{"id":90280,"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00090280","sets":["581:7002:7080"]},"path":["7080"],"owner":"11","recid":"90280","title":["Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships"],"pubdate":{"attribute_name":"公開日","attribute_value":"2013-02-15"},"_buckets":{"deposit":"945ae79b-f0b1-48f4-89ba-ac5d663201c2"},"_deposit":{"id":"90280","pid":{"type":"depid","value":"90280","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships","author_link":["358263","358267","358264","358268","358266","358265"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships"},{"subitem_title":"Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:ネットワークサービスと分散処理] VoIP, SPIT, Trust","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2013-02-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Nara Institutute of Science and Technology"},{"subitem_text_value":"Nara Institutute of Science and Technology"},{"subitem_text_value":"Nara Institutute of Science and Technology"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Nara Institutute of Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Nara Institutute of Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Nara Institutute of Science and Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":11,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/90280/files/IPSJ-JNL5402020.pdf","label":"IPSJ-JNL5402020"},"date":[{"dateType":"Available","dateValue":"2015-02-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5402020.pdf","filesize":[{"value":"845.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"ff759c88-a900-4d15-afd3-a59cf6c6f35e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2013 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Noppawat, Chaisamran"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takeshi, Okuda"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Suguru, Yamaguchi"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Noppawat, Chaisamran","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takeshi, Okuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Suguru, Yamaguchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Spam over Internet Telephony (SPIT) will become a serious threat in the near future because of the growing number of Voice over IP (VoIP) users, the ease of spam implementation, and the low cost of VoIP service. Due to the real-time processing requirements of voice communication, SPIT is more difficult to filter than email spam. In this paper, we propose a trust-based mechanism that uses the duration of calls and call direction between users to distinguish legitimate callers from spammers. The trust value is adjustable according to the calling behavior. We also propose a trust inference mechanism in order to calculate a trust value for an unknown caller to a callee. Realistic simulation results show that our approaches are effective in discriminating spam calls from legitimate calls.\n\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.21(2013) No.2 (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.21.188\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Spam over Internet Telephony (SPIT) will become a serious threat in the near future because of the growing number of Voice over IP (VoIP) users, the ease of spam implementation, and the low cost of VoIP service. Due to the real-time processing requirements of voice communication, SPIT is more difficult to filter than email spam. In this paper, we propose a trust-based mechanism that uses the duration of calls and call direction between users to distinguish legitimate callers from spammers. The trust value is adjustable according to the calling behavior. We also propose a trust inference mechanism in order to calculate a trust value for an unknown caller to a callee. Realistic simulation results show that our approaches are effective in discriminating spam calls from legitimate calls.\n\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.21(2013) No.2 (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.21.188\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2013-02-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"54"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"updated":"2025-01-20T06:49:15.244204+00:00","created":"2025-01-18T23:39:53.406791+00:00","links":{}}