Using decoys to block SPIT in the IMS

Includes bibliographical references (leaves 106-111) === In recent years, studies have shown that 80-85% of e-mails sent were spam. Another form of spam that has just surfaced is VoIP (Voice over Internet Telephony) spam. Currently, VoIP has seen an increasing numbers of users due to the cheap rates...

Full description

Bibliographic Details
Main Author: Salehin, S M Akramus
Other Authors: Ventura, Neco
Format: Dissertation
Language:English
Published: University of Cape Town 2014
Subjects:
Online Access:http://hdl.handle.net/11427/5110
id ndltd-netd.ac.za-oai-union.ndltd.org-uct-oai-localhost-11427-5110
record_format oai_dc
spelling ndltd-netd.ac.za-oai-union.ndltd.org-uct-oai-localhost-11427-51102020-12-10T05:11:02Z Using decoys to block SPIT in the IMS Salehin, S M Akramus Ventura, Neco Electrical Engineering Includes bibliographical references (leaves 106-111) In recent years, studies have shown that 80-85% of e-mails sent were spam. Another form of spam that has just surfaced is VoIP (Voice over Internet Telephony) spam. Currently, VoIP has seen an increasing numbers of users due to the cheap rates. With the introduction of the IMS (IP Multimedia Subsystem), the number of VoIP users are expected to increase dramatically. This calls for a cause of concern, as the tools and methods that have been used for blocking email spam may not be suitable for real-time voice calls. In addition, VoIP phones will have URI type addresses, so the same methods that were used to generate automated e-mail spam messages can be employed for unsolicited voice calls. Spammers will always be present to take advantage of and adapt to trends in communication technology. Therefore, it is important that IMS have structures in place to alleviate the problems of spam. Recent solutions proposed to block SPIT (Spam over Internet Telephony) have the following shortcomings: restricting the users to trusted senders, causing delays in voice call set-up, reducing the efficiency of the system by increasing burden on proxies which have to do some form of bayesian or statistical filtering, and requiring dramatic changes in the protocols being used. The proposed decoying system for the IMS fits well with the existing protocol structure, and customers are oblivious of its operation. 2014-07-31T10:52:53Z 2014-07-31T10:52:53Z 2007 Master Thesis Masters MSc http://hdl.handle.net/11427/5110 eng application/pdf University of Cape Town Faculty of Engineering and the Built Environment Department of Electrical Engineering
collection NDLTD
language English
format Dissertation
sources NDLTD
topic Electrical Engineering
spellingShingle Electrical Engineering
Salehin, S M Akramus
Using decoys to block SPIT in the IMS
description Includes bibliographical references (leaves 106-111) === In recent years, studies have shown that 80-85% of e-mails sent were spam. Another form of spam that has just surfaced is VoIP (Voice over Internet Telephony) spam. Currently, VoIP has seen an increasing numbers of users due to the cheap rates. With the introduction of the IMS (IP Multimedia Subsystem), the number of VoIP users are expected to increase dramatically. This calls for a cause of concern, as the tools and methods that have been used for blocking email spam may not be suitable for real-time voice calls. In addition, VoIP phones will have URI type addresses, so the same methods that were used to generate automated e-mail spam messages can be employed for unsolicited voice calls. Spammers will always be present to take advantage of and adapt to trends in communication technology. Therefore, it is important that IMS have structures in place to alleviate the problems of spam. Recent solutions proposed to block SPIT (Spam over Internet Telephony) have the following shortcomings: restricting the users to trusted senders, causing delays in voice call set-up, reducing the efficiency of the system by increasing burden on proxies which have to do some form of bayesian or statistical filtering, and requiring dramatic changes in the protocols being used. The proposed decoying system for the IMS fits well with the existing protocol structure, and customers are oblivious of its operation.
author2 Ventura, Neco
author_facet Ventura, Neco
Salehin, S M Akramus
author Salehin, S M Akramus
author_sort Salehin, S M Akramus
title Using decoys to block SPIT in the IMS
title_short Using decoys to block SPIT in the IMS
title_full Using decoys to block SPIT in the IMS
title_fullStr Using decoys to block SPIT in the IMS
title_full_unstemmed Using decoys to block SPIT in the IMS
title_sort using decoys to block spit in the ims
publisher University of Cape Town
publishDate 2014
url http://hdl.handle.net/11427/5110
work_keys_str_mv AT salehinsmakramus usingdecoystoblockspitintheims
_version_ 1719369380203069440