Naveen Kr. Sharma 1 Yashar Ganjali 2



Similar documents
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

SPAM over Internet Telephony (SPIT) und Abwehrmöglichkeiten

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

Is Skype Safe for Judges?

Customize Approach for Detection and Prevention of Unsolicited Call in VoIP Scenario: A Review

Voice Over IP. Priscilla Oppenheimer

VoIP telephony over internet

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples

Voice and Video over Wireless LAN

CPNI VIEWPOINT 01/2007 INTERNET VOICE OVER IP

Prevention of Spam over IP Telephony (SPIT)

Functional Specifications Document

Challenges and opportunities for Open Source solutions

VoIP - innovative uses in small Telex

ETM System SIP Trunk Support Technical Discussion

VoIP. Overview. Jakob Aleksander Libak Introduction Pros and cons Protocols Services Conclusion

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

A seminar on Internet Telephony

How To Prevent Spam In A Phone Line From Being Spam In An Ipa Network

A Study on Countering VoIP Spam using RBL

Universal Unified Communications Integration

An Introduction to VoIP Protocols

Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan

Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods

Multimedia Communications Voice over IP

Regulatory approach to voice services supported in IP technology (VoIP)

EZblue BusinessServer The All - In - One Server For Your Home And Business

(Refer Slide Time: 01:46)

Skype characteristics

Workforce Management IVR. A multi-service voice platform

Cost Effective Deployment of VoIP Recording

VoIP Intercom with Allworx 6x Server Setup Guide

UTILIZATION OF VIRTUAL MACHINES IN LABORATORY STANDS ON EXAMPLE OF SIP EXPRESS ROUTER APPLICATION

SIP Penetration Testing in CESNET Best Practice Document

Mixer/Translator VOIP/SIP. Translator. Mixer

Unlimited Server 24/7/365 Support

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

CE Advanced Network Security VoIP Security

Peer to Peer Settlement for Next Generation IP Networks Using the ETSI OSP Protocol (ETSI TS ) for Cascading Peering Settlements

UNS White Paper - What is hosted voice?

EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

How To Counter SpIT

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

How To Deliver High Quality Telephony Over A Network

VoipSwitch softphones

Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs

Load Balancing for Microsoft Office Communication Server 2007 Release 2

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

Comparison of Moodle and ATutor LMSs

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

An outline of the security threats that face SIP based VoIP and other real-time applications

Workshop on Using Open Source Content Management System Drupal to build Library Websites Hasina Afroz Auninda Rumy Saleque

Do It Yourself Telephony and Messaging Services With FOSS. GNOME Asia Summit 2015 May 9 th, gnome.asia

Brekeke PBX Version 3 Administrator's Guide (Basic) Brekeke Software, Inc.

ConVox Audio Conference Solution

VOIP Security Essentials. Jeff Waldron

Service Schedule 2 MS Lync Terms & Conditions v1.0

Kyle Haefner Communications Programmer Telecommunications Colorado State University. Open Source Telecommunications. Applications to Education

CommsOffice Express. Innovative call management software

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?

2 Voice over IP Network

Introduction. M.E.IP.S 4.10 Solution Overview with 3COM VCX 7.0 1

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

State of Oregon Open Source Application Use in the Enterprise

OfficeServ Application Suite

and Voice Applications Eyal Wirsansky, Verso Technologies JaxJUG

Secure VoIP for optimal business communication

A Phased Framework for Countering VoIP SPAM

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

VoIP Telephone system benefits:

Open Source VoiceXML Interpreter over Asterisk for Use in IVR Applications

/07/$ IEEE

Advanced Higher Computing. Computer Networks. Homework Sheets

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller

Security issues in Voice over IP: A Review

Mobile VoIP: Managing, scheduling and refining voice packets to and from mobile phones

12 Quality of Service (QoS)

SIP Penetration Test System

SIP, Session Initiation Protocol used in VoIP

Genesys SIP Transforming Customer Service. Richard Barton Bill Mitchell Jim Kraeutler

Prevention of Anomalous SIP Messages

Edge Configuration Series Reporting Overview

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing

ITEC 495 Capstone Project Ideas

Management Solution for VTO(VoIP Traffic Optimizer) Service. Smart VTO Overview. AddPac Technology. 2014, Sales and Marketing.

VoIP Resilience and Security Jim Credland

Voice Call Addon for Ozeki NG SMS Gateway

Connect your Control Desk to the SIP world

White Paper: Performance of Host-based Media Processing

Livezilla How to Install on Shared Hosting By: Jon Manning

Installation of the On Site Server (OSS)

TECHNICAL CHALLENGES OF VoIP BYPASS

Softswitch & Asterisk Billing System

Transcription:

Naveen Kr. Sharma 1 Yashar 2 1 Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur, INDIA 2 Computer s & Networks Research Group Department of Computer Science University of Toronto, CANADA MITACS Globalink Internship 3rd May - 16th July, 2010

Outline 1 2 3 4 5 6 7

Brief of What is? Any unsolicited bulk message. Leads to waste of Resources. Time, Bandwidth, Memory and Productivity. What is IP Telephony? Services transported via the Internet, rather than the public switched telephone network (PSTN). Also called VoIP (Skype, Vonage, Lingo...) So, over Internet Telephony (SPIT) is any unwanted multimedia session over the internet.

SPIT Real Time Decisions must be made very quickly (typically 1-2 sec). Data Content Limitation Processing Call Data (Voice or Video) is impractical. High Cost of False Positive Filtering out legitimate calls is potentially fatal. Legal Issues Violation of freedom of speech?

Our of Detection 1 Call Network Analysis Network Graph is constructed from Call Logs (Nodes as people, Edges as calls). Properties of nodes are studied (In/Out-Degree, Call Duration Patterns, Node Links). 2 Feedback Analysis Feedback collected from Callee. ( OR Not ) Reveals the concrete ground truth. 3 Handshake/Turing Test A voice challenge is given to the Caller. Differentiates between Automated Caller and Real Person. For implementation, we chose a typical Server-Client system.

Application & Server Design Mobile Application Built for Andorid Platform 1.6 (Nexus One, HTC..) Handles all Incoming Calls and displays Rating. Blocks or Diverts Call according to User settings. Collects the feedback and trasmits to server. SPIT Server Standard Linux, Apache, MySQL, PHP (LAMP) Server. Responds to application request, provides Rating. All communication is through HTTP Post, encrypted using User password, IMEI number. MySQL backend to store user details and feedback data.

Figure: A brief schematic diagram of the

Figure: Main Activity and User Settings

Figure: Rating Screen and Feedback Screen

Conclusion & Future Work Conclusions The system works very well, and we hope to release it for beta-testing soon. It is very simple, intuitive to use and less annoying. Works better than traditional Whitelist/Blacklist approach. Improve Application to be more robust to network failures. Make the Server and transmission of Data more secure. Integration with other analyzer modules.

for your attention Any Questions? Acknowledgements MITACS, Ms. Sue Roppel for bringing us here! UofT, Ms. Lorna J Edmonds for hosting us! Dr. Yashar, and the whole Research Group. Contact : nkrsharma@gmail.com Towards a -Free world... Amen...