Abstract
In our everyday life, we communicate with many people such as family, friends, neighbors, and colleagues. We communicate with them using different communication media such as email, telephone calls, and face-to-face interactions. While email is not real-time and face-to-face communications require geographic proximity, voice and video communications are preferred over other modes of communication. However, real-time voice/video calls may create nuisance to the receiver. In this article, we describe a mathematical model for computing nuisance level of incoming voice/video calls. We computed the closeness and nuisance level using the calling patterns between the caller and the callee. To validate the nuisance model, we collected cell phone call records of real-life people at our university and computed the nuisance value for all voice calls. We validated the nuisance levels using the feedback from those real-life people. Such a nuisance model is useful for predicting unwanted voice and video sessions in an IP communication network.
- Biever, C. 2004. Move over spam, make way for “spit.” http://www.newscientist.com/article.ns?id=dn6445.Google Scholar
- Canny, J. 2006. Is an HCI revolution just around the corner? ACM Queue 4, 6.Google Scholar
- Cohen, W. W. 1996. Learning rules that classify e-mail. In Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access.Google Scholar
- Dantu, R. and Kolan, P. 2004. Preventing voice spamming. In Proceedings of the IEEE GlobeComm Workshop on VoIP Security.Google Scholar
- Dantu, R. and Kolan, P. 2005. Detecting spam in VoIP networks. In Proceedings of USENIX, SRUTI (Steps for Reducing Unwanted Traffic on the Internet). Google Scholar
Digital Library
- Dantu, R. and Kolan, P. 2006. Survey of Calling Patterns. University of North Texas Internal Survey, http://secnet.csci.unt. edu/nuisance/.Google Scholar
- Eagle, N. 2005. Machine perception and learning of complex social systems. PhD Dissertation, Massachusetts Institute of Technology.Google Scholar
- Graham, P. 2002. A Plan for Spam. http://paulgraham.com/spam.html.Google Scholar
- Granovetter, M. S. 1973. The strength of Weak Ties. Amer. J. Sociol. 78, 1360--1380.Google Scholar
Cross Ref
- Hershkop, S. 2005. URL Clustering to Classify Spam, Columbia University.Google Scholar
- Hershkop, S. and Stolfo, S. J. 2004. Identifying spam without peeking at the contents. ACM Crossroads. Google Scholar
Digital Library
- Hershkop, S. and Stolfo, S. J. 2005. Combining emails models for false positive reduction. In Proceeding of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. 98--107. Google Scholar
Digital Library
- Khalil, A. and Connelly, K. H. 2005. Improving cell phone awareness by using calendar information. In Proceedings of International Conference on Human-Computer Interaction (INTERACT). Google Scholar
Digital Library
- Khalil, A. and Connelly, K. H. 2006. Context-aware telephony: Privacy preferences and sharing patterns. In Proceedings of the Conference on Computer Supported Collaborative Work (CSCW). Google Scholar
Digital Library
- Kolan, P., Vaithilingam, R., and Dantu, R. 2007. Automatic calibration using receiver operating characteristics curves. In Comsware Workshop. Bangalore, India.Google Scholar
- Kolan, P. and Dantu, R. 2007. Socio-technical defense against voice spamming, ACM Trans. Auton. Adapt. Syst. 2, 1. Google Scholar
Digital Library
- Lucy, S. 2006. Is your VoIP phone vulnerable? http://www.businessweek.com/technology/content/jun2006/tc20060613_799282. htm?campaign_id=bier_tcj.Google Scholar
- Manber, U. 1994. Finding similar files in a large file system. In Usenix Winter (San Fransisco, CA), 1--10. Google Scholar
Digital Library
- Marsden, P. V. and Campbell, K. E. 1984. Measuring tie strength. Social Forces 63, 2, 482--501.Google Scholar
Cross Ref
- Mitchell, T. M. 1997. Machine Learning. McGraw-Hill. Google Scholar
Digital Library
- Rigoutsos, I. and Huynh, T. 2004. Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages. In Proceedings of the first Conference on E-mail and Anti-Spam.Google Scholar
- Rosenberg, J., Shulzrinne, H., Camerillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and Schooler, E. 2002. Session Initiation Protocol. RFC 3261.Google Scholar
- Rosenberg, J., Jennings, C., and Peterson, J. 2006. The Session Initiation Protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txtGoogle Scholar
- Sahami, M., Dumais, S., Heckerman, D., and Horvitz, E. 1998. A bayesian approach to filtering junk e-mail. Learning for text categorization—Papers from the National Conference on Artificial Intelligence Workshop, 55--62, AAAI Tech. Rep. WS-98-05.Google Scholar
- Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C. D., and Stamatopoulos, P. 2003. A memory based approach to anti-spam filtering for mailing lists. Information Retrieval. Google Scholar
Digital Library
- Salton, G. and McGill, M. J. 1998. Introduction to Modern Information Retrieval. McGraw-Hill. Google Scholar
Digital Library
- Segal, R. B. and Kephart, J. O. 1999. MailCat: An intelligent assistant for organizing e-mail. In Proceedings of the 3rd International Conference on Autonomous Agents. Google Scholar
Digital Library
- Shin, D. and Shim, C. 2005. Voice spam control with gray leveling. In Proceedings of 2nd VoIP Security Workshop, Washington, DC.Google Scholar
- Soonthornphisaj, N., Chaikulseriwat, K., and Tang-on, P. 2002. Anti-spam filtering: A centroid based classification approach. Proceedings of the IEEE International Conference on Software Processes.Google Scholar
Index Terms
Nuisance level of a voice call
Recommendations
Socio-technical defense against voice spamming
Voice over IP (VoIP) is a key enabling technology for migration of circuit-switched PSTN (Public Switched Telephone Network) architectures to packet-based networks. One problem of the present VoIP networks is filtering spam calls referred to as SPIT (...
Single-message denial-of-service attacks against voice-over-internet protocol terminals
The session initiation protocol (SIP) is widely used for signalling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight ...
Call admission control for voice over IP: Research Articles
Voice Over IP–Theory and PracticeVoice over Internet protocol (VoIP) is a technology that enables the transmission of voice over an IP network. Recent years have witnessed heavy investment in this area in the commercial world. For VoIP to replace Public Switched Telephone Network (PSTN)...






Comments