TruSMS: A trustworthy SMS spam control system based on trust management

被引:34
作者
Chen, Liang [1 ]
Yan, Zheng [1 ,2 ]
Zhang, Weidong [1 ]
Kantola, Raimo [2 ]
机构
[1] Xidian Univ, State Key Lab ISN, Sch Telecommun Engn, Xian, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo, Finland
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2015年 / 49卷
关键词
Trust management; Spam control; Traffic analysis; Trust mining; Performance evaluation;
D O I
10.1016/j.future.2014.06.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The fast growth of mobile networks has greatly enriched our life by disseminating information and providing communications at any time and anywhere. However, at the same time, when people gather and exchange useful information, they also receive unwanted data and contents, such as spam and unsolicited commercial advertisements. SMS (Short Message Service) spam is one typical example of unwanted contents, which has caused a serious problem to mobile users by intruding their devices, occupying device memories and irritating the users. More critically, some of these fraudulent messages deceive users and cause them incalculable loss. SMS spam control has become a crucial issue that impacts the further success of mobile networks. A number of researches have been conducted to control unwanted contents or traffic, some are based on trust and reputation mechanisms. But the literature still lacks an effective solution for SMS spam control. In this paper, we present the design and implementation of an SMS spam control system named TruSMS based on trust management. It can control SMS spam from its source to destinations according to trust evaluation by analyzing spam detection behaviors and SMS traffic data. We evaluate TruSMS performance under a variety of intrusions and attacks with a prototype system implementation. The result shows that TruSMS is effective with regard to accuracy, efficiency and robustness, which imply its trustworthiness. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:77 / 93
页数:17
相关论文
共 33 条
  • [1] [Anonymous], 2004, VLDB
  • [2] [Anonymous], 1998, P 7 INT WORLD WID WE
  • [3] [Anonymous], WEB SPAM COLL
  • [4] [Anonymous], 2008, Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'08
  • [5] Bi J, 2008, IEEE INFOCOM SER, P371
  • [6] Deng WW, 2006, PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P1233
  • [7] Hong Zhang, 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in conjunction with the UIC 2009 and ATC 2009 Conferences, P513, DOI 10.1109/UIC-ATC.2009.15
  • [8] Multi-level reputation-based greylisting
    Janecek, Andreas G. K.
    Gansterer, Wilfried N.
    Kumar, K. Ashwin
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 10 - +
  • [9] Socio-Technical Defense against Voice Spamming
    Kolan, Prakash
    Dantu, Ram
    [J]. ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2007, 2 (01)
  • [10] Liu W., 2009, SAC 09 MARCH, P975, DOI DOI 10.1145/1529282.1529470