Detection and management of SPIT calls in VoiceOver-IP Services
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 3
Abstract
Voice over IP (VoIP) technology has become a key role in the development for providing telephony services at a lower cost with a higher flexibility. VoIP services are faced with several security issues and threats such as call rerouting, toll fraud, and conversation hijacking. However, spam calls over IP telephony commonly called SPIT are becoming an increasing nuisance. The focus of this paper concerns the modelling of calls to in one hand improve a popular algorithm for supervised learning, called AdaboostSVM for classification calls into Spam and Not Spam. On the other hand to calculate the SPIT level and exploits security safeguards to reduce the risk level in an automatic manner. The performance of our approach is evaluated through a series of tests on real data. The later is constructed based on a telephone network using the asterisk server.
Authors and Affiliations
Asma jebrane, A. Toumanari, M. Bousseta
A Novel Multi owner Data sharing Group key protocol
Storing data on remote cloud storage makes the maintenance affordable by data owners. The reliability and trustworthiness of these remote storage locations is the main concern for data owners and cloud service provid...
Real Time Digital Signal Processing Based On Optical OFDM
The adaptability provided for Eventually Tom's perusing OFDM may be connected as transfer speed granularity to the clients. Done such an approach that every about them will make guaranteed An certain level for servic...
A Novel Approach to Determine the Rules for Web Page Prediction using Dynamically Chosen K-Order Markov Models
The problem of predicting user’s behavior on a Web site has fundamental significance due to the rapid growth of the World Wide Web. Recent research initiatives have addressed the need for improved performance of Web...
Security and Privacy in the Context of the Public Clouds
The present perspective on the confidential data hosted in the cloud is based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on t...
Image Compression Technique Using Different Wavelet Function
With the development of Digital image processing technology there are several applications. One of the applications is an image compression. The paper assigned a comparative study has been done using different wavele...