An anomaly-based approach to the analysis of the social behavior of VoIP users
نویسندگان
چکیده
In this paper we present the results of a study we recently conducted by analyzing a large data set of VoIP Call Detail Records (CDRs), provided by an Italian telecom operator. The objectives of this study were twofold: (i) first, to provide a representation of users behavior, as well as of their mutual interaction and communication patterns, allowing to identify certain easily separable user categories; and (ii) second, to design and implement a framework calculating such a representation starting from CDR, capable of operating within certain time constraints, and grouping users using unsupervised techniques. The paper shows how we can reliably identify behavioral patterns associated with the most common anomalous behaviors of VoIP users. It also exploits the expressive power of relational graphs in order to both validate the results of the unsupervised analysis and ease their interpretation by human operators. 2013 Elsevier B.V. All rights reserved.
منابع مشابه
Analysis and Modeling of VoIP Servers: A Linear Programming Approach
The SIP protocol was standardized by the IETF at the application layer for initiating, managing, and terminating multimedia sessions and has been widely used as the main signaling protocol on both the Internet and VoIP networks. Most challenges in this protocol are overload and lack of proper state distribution. These challenges cause a wide range of next-generation network users to face a shar...
متن کاملBehavior-Based Online Anomaly Detection for a Nationwide Short Message Service
As fraudsters understand the time window and act fast, real-time fraud management systems becomes necessary in Telecommunication Industry. In this work, by analyzing traces collected from a nationwide cellular network over a period of a month, an online behavior-based anomaly detection system is provided. Over time, users' interactions with the network provides a vast amount of usage data. Thes...
متن کاملDetecting Denial of Service Message Flooding Attacks in SIP based Services
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
متن کاملInformation-seeking behavior of the everyday life of Kermanshah Kurds in social networks: an exploratory approach
Aim: Growing number social network users for communicating between groups has made them a major segment of peoplechr('39')s social life. So, the purpose of this study is to identify the factors affecting the use of social networks and information-seeking behavior in daily life of the Kurds in virtual networks and effect of ethnic identity on the behavior of information-seeking in their da...
متن کاملThe Role of Sexual Behaviors in the Relapse Process in Iranian Methamphetamine Users: A Qualitative Study
Background: The awareness of sexual experiences could be an effective factor in preventing high-risk sexual behavior pertaining to relapse during the recovery period of substances. This research explored the role of sexual behaviors among Iranian methamphetamine (MA) users in relapse process.Methods: The study was conducted with a qualitative approach using content analysis method. 28 particip...
متن کاملThe Role of Online Social Networks in Users' Everyday-Life Information Seeking
Background and Aim: Considering the increasing number of users who interact with online social networks, it can be inferred that these networks have become an essential part of users' lives and play different roles in their everyday life. Therefore, the present study aims to explore the role of these networks in users' everyday-life information seeking. Method: This research is an applied resea...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 57 شماره
صفحات -
تاریخ انتشار 2013