Detection and management of SPIT calls in VoiceOver-IP Services
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 3
Abstract
Voice over IP (VoIP) technology has become a key role in the development for providing telephony services at a lower cost with a higher flexibility. VoIP services are faced with several security issues and threats such as call rerouting, toll fraud, and conversation hijacking. However, spam calls over IP telephony commonly called SPIT are becoming an increasing nuisance. The focus of this paper concerns the modelling of calls to in one hand improve a popular algorithm for supervised learning, called AdaboostSVM for classification calls into Spam and Not Spam. On the other hand to calculate the SPIT level and exploits security safeguards to reduce the risk level in an automatic manner. The performance of our approach is evaluated through a series of tests on real data. The later is constructed based on a telephone network using the asterisk server.
Authors and Affiliations
Asma jebrane, A. Toumanari, M. Bousseta
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens
Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth...
Image Segmentation Using Stake-Denotes Algorithm
In this paper, we present stake k-mean fragmentation and regions tracking model, which aims at combining color, texture, pattern, and motion features. in the first the stake algorithm segmented the objects which are...
Implementation and Analysis of Image Contrast Enhancement using Gaussian Mixture Model
In this paper, we propose a new global contrast enhancement algorithm using the histogram color and depth images. On the basis of the histogram-modification framework, the color and depth image histograms are first p...
Securing a Network by Modeling and Containment of Worms Using Preference Scanning
Self-propagating codes, called worms. In this paper, we present an inclination branching process model for characterizing the propagation of Internet worms. Basically user knows the name and the definition of worms, b...
Recent Trends In 4G Over 3G Technology
The objective of this paper is to evaluate recent trends in Fourth generation (4G) mobile services. Given the success of Third generation (3G) mobile communications systems and services, the third generation mobile n...