Title :
VoIP Spam Prevention
Author :
Khan, S.F. ; Portmann, Marius ; Bergmann, Neil W.
Author_Institution :
Sch. of Inf. Technol. & Electr. Eng., Univ. of Queensland, Brisbane, QLD, Australia
Abstract :
Like email and conventional telephony, Voice over IP telephony is subject to spam. This paper discusses the problem of spam over IP telephony and investigates techniques which use the Session Initiation Protocol (SIP) to reject likely nuisance callers. Existing techniques include content filtering, black lists, white lists, gray lists, call rate monitoring, IP/domain correlation, consent-based communications, reputation systems, address obfuscation, limited-use addresses, computational puzzles, payments at risk, legislation, circles of trust, centralized SIP providers, and authenticated identity. A new technique using a text-based Turing test is proposed and demonstrated to be compatible with the SIP protocol.
Keywords :
Internet telephony; computer network security; signalling protocols; IP-domain correlation technique; SIP; VoIP spam prevention; VoIP telephony; address obfuscation technique; authenticated identity technique; black lists technique; call rate monitoring technique; centralized SIP providers technique; circles-of-trust technique; computational puzzles technique; consent-based communications technique; content filtering technique; conventional telephony; electronic mail; email; gray lists technique; legislation technique; limited-use addresses technique; payments-at-risk technique; reputation systems technique; session initiation protocol; text-based Turing test; voice-over-Internet protocol; white lists technique; IP networks; Protocols; Receivers; Servers; Telephony; Unsolicited electronic mail; internet telephony; privacy; spam; voice over IP;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
DOI :
10.1109/TrustCom.2013.177