SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Eyeball AntiSPIT Technology
www.eyeball.com
Copyright 2015
Page 2
Eyeball Networks AntiSPIT Technology
Introduction
Voice-over-IP (VoIP) is getting widespread adoption both from business and residential
customers. VoIP uses standard and open protocols such as Session Initiation Protocol (SIP)
or Real-Time Protocol (RTP) for voice and video call establishment and data transfer. Using
common computer technology and open standards for VoIP makes users vulnerable for the
various security problems already occurring in common Internet applications. These
vulnerabilities include:
□ Bulk and unsolicited calls for telemarketing, recorded advertisements and other
commercial purposes from anywhere in the world, at any time,
□ Harassment and abuse such as repeated automated calls,
□ Malicious service attacks leading to service disruptions (such as massive automated
calling from multiple machines), and
□ Exposure to unacceptable content such as illicit content or offensive language.
We use the term VoIP “spam over Internet telephony" or just “SPIT” to refer to the problems
described above and the term “spitter” describes VoIP users sending SPIT. If VoIP SPIT
cannot be prevented it may victimize any user including traditional telephony system users
(i.e. PSTN and mobile phone users).
Over two-thirds of the emails sent through the Internet currently represent spam emails.
However, if proper measures are not taken against VoIP SPIT, it will be a worse problem
than the current email problem as VoIP calls require real-time attention from callees.
According to NEC report, in Germany, a residential PSTN subscriber receives 2 voice
spam calls per week on an average. SPIT is ~ 1000 times cheaper than voice spam over
PSTN. With the implementation of IP Multimedia System (IMS), the mere volume of
potential SPIT calls using VoIP technology, where making a million calls becomes as simple
as making a single call, may render real-time communication systems e.g., PSTN, IP
Multimedia Subsystem (IMS) unusable.
Consequently, the mechanism employed by any AntiSPIT solution must not employ fixed
limits for single sources, but be usable in a way that complying users will not notice the
AntiSPIT mechanisms are in effect.
Requirements for SPIT-prevention
In a simplified view, a real-time communication system such as PSTN or a VoIP system
consists of two main components, the server and/or gateway system maintained by the
service providers and the end-points used by customers (residential or business). An end-
point may be a PSTN phone, a smart phone, an IP phone, a softphone or a messenger. In
order for VoIP and video telephony to be successful as a mainstream communication system,
it should meet the following requirements with respect to SPIT protection:
1. The server or gateway system should be able to block SPIT, forward “good” calls,
and flag suspicious calls before they are forwarded; and
Page 3
Eyeball Networks AntiSPIT Technology
2. The end-points should provide robust, simple and flexible means to protect end
users from SPIT calls.
The server/ gateway system has the following desired features:
 Dynamic monitoring and control of the service provided and the SPIT prevention
mechanisms;
 Preventing bulk unsolicited calling;
 Blocking calls from non-complying callers.
 Prevent “false positives”, i.e., avoiding complying users being blocked
 Providing minimal additional administration effort
 Using minimal and yet scalable computing and network resources
The end-points have the following desired features:
 Valid calls will not be blocked;
 Callees must have an easy and simple way to avoid SPIT calls and bad content (such
as using green, yellow and red color coding);
 Call filters based on validated user IDs, geographic location of callers, time of day etc.
 User interaction to avoid SPIT is minimal
 Parental control mechanisms are available to restrict call sources, destinations, total
calling time, time-of-day, and call content, in particular for video calls.
The patented Eyeball AntiSPIT technology supports those previously outlined requirements,
providing a safe environment for subscribers while keeping the overall administrative
effort for service providers low.
Eyeball’s AntiSPIT Technology secures existing SIP servers/ gateways to provide a SPIT-free environment.
Available Solutions
RFC 4474 proposes the identity management of the caller to avoid SPIT. RFC 5039 proposes
some basic methods for the mitigation of telephone spam over SIP:
 White Lists and Black Lists
 Consent-Based Communications
 Reputation Systems
 Address Obfuscation and Limited-Use Addresses
 Turing Tests, Captchas, Computational Puzzles
 Payment
 Legal actions
Commercial VoIP software needs to use behavioral analysis tools based on the above methods to
create an effective AntiSPIT policy.
Page 4
Eyeball Networks AntiSPIT Technology
Google Voice has used SPIT filtering since 2011. It has both the call screening option for
unknown callers and the spam filtering option for known SPITTERs (spammers). NEC Corp. has
developed VoIP SEAL tool that uses a Turning test for call filtering. Verizon recently
implemented the policy to eliminate voice mails without messages as a remedy to acute
Voice Mail SPAM problem, they were facing. Asterisk system provides random number
based challenge mechanism to block SPIT.
Eyeball AntiSPIT Technology
The patented Eyeball AntiSPIT technology is fully compliant with SIP (RFC3261) based VoIP
environments
Dynamic AntiSPIT Engine
Overview: Eyeball AntiSPIT Engine Input and Features
The dynamic AntiSPIT engine as the foundation of the Eyeball AntiSPIT technology
monitors call patterns, SPIT events and other relevant data to control calling rate limits of
callers. The dynamic approach limits only callers showing suspicious behavior, thus ensures
legitimate callers will not be affected while SPIT is effectively prevented. Two main metrics
to differentiate legitimate callers from spitters are:
 Dynamic Calling Rate Limit
For bulk calling, the spitters need to make a large number of calls to a large number of
callees within a short period of time. To restrict bulk calling, the AntiSPIT engine
employs a dynamic calling rate for each routable identity, e.g., SIP URI, interface IP
address such that abnormal calling behavior leads to a reduction of the ability to carry
Page 5
Eyeball Networks AntiSPIT Technology
out SPIT calls while not interfering with legitimate calls. The algorithm combines
various criteria related to SPIT, including the caller-callee relationship, and combines
this information into a single value used as dynamic calling rate limit for each caller.
Once the calling rate limit is exceeded, further calls can be blocked, challenged or
forwarded with a tag to the callee.
 Unique Callee Limit
Mass calling also requires a large number of callees. The unique callee limit can be
employed to restrict the number of unique callees for callers or caller groups.
The AntiSPIT engine computes dynamic calling rate limit and unique callee limit based on
various factors such as call patterns, caller location, and caller-callee relationship. The
Eyeball AntiSPIT engine combines those factors to compute a single value, which defines the
actual dynamic calling rate limit of a caller. Initially, callers are not limited in their capability
to make calls. Only incidents related to SPIT calls lead to a reduction of the calling rate.
Using this mechanism, only non-complying callers are affected by a reduction of their
capability to carry out further calls.
Based on the dynamic AntiSPIT engine, the Eyeball AntiSPIT technology provides a
complete SPIT prevention system for servers, gateways and end-point systems with the
following features:
 SPIT Rating for Incoming Calls
Adds a SPIT rating tag to call message based on caller’s calling rate, reputation and
caller-callee relation to enable call filtering at the receiver. The SPIT-rating can be used
by client applications such as the Eyeball SDK to indicate the nature of an incoming call.
 Caller Identification
Callers are identified using their SIP URI, SIP domain, IP address. Individual callers can
be monitored as well as a group of callers from a domain or behind a firewall or NAT
device.
 Challenge/Response Mechanism
The server uses a challenge/response mechanism whenever the calling rate limit of a
caller exceeds a predefined threshold. In this case, callers are challenged for manual
input before a call invitation is forwarded to the callee.
 Interoperability with 3rd Party SIP Proxy Servers and Gateways
Eyeball AntiSPIT Server can be configured to work with SIP proxies from Eyeball as well
as other 3rd party vendors such as Cisco/Dynamicsoft, Nortel, Iptel and Ubiquity.
Client-Side Features
Page 6
Eyeball Networks AntiSPIT Technology
Eyeball AntiSPIT technology also provides the following client-side features.
 Parental Control
Parents can control service usage using filtering techniques such as calling rate limit,
unique callee limit, total call duration, time-of-day, and call content monitoring (such as
skin-tone filtering).
 SPIT coding scheme
Client applications may indicate good, suspicious or bad calls using green, yellow or red
lights (or using different ring tones) respectively.
End-point protection example: SPIT notification using different colors informs about incoming calls
Potential Clients
VoIP hardware system manufacturers can incorporate Eyeball Anti-SPIT technology in
their gateways, servers and unified communication (UC) platforms. This will better
position competitively to address a potentially significant problem in the VoIP user
market. Additionaly, call termination point owners such as traditional telcos, UC
providers, ISPs, over-the-top service providers can utilize the Eyeball Anti-SPIT engine
to proactively address the SPIT problem.
Integration with existing VoIP Infrastructures
The Eyeball AntiSPIT technology is fully SIP-compliant. On the server side, the Eyeball
AntiSPIT technology is already integrated into the latest version of the Eyeball Video
Communication Server. Furthermore, the stand-alone AntiSPIT Server is available to
support existing SIP-based VoIP infrastructures. The stand-alone AntiSPIT Server
interoperates with a wide variety of different SIP servers, including Eyeball Video
Communications Server, Cisco/dynamicsoft, iptel.org SER, and others.
The client features such as parental control and SPIT-alerts using the coding scheme are
available in the latest Eyeball SDK, making the SPIT-rating available in any client based on
Good Call
Green
Good Call
Green
Potential SPIT call
Red
Potential SPIT call
Red
Page 7
Eyeball Networks AntiSPIT Technology
the SDK while remaining compliant and inter-operable with other standard-based SIP
servers.
Conclusion
With increasing popularity of open standard IP based real-time communication such as
WebRTC, the risk of being attacked and affected by SPIT of various kinds increases. This
includes not only mass calling and scan attempts but also harassment and exposure to
unacceptable content especially when using video phones. The problem does not only have
impact on IP based systems but may also spread to traditional PSTN via gateways.
Therefore, effective means for protecting IP telephony installations from mass calling
attempts, hacker attacks, and other threats are required.
The patented Eyeball AntiSPIT technology, a complete client and server solution for SPIT
protection and prevention, addresses the previously described security problems effectively.
About Eyeball Networks
Eyeball Networks is a world leader in VoIP and video telephony software for service
providers and device manufacturers. Eyeball's patented Any-Bandwidth™ and Any-
Firewall™ Technologies guarantee the best possible voice and video quality for every
subscriber, over any Internet connection, across any firewall, and on any device. Eyeball's
endpoint and server software supports more than 6 million VoIP and video telephony
subscribers and 10 billion call minutes for more than 100 service providers in North
America, Europe and Asia.
Founded in 2000, Eyeball Networks is a privately-held company headquartered in
Vancouver, British Columbia. For more information, visit www.eyeball.com.
Global Offices
Corporate Headquarters
Eyeball Networks Inc.
500 - 100 Park Royal
West Vancouver, B.C.
Canada, V7T 1A2
Phone: 604.921.5993
Fax: 604.921.5909
Regional Offices
USA
451 37th Street
New York, NY 10016
Phone: 646.428.5383
Japan
Tamachi East 803
2-16, Shibaura
3-chome, Minato-ku
Tokyo
Phone: +81 (3) 5440-4533
Fax: +81 (3) 5440-4533
Page 8
Eyeball Networks AntiSPIT Technology
United Kingdom
1A Orton Lane
Wombourne
Wolverhampton
WV5 9AN
Phone: +44 (0) 560 043 3364
Fax: +44 (0) 870 762 6001
Contact Eyeball Networks today for a live demonstration of our soft clients and servers.
Sales: sales@eyeball.com
Support: techsupport@eyeball.com
Page 9
Eyeball Networks AntiSPIT Technology
Standards and Codecs
A key to Eyeball’s success in providing the industry’s highest call completion is the
intelligence at the endpoints which discovers the type of firewall(s) in use and for smart
prediction of address and ports that can be used to complete a VoIP or video call.
Eyeball endpoint and server software is fully compliant with IETF standards and drafts
such as SIP and SIMPLE. Eyeball Any-Firewall™ Technology uses standard protocols
including STUN, TURN and ICE for exchanging connection information (such as address
and port options) for completion of voice and video calls.
 RFC 3261 (SIP: Session Initiation Protocol)
 ^ RFC 4474 (Enhancements for Authenticated Identity Management in the
Session Initiation Protocol (SIP))
 RFC 5039 (The Session Initiation Protocol (SIP) and Spam)
 3GPP TR33.937 version 11.0.0 Release 11 (Universal Mobile
Telecommunications System (UMTS); LTE; Study of mechanisms for
Protection against Unsolicited Communication for IMS (PUCI))
 "Unsolicited Communication/SPIT/multimedia-SPAM overview of this topic in
different SDOs," NEC Presentation, 3rd ETSI Security Workshop, Jan 2008.
 RFC 3665 (SIP Basic Call Flow)
 RFC 2617 (HTTP Authentication: Basic and Digest Access Authentication)
 RFC 3428 (SIP Extension for Instant Messaging)
 RFC 3263 (Locating SIP Servers)
 RFC 2327 (SDP: Session Description Protocol)
 RFC 2787 (DNS SRV)
 RFC 2190 (RTP Payload for H.263 Video Streams)
 RFC 3264 (Offer/Answer Model with SDP)
 RFC 3550 (RTP Protocol for Real-Time Applications)
 RFC 2833 (RTP Payload for DTMF Digits, Signals)
 RFC 3489 (STUN - Simple Traversal of User Datagram Protocol Through
Network Address Translators)
 RFC 3920 (Extensible Messaging and Presence Protocol (XMPP): Core)
 RFC 3921 (Extensible Messaging and Presence Protocol (XMPP): Instant
Messaging and Presence)
 Voice codecs: G.711, G.729A, GSM 6.10, iLBC, Speex, Speex-wb
 Video codecs: H.263, H.264, MPEG-4 and EyeStream
 http://forums.verizon.com/t5/Share-Your-Ideas-with-Verizon/FIOS-Voice-Mail-
Spam/idi-p/568561

Más contenido relacionado

Último

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Último (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

AntiSpit Server Admin Guide

  • 2. Page 2 Eyeball Networks AntiSPIT Technology Introduction Voice-over-IP (VoIP) is getting widespread adoption both from business and residential customers. VoIP uses standard and open protocols such as Session Initiation Protocol (SIP) or Real-Time Protocol (RTP) for voice and video call establishment and data transfer. Using common computer technology and open standards for VoIP makes users vulnerable for the various security problems already occurring in common Internet applications. These vulnerabilities include: □ Bulk and unsolicited calls for telemarketing, recorded advertisements and other commercial purposes from anywhere in the world, at any time, □ Harassment and abuse such as repeated automated calls, □ Malicious service attacks leading to service disruptions (such as massive automated calling from multiple machines), and □ Exposure to unacceptable content such as illicit content or offensive language. We use the term VoIP “spam over Internet telephony" or just “SPIT” to refer to the problems described above and the term “spitter” describes VoIP users sending SPIT. If VoIP SPIT cannot be prevented it may victimize any user including traditional telephony system users (i.e. PSTN and mobile phone users). Over two-thirds of the emails sent through the Internet currently represent spam emails. However, if proper measures are not taken against VoIP SPIT, it will be a worse problem than the current email problem as VoIP calls require real-time attention from callees. According to NEC report, in Germany, a residential PSTN subscriber receives 2 voice spam calls per week on an average. SPIT is ~ 1000 times cheaper than voice spam over PSTN. With the implementation of IP Multimedia System (IMS), the mere volume of potential SPIT calls using VoIP technology, where making a million calls becomes as simple as making a single call, may render real-time communication systems e.g., PSTN, IP Multimedia Subsystem (IMS) unusable. Consequently, the mechanism employed by any AntiSPIT solution must not employ fixed limits for single sources, but be usable in a way that complying users will not notice the AntiSPIT mechanisms are in effect. Requirements for SPIT-prevention In a simplified view, a real-time communication system such as PSTN or a VoIP system consists of two main components, the server and/or gateway system maintained by the service providers and the end-points used by customers (residential or business). An end- point may be a PSTN phone, a smart phone, an IP phone, a softphone or a messenger. In order for VoIP and video telephony to be successful as a mainstream communication system, it should meet the following requirements with respect to SPIT protection: 1. The server or gateway system should be able to block SPIT, forward “good” calls, and flag suspicious calls before they are forwarded; and
  • 3. Page 3 Eyeball Networks AntiSPIT Technology 2. The end-points should provide robust, simple and flexible means to protect end users from SPIT calls. The server/ gateway system has the following desired features:  Dynamic monitoring and control of the service provided and the SPIT prevention mechanisms;  Preventing bulk unsolicited calling;  Blocking calls from non-complying callers.  Prevent “false positives”, i.e., avoiding complying users being blocked  Providing minimal additional administration effort  Using minimal and yet scalable computing and network resources The end-points have the following desired features:  Valid calls will not be blocked;  Callees must have an easy and simple way to avoid SPIT calls and bad content (such as using green, yellow and red color coding);  Call filters based on validated user IDs, geographic location of callers, time of day etc.  User interaction to avoid SPIT is minimal  Parental control mechanisms are available to restrict call sources, destinations, total calling time, time-of-day, and call content, in particular for video calls. The patented Eyeball AntiSPIT technology supports those previously outlined requirements, providing a safe environment for subscribers while keeping the overall administrative effort for service providers low. Eyeball’s AntiSPIT Technology secures existing SIP servers/ gateways to provide a SPIT-free environment. Available Solutions RFC 4474 proposes the identity management of the caller to avoid SPIT. RFC 5039 proposes some basic methods for the mitigation of telephone spam over SIP:  White Lists and Black Lists  Consent-Based Communications  Reputation Systems  Address Obfuscation and Limited-Use Addresses  Turing Tests, Captchas, Computational Puzzles  Payment  Legal actions Commercial VoIP software needs to use behavioral analysis tools based on the above methods to create an effective AntiSPIT policy.
  • 4. Page 4 Eyeball Networks AntiSPIT Technology Google Voice has used SPIT filtering since 2011. It has both the call screening option for unknown callers and the spam filtering option for known SPITTERs (spammers). NEC Corp. has developed VoIP SEAL tool that uses a Turning test for call filtering. Verizon recently implemented the policy to eliminate voice mails without messages as a remedy to acute Voice Mail SPAM problem, they were facing. Asterisk system provides random number based challenge mechanism to block SPIT. Eyeball AntiSPIT Technology The patented Eyeball AntiSPIT technology is fully compliant with SIP (RFC3261) based VoIP environments Dynamic AntiSPIT Engine Overview: Eyeball AntiSPIT Engine Input and Features The dynamic AntiSPIT engine as the foundation of the Eyeball AntiSPIT technology monitors call patterns, SPIT events and other relevant data to control calling rate limits of callers. The dynamic approach limits only callers showing suspicious behavior, thus ensures legitimate callers will not be affected while SPIT is effectively prevented. Two main metrics to differentiate legitimate callers from spitters are:  Dynamic Calling Rate Limit For bulk calling, the spitters need to make a large number of calls to a large number of callees within a short period of time. To restrict bulk calling, the AntiSPIT engine employs a dynamic calling rate for each routable identity, e.g., SIP URI, interface IP address such that abnormal calling behavior leads to a reduction of the ability to carry
  • 5. Page 5 Eyeball Networks AntiSPIT Technology out SPIT calls while not interfering with legitimate calls. The algorithm combines various criteria related to SPIT, including the caller-callee relationship, and combines this information into a single value used as dynamic calling rate limit for each caller. Once the calling rate limit is exceeded, further calls can be blocked, challenged or forwarded with a tag to the callee.  Unique Callee Limit Mass calling also requires a large number of callees. The unique callee limit can be employed to restrict the number of unique callees for callers or caller groups. The AntiSPIT engine computes dynamic calling rate limit and unique callee limit based on various factors such as call patterns, caller location, and caller-callee relationship. The Eyeball AntiSPIT engine combines those factors to compute a single value, which defines the actual dynamic calling rate limit of a caller. Initially, callers are not limited in their capability to make calls. Only incidents related to SPIT calls lead to a reduction of the calling rate. Using this mechanism, only non-complying callers are affected by a reduction of their capability to carry out further calls. Based on the dynamic AntiSPIT engine, the Eyeball AntiSPIT technology provides a complete SPIT prevention system for servers, gateways and end-point systems with the following features:  SPIT Rating for Incoming Calls Adds a SPIT rating tag to call message based on caller’s calling rate, reputation and caller-callee relation to enable call filtering at the receiver. The SPIT-rating can be used by client applications such as the Eyeball SDK to indicate the nature of an incoming call.  Caller Identification Callers are identified using their SIP URI, SIP domain, IP address. Individual callers can be monitored as well as a group of callers from a domain or behind a firewall or NAT device.  Challenge/Response Mechanism The server uses a challenge/response mechanism whenever the calling rate limit of a caller exceeds a predefined threshold. In this case, callers are challenged for manual input before a call invitation is forwarded to the callee.  Interoperability with 3rd Party SIP Proxy Servers and Gateways Eyeball AntiSPIT Server can be configured to work with SIP proxies from Eyeball as well as other 3rd party vendors such as Cisco/Dynamicsoft, Nortel, Iptel and Ubiquity. Client-Side Features
  • 6. Page 6 Eyeball Networks AntiSPIT Technology Eyeball AntiSPIT technology also provides the following client-side features.  Parental Control Parents can control service usage using filtering techniques such as calling rate limit, unique callee limit, total call duration, time-of-day, and call content monitoring (such as skin-tone filtering).  SPIT coding scheme Client applications may indicate good, suspicious or bad calls using green, yellow or red lights (or using different ring tones) respectively. End-point protection example: SPIT notification using different colors informs about incoming calls Potential Clients VoIP hardware system manufacturers can incorporate Eyeball Anti-SPIT technology in their gateways, servers and unified communication (UC) platforms. This will better position competitively to address a potentially significant problem in the VoIP user market. Additionaly, call termination point owners such as traditional telcos, UC providers, ISPs, over-the-top service providers can utilize the Eyeball Anti-SPIT engine to proactively address the SPIT problem. Integration with existing VoIP Infrastructures The Eyeball AntiSPIT technology is fully SIP-compliant. On the server side, the Eyeball AntiSPIT technology is already integrated into the latest version of the Eyeball Video Communication Server. Furthermore, the stand-alone AntiSPIT Server is available to support existing SIP-based VoIP infrastructures. The stand-alone AntiSPIT Server interoperates with a wide variety of different SIP servers, including Eyeball Video Communications Server, Cisco/dynamicsoft, iptel.org SER, and others. The client features such as parental control and SPIT-alerts using the coding scheme are available in the latest Eyeball SDK, making the SPIT-rating available in any client based on Good Call Green Good Call Green Potential SPIT call Red Potential SPIT call Red
  • 7. Page 7 Eyeball Networks AntiSPIT Technology the SDK while remaining compliant and inter-operable with other standard-based SIP servers. Conclusion With increasing popularity of open standard IP based real-time communication such as WebRTC, the risk of being attacked and affected by SPIT of various kinds increases. This includes not only mass calling and scan attempts but also harassment and exposure to unacceptable content especially when using video phones. The problem does not only have impact on IP based systems but may also spread to traditional PSTN via gateways. Therefore, effective means for protecting IP telephony installations from mass calling attempts, hacker attacks, and other threats are required. The patented Eyeball AntiSPIT technology, a complete client and server solution for SPIT protection and prevention, addresses the previously described security problems effectively. About Eyeball Networks Eyeball Networks is a world leader in VoIP and video telephony software for service providers and device manufacturers. Eyeball's patented Any-Bandwidth™ and Any- Firewall™ Technologies guarantee the best possible voice and video quality for every subscriber, over any Internet connection, across any firewall, and on any device. Eyeball's endpoint and server software supports more than 6 million VoIP and video telephony subscribers and 10 billion call minutes for more than 100 service providers in North America, Europe and Asia. Founded in 2000, Eyeball Networks is a privately-held company headquartered in Vancouver, British Columbia. For more information, visit www.eyeball.com. Global Offices Corporate Headquarters Eyeball Networks Inc. 500 - 100 Park Royal West Vancouver, B.C. Canada, V7T 1A2 Phone: 604.921.5993 Fax: 604.921.5909 Regional Offices USA 451 37th Street New York, NY 10016 Phone: 646.428.5383 Japan Tamachi East 803 2-16, Shibaura 3-chome, Minato-ku Tokyo Phone: +81 (3) 5440-4533 Fax: +81 (3) 5440-4533
  • 8. Page 8 Eyeball Networks AntiSPIT Technology United Kingdom 1A Orton Lane Wombourne Wolverhampton WV5 9AN Phone: +44 (0) 560 043 3364 Fax: +44 (0) 870 762 6001 Contact Eyeball Networks today for a live demonstration of our soft clients and servers. Sales: sales@eyeball.com Support: techsupport@eyeball.com
  • 9. Page 9 Eyeball Networks AntiSPIT Technology Standards and Codecs A key to Eyeball’s success in providing the industry’s highest call completion is the intelligence at the endpoints which discovers the type of firewall(s) in use and for smart prediction of address and ports that can be used to complete a VoIP or video call. Eyeball endpoint and server software is fully compliant with IETF standards and drafts such as SIP and SIMPLE. Eyeball Any-Firewall™ Technology uses standard protocols including STUN, TURN and ICE for exchanging connection information (such as address and port options) for completion of voice and video calls.  RFC 3261 (SIP: Session Initiation Protocol)  ^ RFC 4474 (Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP))  RFC 5039 (The Session Initiation Protocol (SIP) and Spam)  3GPP TR33.937 version 11.0.0 Release 11 (Universal Mobile Telecommunications System (UMTS); LTE; Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI))  "Unsolicited Communication/SPIT/multimedia-SPAM overview of this topic in different SDOs," NEC Presentation, 3rd ETSI Security Workshop, Jan 2008.  RFC 3665 (SIP Basic Call Flow)  RFC 2617 (HTTP Authentication: Basic and Digest Access Authentication)  RFC 3428 (SIP Extension for Instant Messaging)  RFC 3263 (Locating SIP Servers)  RFC 2327 (SDP: Session Description Protocol)  RFC 2787 (DNS SRV)  RFC 2190 (RTP Payload for H.263 Video Streams)  RFC 3264 (Offer/Answer Model with SDP)  RFC 3550 (RTP Protocol for Real-Time Applications)  RFC 2833 (RTP Payload for DTMF Digits, Signals)  RFC 3489 (STUN - Simple Traversal of User Datagram Protocol Through Network Address Translators)  RFC 3920 (Extensible Messaging and Presence Protocol (XMPP): Core)  RFC 3921 (Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence)  Voice codecs: G.711, G.729A, GSM 6.10, iLBC, Speex, Speex-wb  Video codecs: H.263, H.264, MPEG-4 and EyeStream  http://forums.verizon.com/t5/Share-Your-Ideas-with-Verizon/FIOS-Voice-Mail- Spam/idi-p/568561