scispace - formally typeset
Journal ArticleDOI

Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks

TLDR
The paper will shed light on both the design and the implementation of the Kerberos system, whose performance is then evaluated by relying on a real-world dataset of Call Detail Record (CDR) events provided by Tiscali, a well known Italian Operator.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2017-02-15. It has received 8 citations till now. The article focuses on the topics: Kerberos & IP Multimedia Subsystem.

read more

Citations
More filters
Journal ArticleDOI

Visual analytics for event detection: Focusing on fraud

TL;DR: A survey of existing approaches of visual fraud detection in order to classify different tasks and solutions, to identify and to propose further research opportunities, and to identify challenges and future research topics.

Event Driven Architecture.

TL;DR: In one embodiment, a cart having a first vessel which fits within a second vessel (90) is used to transport and store an integrated circuit substrate.
Journal ArticleDOI

A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)

TL;DR: This survey presents a complete study of the registration attack against SIP, communicating its different alternatives and analyzing its consequences, and recommends protecting the UAC registration method against registration-hijacking by using the Media Access Control address to improve the efficiency of the studied solutions.
Journal ArticleDOI

Dual server based security system for multimedia Services in Next Generation Networks

TL;DR: A Dual Server based Intrusion Detection and Prevention System (DS-IDPS) to guard against INVITE flooding attack and two-level security for VoLTE environment by involving two servers titled helper and main servers to handle spoofing and attack detection respectively is presented.
References
More filters
Book

The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems

TL;DR: Some possible long-term future roles of CEP in the Information Society are discussed along with the need to develop rule-based event hierarchies on a commercial basis to make those applications possible.
Journal ArticleDOI

Fraud detection system

TL;DR: There are issues and challenges that hinder the performance of FDSs, such as concept drift, supports real time detection, skewed distribution, large amount of data etc, which are provided in this survey paper.
Journal Article

The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems

TL;DR: Complex Event Processing (CEP) as mentioned in this paper is a defined set of tools and techniques for analyzing and controlling the complex series of interrelated events that drive modern distributed information systems, which helps IS and IT professionals understand what is happening within the system, quickly identify and solve problems, and more effectively utilize events for enhanced operation, performance, and security.

Event Driven Architecture.

TL;DR: In one embodiment, a cart having a first vessel which fits within a second vessel (90) is used to transport and store an integrated circuit substrate.
Journal ArticleDOI

An anomaly-based approach to the analysis of the social behavior of VoIP users

TL;DR: It is shown how the paper can reliably identify behavioral patterns associated with the most common anomalous behaviors of VoIP users and exploits the expressive power of relational graphs in order to both validate the results of the unsupervised analysis and ease their interpretation by human operators.
Related Papers (5)