble. Therefore, it is important to reduce the VoIP spam but it is not easy to adopt some useful techniques to counter e-mail spam due to VoIP characteristics. We propose a technique using VoIP-RBL for countering SIP-based VoIP spam.

Spamtester using Spam Categorization in SIP-based VoIP Networks (VoIP 환경에서 스팸 유형 분석 및 Spamtester 구현)

  • Choi, Jae-Sic;Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.99-107
    • /
    • 2008
  • In this paper, we analyse the vulnerability of spam attacks and develop the Spamtester to confirm these spam attacks in SIP-based VoIP networks. Although there are several spam attacks on VoIP networks, the detail information for the SPIT is not enough to confirm the procedure and the result of spam attacks on VoIP networks. Specially, the spam attacks through abnormal process are difficult to trace the sender of spam. Also, it is not easy to impose the legal restriction to the spammer because of lack of information for the spam attack. Therefore, on VoIP networks, the possible scenario and detail procedure for VoIP spam is needed to be confirmed. This paper designes and implementes the spamtester, which is helpful to protect VoIP networks from the spam attacks.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment (BcN 환경에서 안전한 VoIP 서비스를 위한 스팸대응 기술 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.670-676
    • /
    • 2008
  • There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.

Anti-Spam for VoIP based on Turing Test (튜링 테스트 기반으로 한 VoIP 스팸방지)

  • Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.261-265
    • /
    • 2008
  • As increasing the user of VoIP service using ITSP(Internet Telephony Service Provider), the VoIP spam becomes a big problem. The spam used in the existing public telephone is detected by using the pattern inspection of call behavior because it is difficult to filter contents for the characteristic of real-time voice communication. However there is a false-positive problem. The threat on spam remains where spam with low threshold can't be detected or users share one number. In this paper, we propose anti-spam for VoIP based on luring test. The proposed method gives a user luring test and he/she can connect to a receiver if passing turing test. A ticket is given to a user that pass luring test and it reduces overhead of luring test in re-dial. The proposed method is implemented on ASUS WL-500G wireless router and Asterisk IP-PBX. Experimental results show the effectiveness of the proposed method.

DEVS Simulation of Spam Voice Signal Detection in VoIP Service (VoIP 스팸 콜 탐지를 위한 음성신호의 DEVS 모델링 및 시뮬레이션)

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Cho, Young-Duk;Kim, Hwan-Kuk;Won, Yoo-Jae;Kim, Myuhng-Joo
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.75-87
    • /
    • 2007
  • As the VoIP service quality is getting better and many shortcomings are being overcome, users are getting interested in this service. Also, there are several additional features that provide a convenience to users such as presence service, instant messaging service and so on. But, as there are always two sides of rein, some security issues have users hesitate to make use of it. This paper deals with one of the issues, the VoIP spam problem. We took into account the signal pattern of voice message in spam call and we have constructed voice signal models of normal call, normal call with noise and spam call. Each voice signal case is inserted into our spam decision algorithm which detects the spam calls based on the amount of information in the call signal. We made use of the DEVS-$Java^{TM}$ for our modeling and simulation. The contribution of this work is in suggestion of a way to detect voice spam call signal and testing of the method using modeling and simulation methodology.

  • PDF

Analysis on Static Characteristics for Greylist-based SPIT Level Decision of VoIP SPAM Calls (VoIP 스팸 Call의 Grey List 기반 SPIT 레벨 결정을 위한 정적 속성 분석 연구*)

  • Chang, Eun-Shil;Kim, Hyoug-Jong;Kang, Seung-Seok;Cho, Young-Duk;Kim, Myuhng-Joo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.109-120
    • /
    • 2007
  • VoIP service provides various functions that PSTN phone service hasn't been able to provide. Since it also has superiority in service charge, the number of user is increasing these days. When we think of the other side in cost aspect, the spam caller can also send his/her commercial message over phone line using more economic way. This paper presents the characteristics that should be considered to detect the spam call using greylisting method. We have explored static and dynamic characteristics in VoIP calls, and analyzed the relation among them. Especially, we have surveyed the authentication and charging method of Korean VoIP service provider. We have analyzed each charging method using our spam call simulation result, and derived the charging method that can be favored by spam caller. The contribution of the work is in analysis result of static aspect for SPIT Level calculation in greylisting method.

  • PDF

An Authentication Schemes for Anti-spam in SIP-based VoIP Services (SIP 기반의 VoIP 서비스 환경에서 스팸 방지를 위한 인증 기법)

  • Jang, Yu-Jung;Moon, Hyung-Kwon;Choi, Jae-Duck;Won, Yoo-Jae;Cho, Young-Duk;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.521-528
    • /
    • 2007
  • This paper proposes a message authentication scheme to resist potential spam threats in SIP-based VoIP services. Our scheme applies the extended HTTP digest authentication mechanism between the inbound proxy and the UAS to verify that a service request is coming through the valid inbound proxy. The proposed scheme is simple and requires minimal modification the current SIP standards, and effective to filter invalid peer-to-peer spam calls. In this paper, an experimental spam attack using modified open source was tested on a commercial VoIP networks to exploit the possibility of spam attacks in real environment.

A Scheme of VoIP Spam Detection Using Improved Multi Gray-Leveling (향상된 Multi Gray-Leveling을 통한 VoIP 스팸 탐지 기법)

  • Chae, Kang-Suk;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.630-636
    • /
    • 2012
  • In this paper, we propose an improved Multi Gray-Leveling scheme which reduces the problems of the existing Multi Gray-Leveling scheme suggested as a way of prevention against call spam in VoIP environment. The existing scheme having two different time period distinguishes the possibility of call spam by checking the call interval, so that it prevents the spammer's avoidance controlling the call interval. This is the strength of the existing one but it can misunderstand the normal user as a spammer due to taking long term time period. To solve this problem, this paper proposes the upgrade scheme which utilizes the receiver's action pattern as well as the caller's action pattern. It has such a good strength that can do gray leveling via the collected information in the database of VoIP service provider without user's direct involvement. Hence it can be a very effective way of VoIP spam detection.