skip to main content
research-article

Nuisance level of a voice call

Published: 30 October 2008 Publication History

Abstract

In our everyday life, we communicate with many people such as family, friends, neighbors, and colleagues. We communicate with them using different communication media such as email, telephone calls, and face-to-face interactions. While email is not real-time and face-to-face communications require geographic proximity, voice and video communications are preferred over other modes of communication. However, real-time voice/video calls may create nuisance to the receiver. In this article, we describe a mathematical model for computing nuisance level of incoming voice/video calls. We computed the closeness and nuisance level using the calling patterns between the caller and the callee. To validate the nuisance model, we collected cell phone call records of real-life people at our university and computed the nuisance value for all voice calls. We validated the nuisance levels using the feedback from those real-life people. Such a nuisance model is useful for predicting unwanted voice and video sessions in an IP communication network.

References

[1]
Biever, C. 2004. Move over spam, make way for “spit.” http://www.newscientist.com/article.ns?id=dn6445.
[2]
Canny, J. 2006. Is an HCI revolution just around the corner? ACM Queue 4, 6.
[3]
Cohen, W. W. 1996. Learning rules that classify e-mail. In Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access.
[4]
Dantu, R. and Kolan, P. 2004. Preventing voice spamming. In Proceedings of the IEEE GlobeComm Workshop on VoIP Security.
[5]
Dantu, R. and Kolan, P. 2005. Detecting spam in VoIP networks. In Proceedings of USENIX, SRUTI (Steps for Reducing Unwanted Traffic on the Internet).
[6]
Dantu, R. and Kolan, P. 2006. Survey of Calling Patterns. University of North Texas Internal Survey, http://secnet.csci.unt. edu/nuisance/.
[7]
Eagle, N. 2005. Machine perception and learning of complex social systems. PhD Dissertation, Massachusetts Institute of Technology.
[8]
Graham, P. 2002. A Plan for Spam. http://paulgraham.com/spam.html.
[9]
Granovetter, M. S. 1973. The strength of Weak Ties. Amer. J. Sociol. 78, 1360--1380.
[10]
Hershkop, S. 2005. URL Clustering to Classify Spam, Columbia University.
[11]
Hershkop, S. and Stolfo, S. J. 2004. Identifying spam without peeking at the contents. ACM Crossroads.
[12]
Hershkop, S. and Stolfo, S. J. 2005. Combining emails models for false positive reduction. In Proceeding of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. 98--107.
[13]
Khalil, A. and Connelly, K. H. 2005. Improving cell phone awareness by using calendar information. In Proceedings of International Conference on Human-Computer Interaction (INTERACT).
[14]
Khalil, A. and Connelly, K. H. 2006. Context-aware telephony: Privacy preferences and sharing patterns. In Proceedings of the Conference on Computer Supported Collaborative Work (CSCW).
[15]
Kolan, P., Vaithilingam, R., and Dantu, R. 2007. Automatic calibration using receiver operating characteristics curves. In Comsware Workshop. Bangalore, India.
[16]
Kolan, P. and Dantu, R. 2007. Socio-technical defense against voice spamming, ACM Trans. Auton. Adapt. Syst. 2, 1.
[17]
Lucy, S. 2006. Is your VoIP phone vulnerable? http://www.businessweek.com/technology/content/jun2006/tc20060613_799282. htm?campaign_id=bier_tcj.
[18]
Manber, U. 1994. Finding similar files in a large file system. In Usenix Winter (San Fransisco, CA), 1--10.
[19]
Marsden, P. V. and Campbell, K. E. 1984. Measuring tie strength. Social Forces 63, 2, 482--501.
[20]
Mitchell, T. M. 1997. Machine Learning. McGraw-Hill.
[21]
Rigoutsos, I. and Huynh, T. 2004. Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages. In Proceedings of the first Conference on E-mail and Anti-Spam.
[22]
Rosenberg, J., Shulzrinne, H., Camerillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and Schooler, E. 2002. Session Initiation Protocol. RFC 3261.
[23]
Rosenberg, J., Jennings, C., and Peterson, J. 2006. The Session Initiation Protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt
[24]
Sahami, M., Dumais, S., Heckerman, D., and Horvitz, E. 1998. A bayesian approach to filtering junk e-mail. Learning for text categorization—Papers from the National Conference on Artificial Intelligence Workshop, 55--62, AAAI Tech. Rep. WS-98-05.
[25]
Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C. D., and Stamatopoulos, P. 2003. A memory based approach to anti-spam filtering for mailing lists. Information Retrieval.
[26]
Salton, G. and McGill, M. J. 1998. Introduction to Modern Information Retrieval. McGraw-Hill.
[27]
Segal, R. B. and Kephart, J. O. 1999. MailCat: An intelligent assistant for organizing e-mail. In Proceedings of the 3rd International Conference on Autonomous Agents.
[28]
Shin, D. and Shim, C. 2005. Voice spam control with gray leveling. In Proceedings of 2nd VoIP Security Workshop, Washington, DC.
[29]
Soonthornphisaj, N., Chaikulseriwat, K., and Tang-on, P. 2002. Anti-spam filtering: A centroid based classification approach. Proceedings of the IEEE International Conference on Software Processes.

Cited By

View all
  • (2018)A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks2018 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2018.00034(53-69)Online publication date: May-2018
  • (2016)SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam2016 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2016.27(320-338)Online publication date: May-2016
  • (2011)Behavior-based adaptive call predictorACM Transactions on Autonomous and Adaptive Systems10.1145/2019583.20195886:3(1-28)Online publication date: 29-Sep-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 5, Issue 1
October 2008
201 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/1404880
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2008
Accepted: 01 October 2007
Revised: 01 July 2007
Received: 01 October 2006
Published in TOMM Volume 5, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Multimedia communications
  2. behavior
  3. nuisance
  4. presence
  5. security
  6. tolerance
  7. unwantedness

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks2018 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2018.00034(53-69)Online publication date: May-2018
  • (2016)SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam2016 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2016.27(320-338)Online publication date: May-2016
  • (2011)Behavior-based adaptive call predictorACM Transactions on Autonomous and Adaptive Systems10.1145/2019583.20195886:3(1-28)Online publication date: 29-Sep-2011
  • (2011)Towards ubiquitous computing with call predictionACM SIGMOBILE Mobile Computing and Communications Review10.1145/1978622.197862815:1(52-64)Online publication date: 7-Mar-2011
  • (2010)Mobile social closeness and communication patternsProceedings of the 7th IEEE conference on Consumer communications and networking conference10.5555/1834217.1834285(319-323)Online publication date: 9-Jan-2010
  • (2010)A testbed for large mobile social computing experimentsInternational Journal of Sensor Networks10.1504/IJSNET.2010.0346188:2(89-97)Online publication date: 1-Aug-2010
  • (2010)Mobile Social Closeness and Communication Patterns2010 7th IEEE Consumer Communications and Networking Conference10.1109/CCNC.2010.5421787(1-5)Online publication date: Jan-2010
  • (2009)A testbed for mobile social computing2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops10.1109/TRIDENTCOM.2009.4976250(1-6)Online publication date: Apr-2009
  • (2009)Issues and challenges in securing VoIPComputers and Security10.1016/j.cose.2009.05.00328:8(743-753)Online publication date: 1-Nov-2009
  • (2009)A Survey of Voice over IP Security ResearchProceedings of the 5th International Conference on Information Systems Security10.1007/978-3-642-10772-6_1(1-17)Online publication date: 15-Nov-2009
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media