Skip to main content

An Ontology-Driven antiSPIT Architecture

  • Conference paper
Next Generation Society. Technological and Legal Issues (e-Democracy 2009)

Abstract

Over the last years Voice-over-IP (VoIP) is getting widespread a dop tion from business and residential customers.The preference towards VoIP ser vices stems from the fact that VoIP provides many ways to com mu ni ca te, with a lower cost than traditional telephony. However, VoIP in its present form may allow malicious users to exploit a number of vulnerabilities, make bulk un so li cited telephony calls and send bulk unsolicited instant messages. This ex p loi ta tion is referred to as Spam over Internet Telephony (SPIT). In this pa per we int roduce an antiSPIT management architecture, by using on to logies, which allow domain administrators to detect and handle SPIT auto ma tically, ba s ed on pre de fined requirements and preferences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. VOIPSA, VoIP Security and Privacy Threat Taxonomy (October 2005), http://www.voipsa.org/Activities/taxonomy.php

  2. Rosenberg, J., Jennings, C.: The Session Initiation Protocol (SIP) and Spam, draft-ietf-sipping-SPAM-03 (October 2006)

    Google Scholar 

  3. Dritsas, S., Mallios, J., Theoharidou, M., Marias, G., Gritzalis, D.: Threat analysis of the Session Initiation Protocol regarding spam. In: Proc. of the 3rdIEEE International Workshop on Information Assurance (WIA 2007), April 2007, pp. 426–433. IEEE Press, USA (2007)

    Google Scholar 

  4. Marias, G., Dritsas, S., Theoharidou, M., Mallios, J., Gritzalis, D.: SIP vulnerabilities and anti-SPIT mechanisms assessment. In: Proc. of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007), August 2007, pp. 597–604. IEEE Press, Los Alamitos (2007)

    Chapter  Google Scholar 

  5. Gritzalis, D., Mallios, Y.: A SIP-based SPIT management framework. Computers & Security 27(5-6), 136–153 (2008)

    Article  Google Scholar 

  6. Rosenberg, J., et al.: SIP: Session Initiation Protocol, RFC 3261 (June 2002)

    Google Scholar 

  7. Johnston, A.: SIP: Understanding the Session Initiation Protocol. Artech House (2004)

    Google Scholar 

  8. Sloman, M., Lupu, E.: Security and management policy specification. IEEE Network, Special Issue on Policy-Based Networking 16(2), 10–19 (2002)

    Google Scholar 

  9. Dritsas, S., Soupionis, J., Theoharidou, M., Mallios, J., Gritzalis, D.: SPIT Identification Criteria Implementations: Effectiveness and Lessons Learned. In: Samarati, P., et al. (eds.) Proc. of the 23rd International Information Security Conference (SEC 2008), September 2008, pp. 381–395. Springer, Milan (2008)

    Google Scholar 

  10. Mallios, J., Dritsas, S., Tsoumas, B., Gritzalis, D.: Attack modeling of SIP-oriented SPIT. In: Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Gruber, T.: Toward principles for the design of ontologies used for knowledge sharing. In: Formal Ontology in Conceptual Analysis and Knowledge Representation, March 1993. Kluwer Academic Publishers, Dordrecht (1993)

    Google Scholar 

  12. Guarino, N.: Understanding, Building, and Using Ontologies: A commentary to “Using explicit ontologies in KBS development. International Journal of Human and Computer Studies 46(3/4), 293–310 (1997)

    Article  Google Scholar 

  13. Dritsas, S., Dritsou, V., Tsoumas, B., Constantopoulos, P., Gritzalis, D.: OntoSPIT: SPIT management through ontologies. Computer Communications (April 2008) (in press)

    Google Scholar 

  14. Dritsas, S., Mallios, J., Theoharidou, M., Marias, G., Gritzalis, D.: Threat analysis of the Session Initiation Protocol, regarding spam. In: Proc. of the 3rd IEEE International Workshop on Information Assurance, April 2007, pp. 426–433. IEEE Press, New Orleans (2007)

    Google Scholar 

  15. W3C Recommendation, The Ontology Web Language

    Google Scholar 

  16. OWL. W3C Recommendation. The Ontology Web Language (2004)

    Google Scholar 

  17. W3C. W3C Recommendation (10-02-2004), OWL Guide (2004)

    Google Scholar 

  18. Horrocks, I., Patel-Schneider, P., Boley, H., Tabet, S., Grosof, B., Dean, M.: SWRL: A Semantic Web Rule Language Combining OWL and RuleML, The DARPA Agent Markup Language Homepage

    Google Scholar 

  19. SIP Express Router (SER), Iptel.org.

    Google Scholar 

  20. Example SER deployments, http://mit.edu/sip/sip.edu/deployments.shtml

  21. Protégé, Ontology development environment (2005), http://protege.stanford.edu/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Dritsas, S., Gritzalis, D. (2010). An Ontology-Driven antiSPIT Architecture. In: Sideridis, A.B., Patrikakis, C.Z. (eds) Next Generation Society. Technological and Legal Issues. e-Democracy 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 26. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11631-5_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11631-5_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11629-2

  • Online ISBN: 978-3-642-11631-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics