Pandit, 2021 - Google Patents
COMBATING ROBOCALLS TO ENHANCE TRUST IN CONVERGED TELEPHONYPandit, 2021
View PDF- Document ID
- 14160836203412258302
- Author
- Pandit S
- Publication year
External Links
Snippet
In absence of public details on how current phone security apps work internally, in this chapter we explore different approaches for building a phone blacklist. Specifically, we build five different blacklists using the four datasets described in section 3.2, and then evaluate …
- 230000000903 blocking effect 0 abstract description 55
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1066—Session control
- H04L65/1076—Screening
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/18—Comparators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818164B2 (en) | System and method for omnichannel social engineering attack avoidance | |
Tu et al. | Sok: Everyone hates robocalls: A survey of techniques against telephone spam | |
Tu et al. | Users really do answer telephone scams | |
Pandit et al. | Towards Measuring the Effectiveness of Telephony Blacklists. | |
Azad et al. | Caller-rep: Detecting unwanted calls with caller social strength | |
Prasad et al. | Who's calling? characterizing robocalls through audio and metadata analysis | |
EP3796627B1 (en) | Out-of-band call verification | |
US20230179628A1 (en) | Conversation-depth social engineering attack detection using attributes from automated dialog engagement | |
Razaq et al. | " We Even Borrowed Money From Our Neighbor" Understanding Mobile-based Frauds Through Victims' Experiences | |
Pandit et al. | Combating robocalls with phone virtual assistant mediated interaction | |
Azad et al. | Systems and methods for SPIT detection in VoIP: Survey and future directions | |
Iranmanesh et al. | A voice spam filter to clean subscribers’ mailbox | |
Pandit et al. | Applying deep learning to combat mass robocalls | |
Pandit et al. | Fighting voice spam with a virtual assistant prototype | |
Gupta et al. | Abusing phone numbers and cross-application features for crafting targeted attacks | |
Pandit | COMBATING ROBOCALLS TO ENHANCE TRUST IN CONVERGED TELEPHONY | |
Wood et al. | An analysis of scam baiting calls: Identifying and extracting scam stages and scripts | |
Liu | Understanding and Defending Against Telephone Scams with Large-Scale Data Analytics and Machine Learning Systems | |
US12028479B2 (en) | System and method for protecting subscriber data in the event of unwanted calls | |
Akinyemi et al. | Performance Evaluation of Machine Learning-based Robocalls Detection Models in Telephony Networks | |
Ferdous | Analysis and Protection of SIP based Services | |
Prasad et al. | Characterizing Robocalls with Multiple Vantage Points | |
Tu | From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmission | |
Baaijens et al. | Prepare for VoIP Spam | |
Azad | Towards mitigating unwanted calls in voice over IP |