Abstract
Unwanted calls from advertisers or phishers are a major nuisance for millions of mobile phone users. Manual blacklists are ineffective against this growing problem. A sophisticated approach is needed on the telephone operator side to detect spam calls based on malicious patterns. In this paper, we present a framework that uses network-relationship between mobile users for spam detection. Our framework has two main contributions: i) We propose an efficient and cost-effective method to construct a large, labeled spam detection graph by leveraging end-user collaboration; ii) We propose a graph neural network (GNN)-based model for the spam detection task. Our experiments show that our model outperforms strong baseline models in this research field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chaisamran, N., Okuda, T., Blanc, G., Yamaguchi, S.: Trust-based voip spam detection based on call duration and human relationships. In: 2011 IEEE/IPSJ International Symposium on Applications and the Internet, pp. 451–456 (2011). https://doi.org/10.1109/SAINT.2011.84
Elizalde, B., Emmanouilidou, D.: Detection of robocall and spam calls using acoustic features of incoming voicemails. In: Proceedings of Meetings on Acoustics, p. 060004. ASA, POMA (2021), https://www.microsoft.com/en-us/research/publication/detection-of-robocall-and-spam-calls-using-acoustic-features-of-incoming-voicemails/
Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. CoRR abs/1609.02907 (2016). arxiv.org/abs/1609.02907
Kontsewaya, Y., Antonov, E., Artamonov, A.: Evaluating the effectiveness of machine learning methods for spam detection. Procedia Comput. Sci. 190(C), 479–486 (2021). https://doi.org/10.1016/j.procs.2021.06.056
Lentzen, D., Grutzek, G., Knospe, H., Porschmann, C.: Content-based detection and prevention of spam over IP telephony - system design, prototype and first results. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–5 (2011). https://doi.org/10.1109/icc.2011.5963108
Li, H., et al: A machine learning approach to prevent malicious calls over telephony networks. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 53–69 (2018). https://doi.org/10.1109/SP.2018.00034
Li, R., Yu, J.X., Qin, L., Mao, R., Jin, T.: On random walk based graph sampling. In: Gehrke, J., Lehner, W., Shim, K., Cha, S.K., Lohman, G.M. (eds.) 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, 13–17 April 2015, pp. 927–938. IEEE Computer Society (2015). https://doi.org/10.1109/ICDE.2015.7113345
MacIntosh, R., Vinokurov, D.: Detection and mitigation of spam in IP telephony networks using signaling protocol analysis. In: IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005, pp. 49–52 (2005). https://doi.org/10.1109/SARNOF.2005.1426509
Peterson, J., Jennings, C.: Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP). RFC 4474 (2006). https://doi.org/10.17487/RFC4474, www.rfc-editor.org/info/rfc4474
Rosenberg, J.D., Jennings, C.: The session initiation protocol (SIP) and spam. RFC 5039, pp. 1–28 (2008). https://doi.org/10.17487/RFC5039
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Nguyen, TK., Tran, VT., Nguyen, HA., Bui, KH.N. (2023). A Novel Method for Spam Call Detection Using Graph Convolutional Networks. In: Nguyen, N.T., et al. Recent Challenges in Intelligent Information and Database Systems. ACIIDS 2023. Communications in Computer and Information Science, vol 1863. Springer, Cham. https://doi.org/10.1007/978-3-031-42430-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-42430-4_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-42429-8
Online ISBN: 978-3-031-42430-4
eBook Packages: Computer ScienceComputer Science (R0)