Javascript must be enabled to continue!
System and Methods for Detecting Unwanted Voice Calls
View through CrossRef
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based IP networks. However, this migration is successful only if the present problems in IP networks are addressed before deploying VoIP infrastructure on a large scale. One of the important issues that the present VoIP networks face is the problem of unwanted calls commonly referred to as SPIT (spam over Internet telephony). Mostly, these SPIT calls are from unknown callers who broadcast unwanted calls. There may be unwanted calls from legitimate and known people too. In this case, the unwantedness depends on social proximity of the communicating parties. For detecting these unwanted calls, I propose a framework that analyzes incoming calls for unwanted behavior. The framework includes a VoIP spam detector (VSD) that analyzes incoming VoIP calls for spam behavior using trust and reputation techniques. The framework also includes a nuisance detector (ND) that proactively infers the nuisance (or reluctance of the end user) to receive incoming calls. This inference is based on past mutual behavior between the calling and the called party (i.e., caller and callee), the callee's presence (mood or state of mind) and tolerance in receiving voice calls from the caller, and the social closeness between the caller and the callee. The VSD and ND learn the behavior of callers over time and estimate the possibility of the call to be unwanted based on predetermined thresholds configured by the callee (or the filter administrators). These threshold values have to be automatically updated for integrating dynamic behavioral changes of the communicating parties. For updating these threshold values, I propose an automatic calibration mechanism using receiver operating characteristics curves (ROC). The VSD and ND use this mechanism for dynamically updating thresholds for optimizing their accuracy of detection. In addition to unwanted calls to the callees in a VoIP network, there can be unwanted traffic coming into a VoIP network that attempts to compromise VoIP network devices. Intelligent hackers can create malicious VoIP traffic for disrupting network activities. Hence, there is a need to frequently monitor the risk levels of critical network infrastructure. Towards realizing this objective, I describe a network level risk management mechanism that prioritizes resources in a VoIP network. The prioritization scheme involves an adaptive re-computation model of risk levels using attack graphs and Bayesian inference techniques. All the above techniques collectively account for a domain-level VoIP security solution.
Title: System and Methods for Detecting Unwanted Voice Calls
Description:
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based IP networks.
However, this migration is successful only if the present problems in IP networks are addressed before deploying VoIP infrastructure on a large scale.
One of the important issues that the present VoIP networks face is the problem of unwanted calls commonly referred to as SPIT (spam over Internet telephony).
Mostly, these SPIT calls are from unknown callers who broadcast unwanted calls.
There may be unwanted calls from legitimate and known people too.
In this case, the unwantedness depends on social proximity of the communicating parties.
For detecting these unwanted calls, I propose a framework that analyzes incoming calls for unwanted behavior.
The framework includes a VoIP spam detector (VSD) that analyzes incoming VoIP calls for spam behavior using trust and reputation techniques.
The framework also includes a nuisance detector (ND) that proactively infers the nuisance (or reluctance of the end user) to receive incoming calls.
This inference is based on past mutual behavior between the calling and the called party (i.
e.
, caller and callee), the callee's presence (mood or state of mind) and tolerance in receiving voice calls from the caller, and the social closeness between the caller and the callee.
The VSD and ND learn the behavior of callers over time and estimate the possibility of the call to be unwanted based on predetermined thresholds configured by the callee (or the filter administrators).
These threshold values have to be automatically updated for integrating dynamic behavioral changes of the communicating parties.
For updating these threshold values, I propose an automatic calibration mechanism using receiver operating characteristics curves (ROC).
The VSD and ND use this mechanism for dynamically updating thresholds for optimizing their accuracy of detection.
In addition to unwanted calls to the callees in a VoIP network, there can be unwanted traffic coming into a VoIP network that attempts to compromise VoIP network devices.
Intelligent hackers can create malicious VoIP traffic for disrupting network activities.
Hence, there is a need to frequently monitor the risk levels of critical network infrastructure.
Towards realizing this objective, I describe a network level risk management mechanism that prioritizes resources in a VoIP network.
The prioritization scheme involves an adaptive re-computation model of risk levels using attack graphs and Bayesian inference techniques.
All the above techniques collectively account for a domain-level VoIP security solution.
Related Results
Speech, communication, and neuroimaging in Parkinson's disease : characterisation and intervention outcomes
Speech, communication, and neuroimaging in Parkinson's disease : characterisation and intervention outcomes
<p dir="ltr">Most individuals with Parkinson's disease (PD) experience changes in speech, voice or communication. Speech changes often manifest as hypokinetic dysarthria, a m...
Speech, communication, and neuroimaging in Parkinson's disease : characterisation and intervention outcomes
Speech, communication, and neuroimaging in Parkinson's disease : characterisation and intervention outcomes
<p dir="ltr">Most individuals with Parkinson's disease (PD) experience changes in speech, voice or communication. Speech changes often manifest as hypokinetic dysarthria, a m...
Speech, communication, and neuroimaging in Parkinson's disease : Characterisation and intervention outcomes
Speech, communication, and neuroimaging in Parkinson's disease : Characterisation and intervention outcomes
<p dir="ltr">Most individuals with Parkinson's disease (PD) experience changes in speech, voice or communication. Speech changes often manifest as hypokinetic dysarthria, a m...
Animal Alarm Calls
Animal Alarm Calls
Alarm calls are broadly defined as calls occurring in a predator context. Alarm calls have been the subject of intense scrutiny in animal communication research, as they are releva...
Brain mechanism of unfamiliar and familiar voice processing: an activation likelihood estimation meta-analysis
Brain mechanism of unfamiliar and familiar voice processing: an activation likelihood estimation meta-analysis
Interpersonal communication through vocal information is very important for human society. During verbal interactions, our vocal cord vibrations convey important information regard...
How to speak and vocal hygiene
How to speak and vocal hygiene
An abnormal tongue shape, pitch difference or voice quality can lead to difficulty communicating effectively. Common among teachers are voice issues, which can be uncomfortable and...
From Voice Signals to Voice Maps
From Voice Signals to Voice Maps
Abstract
This article is intended as an introductory tutorial for technically inclined clinicians, vocologists and voice pedagogues who want ...
Telepractice program in voice therapy for primary school teachers: A Pilot study
Telepractice program in voice therapy for primary school teachers: A Pilot study
Background: Teaching is an occupation where teachers consistently use their voices. However, excessive voice use causes voice disorders, especially in primary school teachers. Ther...

