Skip to main content

VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions

  • Conference paper
  • 376 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 29))

Abstract

VoIP spam will become severe problem preventing from generalization of VoIP service. For comprehensive response against spam, this paper implemented VoIP SPAM response system adopting multi-leveled anti-spam solutions. To adopt them, we divided VoIP service domains into three domains as outbound, intermediary, and inbound. The main goal of anti-spam solution in outbound domain is to prevent spam by monitoring and detecting call traffic of registered users. In intermediary domain, we focused on blocking SIP message forgery spam using SIP-based sender policy framework. Inbound domain has the “easy spam reporter”. This module enables victims to report spam contents to the administrator directly. The reported contents and information, of course, are shared with other domains as a black list. Through the experimental result, we showed this system is enough to prevent, detect, and block VoIP spam.

This work was supported by the IT R&D program of MKE/IITA. [2008-S-028-02, The Development of SIP-Aware Intrusion Prevention Technique for protecting SIP-base Application Services]

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hype Cycle for Consumer Technologies in 2007 (2007), http://www.gartner.com

  2. Rosenburg, J., et al.: SIP: Session Initiation Protocol. RFC 3261 (June 2002)

    Google Scholar 

  3. Korea Information Security Agency, VoIP Security Guide (December 2005)

    Google Scholar 

  4. VoIPSA (VoIP Security Alliance).: http://www.voipsa.org/Activities/taxonomy.php

  5. Schwartz, D., Sterman, B., Katz, E., Tschofenig, H.: SPAM for Internet Telephony (SPIT) Prevention using the Security Assertion Markup Language (SAML) (December 2006), IETF-DRAFT draft-schwartz-sipping-spit-saml-01.txt

  6. Allman, E., et al.: Domain Keys Identified Mail (DKIM) Signatures. RFC 4871 (May 2007)

    Google Scholar 

  7. CDR (Call Detail Records).: http://en.wikipedia.org/wiki/Call_detail_record

  8. Balasubramaniyan, V., Ahamad, M., Park, H.: CallRank: Combating SPIT Using Call Duration. Social Networks and Global Reputation (2007)

    Google Scholar 

  9. Wong, M.: Sender Policy Framework (SPF) for Authorizing the Use of Domains in E-Mail, Version 1. RFC 4408 (April 2005)

    Google Scholar 

  10. Wong, M.: SPF, MTAs and SRS. Linux J (May 2004)

    Google Scholar 

  11. SRS (Sender Rewriting Scheme).: http://www.openspf.org/SRS

  12. Gordon, V.C., Thomas, R.L.: Online supervised spam filter evaluation. ACM Trans. Inf. Syst. 25(3) (July 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, J., Yoon, S., Lee, T., Jeong, H., Won, Y. (2009). VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions. In: Kim, Hk., Kim, Th., Kiumi, A. (eds) Advances in Security Technology. SecTech 2008. Communications in Computer and Information Science, vol 29. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10240-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10240-0_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10239-4

  • Online ISBN: 978-3-642-10240-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics