Using decoys to block SPIT in the IMS

dc.contributor.advisorVentura, Necoen_ZA
dc.contributor.authorSalehin, S M Akramusen_ZA
dc.date.accessioned2014-07-31T10:52:53Z
dc.date.available2014-07-31T10:52:53Z
dc.date.issued2007en_ZA
dc.descriptionIncludes bibliographical references (leaves 106-111)
dc.description.abstractIn recent years, studies have shown that 80-85% of e-mails sent were spam. Another form of spam that has just surfaced is VoIP (Voice over Internet Telephony) spam. Currently, VoIP has seen an increasing numbers of users due to the cheap rates. With the introduction of the IMS (IP Multimedia Subsystem), the number of VoIP users are expected to increase dramatically. This calls for a cause of concern, as the tools and methods that have been used for blocking email spam may not be suitable for real-time voice calls. In addition, VoIP phones will have URI type addresses, so the same methods that were used to generate automated e-mail spam messages can be employed for unsolicited voice calls. Spammers will always be present to take advantage of and adapt to trends in communication technology. Therefore, it is important that IMS have structures in place to alleviate the problems of spam. Recent solutions proposed to block SPIT (Spam over Internet Telephony) have the following shortcomings: restricting the users to trusted senders, causing delays in voice call set-up, reducing the efficiency of the system by increasing burden on proxies which have to do some form of bayesian or statistical filtering, and requiring dramatic changes in the protocols being used. The proposed decoying system for the IMS fits well with the existing protocol structure, and customers are oblivious of its operation.en_ZA
dc.identifier.apacitationSalehin, S. M. A. (2007). <i>Using decoys to block SPIT in the IMS</i>. (Thesis). University of Cape Town ,Faculty of Engineering & the Built Environment ,Department of Electrical Engineering. Retrieved from http://hdl.handle.net/11427/5110en_ZA
dc.identifier.chicagocitationSalehin, S M Akramus. <i>"Using decoys to block SPIT in the IMS."</i> Thesis., University of Cape Town ,Faculty of Engineering & the Built Environment ,Department of Electrical Engineering, 2007. http://hdl.handle.net/11427/5110en_ZA
dc.identifier.citationSalehin, S. 2007. Using decoys to block SPIT in the IMS. University of Cape Town.en_ZA
dc.identifier.ris TY - Thesis / Dissertation AU - Salehin, S M Akramus AB - In recent years, studies have shown that 80-85% of e-mails sent were spam. Another form of spam that has just surfaced is VoIP (Voice over Internet Telephony) spam. Currently, VoIP has seen an increasing numbers of users due to the cheap rates. With the introduction of the IMS (IP Multimedia Subsystem), the number of VoIP users are expected to increase dramatically. This calls for a cause of concern, as the tools and methods that have been used for blocking email spam may not be suitable for real-time voice calls. In addition, VoIP phones will have URI type addresses, so the same methods that were used to generate automated e-mail spam messages can be employed for unsolicited voice calls. Spammers will always be present to take advantage of and adapt to trends in communication technology. Therefore, it is important that IMS have structures in place to alleviate the problems of spam. Recent solutions proposed to block SPIT (Spam over Internet Telephony) have the following shortcomings: restricting the users to trusted senders, causing delays in voice call set-up, reducing the efficiency of the system by increasing burden on proxies which have to do some form of bayesian or statistical filtering, and requiring dramatic changes in the protocols being used. The proposed decoying system for the IMS fits well with the existing protocol structure, and customers are oblivious of its operation. DA - 2007 DB - OpenUCT DP - University of Cape Town LK - https://open.uct.ac.za PB - University of Cape Town PY - 2007 T1 - Using decoys to block SPIT in the IMS TI - Using decoys to block SPIT in the IMS UR - http://hdl.handle.net/11427/5110 ER - en_ZA
dc.identifier.urihttp://hdl.handle.net/11427/5110
dc.identifier.vancouvercitationSalehin SMA. Using decoys to block SPIT in the IMS. [Thesis]. University of Cape Town ,Faculty of Engineering & the Built Environment ,Department of Electrical Engineering, 2007 [cited yyyy month dd]. Available from: http://hdl.handle.net/11427/5110en_ZA
dc.language.isoengen_ZA
dc.publisher.departmentDepartment of Electrical Engineeringen_ZA
dc.publisher.facultyFaculty of Engineering and the Built Environment
dc.publisher.institutionUniversity of Cape Town
dc.subject.otherElectrical Engineeringen_ZA
dc.titleUsing decoys to block SPIT in the IMSen_ZA
dc.typeMaster Thesis
dc.type.qualificationlevelMasters
dc.type.qualificationnameMScen_ZA
uct.type.filetypeText
uct.type.filetypeImage
uct.type.publicationResearchen_ZA
uct.type.resourceThesisen_ZA
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
thesis_ebe_2007_salehin_sma.pdf
Size:
2.52 MB
Format:
Adobe Portable Document Format
Description:
Collections