SPIT identification criteria implementation: Effectiveness and lessons learned

9Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

While VoIP enables new means for communication, it may also provide a new way of transmitting bulk unsolicited messages and calls, namely SPam over Internet Telephony (SPIT). In this paper, we present the phases of a SPIT management process and we form a set of SPIT identification criteria, which are needed in order to characterize a call as SPIT, or a caller as spitter. Then, we present briefly the currently existing anti-SPIT frameworks, so as to examine which of the SPIT identification criteria is fulfilled by each framework, thus providing an insight on which criteria a technique should cope with, as well as how one can evaluate and combine existing approaches, in order to effectively mitigate SPIT. Finally, we implement a list of the criteria in our lab environment in order to examine the applicability of these controls in a Session Initiation Protocol (SIP) environment. © 2008 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Dritsas, S., Soupionis, Y., Theoharidou, M., Mallios, Y., & Gritzalis, D. (2008). SPIT identification criteria implementation: Effectiveness and lessons learned. In IFIP International Federation for Information Processing (Vol. 278, pp. 381–395). Springer New York. https://doi.org/10.1007/978-0-387-09699-5_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free