SoftNet 2016
August 21 - 25, 2016 - Rome, Italy

  • ICSEA 2016, The Eleventh International Conference on Software Engineering Advances
  • ICSNC 2016, The Eleventh International Conference on Systems and Networks Communications
  • CENTRIC 2016, The Ninth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2016, The Eighth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2016, The Eighth International Conference on Advances in System Simulation
  • SOTICS 2016,The Sixth International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2016, The Fifth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2016, The First International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NexTech 2016
October 9 - 13, 2016 - Venice, Italy

  • UBICOMM 2016, The Tenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2016, The Tenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2016, The Tenth International Conference on Advances in Semantic Processing
  • AMBIENT 2016, The Sixth International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2016, The Eighth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2016, The Fifth International Conference on Data Analytics
  • GLOBAL HEALTH 2016, The Fifth International Conference on Global Health Challenges
  • CYBER 2016, The First International Conference on Cyber-Technologies and Cyber-Systems

InfoWare 2016
November 13 - 17, 2016 - Barcelona, Spain

  • ICCGI 2016, The Eleventh International Multi-Conference on Computing in the Global Information Technology
  • ICWMC 2016, The Twelfth International Conference on Wireless and Mobile Communications
  • QoSE WMC 2016, The First International Workshop on QoS and Energy-aware Algorithms and Protocols in Wireless and Mobile Communications
  • VEHICULAR 2016, The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications
  • INTERNET 2016, The Eighth International Conference on Evolving Internet
  • COLLA 2016, The Sixth International Conference on Advanced Collaborative Networks, Systems and Applications
  • INTELLI 2016, The Fifth International Conference on Intelligent Systems and Applications
  • InManEnt 2016, The International Symposium on Intelligent Manufacturing Environments
  • VISUAL 2016, The First International Confernece on Applications and Systems of Visual Paradigms
  • HUSO 2016, The Second International Conference on Human and Social Analytics
  • BRAININFO 2016, The First International Conference on Neuroscience and Cognitive Brain Information

 


ThinkMind // International Journal On Advances in Telecommunications, volume 3, numbers 3 and 4, 2010 // View article tele_v3_n34_2010_8


Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony

Authors:
Jürgen Müller
Michael Massoth

Keywords: Communication system security; Telephone equipment; Telephony; Spam

Abstract:
Spam over Internet Telephony as the distribution of unwanted voice messages over Voice over Internet Protocol networks is an upcoming threat. It is harder to prevent than e-mail spam since its content is not available before the victim is annoyed. This is even more difficult if the spam is sent directly to the victim's user equipment, bypassing the proxies of the service provider. Hence, this messages cannot be filtered, since the proxies are no longer participating in the transaction. This article presents a pre-validation mechanism, which ensures a minimum level of trust about the caller. It assumes that a legal registered user does not send any spam, since his service provider will penalize him if he does so. Therefore, the pre-validation mechanism sends some requests to the presence server of the provider and the user equipment of the caller to validate their existence. This enables the knowledge to allow a call attempt of an unknown user.

Pages: 80 to 89

Copyright: Copyright (c) to authors, 2010. Used with permission.

Publication date: April 6, 2011

Published in: journal

ISSN: 1942-2601

SERVICES CONTACT
2010 - 2015 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.