Analysis of techniques for protection against spam over internet telephony

Vincent M. Quinten*, Remco Van De Meent, Aiko Pras

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    20 Citations (Scopus)

    Abstract

    Spam in Internet telephony (SPIT) networks is likely to become a large problem in the future, as more and more people and companies switch from traditional telephone networks to Voice over IP (VoIP) networks, and as it is easy to spam VoIP users. The goal of this survey paper is to identify techniques to prevent and reduce SPIT. To compare the various SPIT protection techniques, criteria will be presented that must be met by these techniques. We also identify several combinations of techniques that complement each other, to increase the protection effectiveness.

    Original languageEnglish
    Title of host publicationDependable and Adaptable Networks and Services - 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007, Proceedings
    Pages70-77
    Number of pages8
    Publication statusPublished - 1-Dec-2007
    Event13th Open European Network of Universities and Companies in Information and Communication Engineering Summer School: IFIP TC6.6 Workshop, EUNICE 2007 - Enschede, Netherlands
    Duration: 18-Jul-200720-Jul-2007

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume4606 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference13th Open European Network of Universities and Companies in Information and Communication Engineering Summer School: IFIP TC6.6 Workshop, EUNICE 2007
    Country/TerritoryNetherlands
    CityEnschede
    Period18/07/200720/07/2007

    Fingerprint

    Dive into the research topics of 'Analysis of techniques for protection against spam over internet telephony'. Together they form a unique fingerprint.

    Cite this