Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Robo or unsolicited calls have become a persistent issue in telecommunication networks, posing significant challenges to individuals, businesses, and regulatory authorities. These calls not only trick users into disclosing their private and financial information, but also affect their productivity through unwanted phone ringing. A proactive approach to identify and block such unsolicited calls is essential to protect users and service providers from potential harm. Therein, this paper proposes a solution to identify robo-callers in the telephony network utilising a set of novel features to evaluate the trustworthiness of callers in a network. The trust score of the callers is then used along with machine learning models to classify them as legitimate or robo-caller. We use a large anonymized dataset (call detailed records) from a large telecommunication provider containing more than 1 billion records collected over 10 days. We have conducted extensive evaluation demonstrating that the proposed approach achieves high accuracy and detection rate whilst minimizing the error rate. Specifically, the proposed features when used collectively achieve a true-positive rate of around 97% with a false-positive rate of less than 0.01%.
D. Shin, J. Ahn, and C. Shim, Progressive multi gray-leveling: A voice spam protection algorithm, IEEE Netw., vol. 20, no. 5, pp. 18–24, 2006.
M. A. Azad, S. Bag, C. Perera, M. Barhamgi, and F. Hao, Authentic caller: Self-enforcing authentication in a next-generation network, IEEE Trans. Ind. Inf., vol. 16, no. 5, pp. 3606–3615, 2020.
P. Kolan and R. Dantu, Socio-technical defense against voice spamming, ACM Trans. Auton. Adapt. Syst., vol. 2, no. 1, pp. 2–es, 2007.
M. A. Azad and R. Morla, Caller-REP: Detecting unwanted calls with caller social strength, Comput. Secur., vol. 39, pp. 219–236, 2013.
W. Henecka and M. Roughan, Privacy-preserving fraud detection across multiple phone record databases, IEEE Trans. Dependable Secure Comput., vol. 12, no. 6, pp. 640–651, 2015.
P. O. Boykin and V. P. Roychowdhury, Leveraging social networks to fight spam, Computer, vol. 38, no. 4, pp. 61–68, 2005.
M. A. Azad, R. Morla, and K. Salah, Systems and methods for SPIT detection in VoIP: Survey and future directions, Comput. Secur., vol. 77, pp. 1–20, 2018.
M. A. Azad, R. Morla, J. Arshad, and K. Salah, Clustering VoIP caller for SPIT identification, Secur. Commun. Netw., vol. 9, no. 18, pp. 4827–4838, 2016.
S. Chiappetta, C. Mazzariello, R. Presta, and S. P. Romano, An anomaly-based approach to the analysis of the social behavior of VoIP users, Comput. Netw., vol. 57, no. 6, pp. 1545–1559, 2013.
M. A. Azad and R. Morla, Rapid detection of spammers through collaborative information sharing across multiple service providers, Future Gener. Comput. Syst., vol. 95, pp. 841–854, 2019.
1070
Views
317
Downloads
0
Crossref
0
Web of Science
0
Scopus
0
CSCD
Altmetrics
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).