SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Eyeball AntiSPIT Technology
www.eyeball.com
Copyright 2015
Page 2
Eyeball Networks AntiSPIT Technology
Introduction
Voice-over-IP (VoIP) is getting widespread adoption both from business and residential
customers. VoIP uses standard and open protocols such as Session Initiation Protocol (SIP)
or Real-Time Protocol (RTP) for voice and video call establishment and data transfer. Using
common computer technology and open standards for VoIP makes users vulnerable for the
various security problems already occurring in common Internet applications. These
vulnerabilities include:
□ Bulk and unsolicited calls for telemarketing, recorded advertisements and other
commercial purposes from anywhere in the world, at any time,
□ Harassment and abuse such as repeated automated calls,
□ Malicious service attacks leading to service disruptions (such as massive automated
calling from multiple machines), and
□ Exposure to unacceptable content such as illicit content or offensive language.
We use the term VoIP “spam over Internet telephony" or just “SPIT” to refer to the problems
described above and the term “spitter” describes VoIP users sending SPIT. If VoIP SPIT
cannot be prevented it may victimize any user including traditional telephony system users
(i.e. PSTN and mobile phone users).
Over two-thirds of the emails sent through the Internet currently represent spam emails.
However, if proper measures are not taken against VoIP SPIT, it will be a worse problem
than the current email problem as VoIP calls require real-time attention from callees.
According to NEC report, in Germany, a residential PSTN subscriber receives 2 voice
spam calls per week on an average. SPIT is ~ 1000 times cheaper than voice spam over
PSTN. With the implementation of IP Multimedia System (IMS), the mere volume of
potential SPIT calls using VoIP technology, where making a million calls becomes as simple
as making a single call, may render real-time communication systems e.g., PSTN, IP
Multimedia Subsystem (IMS) unusable.
Consequently, the mechanism employed by any AntiSPIT solution must not employ fixed
limits for single sources, but be usable in a way that complying users will not notice the
AntiSPIT mechanisms are in effect.
Requirements for SPIT-prevention
In a simplified view, a real-time communication system such as PSTN or a VoIP system
consists of two main components, the server and/or gateway system maintained by the
service providers and the end-points used by customers (residential or business). An end-
point may be a PSTN phone, a smart phone, an IP phone, a softphone or a messenger. In
order for VoIP and video telephony to be successful as a mainstream communication system,
it should meet the following requirements with respect to SPIT protection:
1. The server or gateway system should be able to block SPIT, forward “good” calls,
and flag suspicious calls before they are forwarded; and
Page 3
Eyeball Networks AntiSPIT Technology
2. The end-points should provide robust, simple and flexible means to protect end
users from SPIT calls.
The server/ gateway system has the following desired features:
 Dynamic monitoring and control of the service provided and the SPIT prevention
mechanisms;
 Preventing bulk unsolicited calling;
 Blocking calls from non-complying callers.
 Prevent “false positives”, i.e., avoiding complying users being blocked
 Providing minimal additional administration effort
 Using minimal and yet scalable computing and network resources
The end-points have the following desired features:
 Valid calls will not be blocked;
 Callees must have an easy and simple way to avoid SPIT calls and bad content (such
as using green, yellow and red color coding);
 Call filters based on validated user IDs, geographic location of callers, time of day etc.
 User interaction to avoid SPIT is minimal
 Parental control mechanisms are available to restrict call sources, destinations, total
calling time, time-of-day, and call content, in particular for video calls.
The patented Eyeball AntiSPIT technology supports those previously outlined requirements,
providing a safe environment for subscribers while keeping the overall administrative
effort for service providers low.
Eyeball’s AntiSPIT Technology secures existing SIP servers/ gateways to provide a SPIT-free environment.
Available Solutions
RFC 4474 proposes the identity management of the caller to avoid SPIT. RFC 5039 proposes
some basic methods for the mitigation of telephone spam over SIP:
 White Lists and Black Lists
 Consent-Based Communications
 Reputation Systems
 Address Obfuscation and Limited-Use Addresses
 Turing Tests, Captchas, Computational Puzzles
 Payment
 Legal actions
Commercial VoIP software needs to use behavioral analysis tools based on the above methods to
create an effective AntiSPIT policy.
Page 4
Eyeball Networks AntiSPIT Technology
Google Voice has used SPIT filtering since 2011. It has both the call screening option for
unknown callers and the spam filtering option for known SPITTERs (spammers). NEC Corp. has
developed VoIP SEAL tool that uses a Turning test for call filtering. Verizon recently
implemented the policy to eliminate voice mails without messages as a remedy to acute
Voice Mail SPAM problem, they were facing. Asterisk system provides random number
based challenge mechanism to block SPIT.
Eyeball AntiSPIT Technology
The patented Eyeball AntiSPIT technology is fully compliant with SIP (RFC3261) based VoIP
environments
Dynamic AntiSPIT Engine
Overview: Eyeball AntiSPIT Engine Input and Features
The dynamic AntiSPIT engine as the foundation of the Eyeball AntiSPIT technology
monitors call patterns, SPIT events and other relevant data to control calling rate limits of
callers. The dynamic approach limits only callers showing suspicious behavior, thus ensures
legitimate callers will not be affected while SPIT is effectively prevented. Two main metrics
to differentiate legitimate callers from spitters are:
 Dynamic Calling Rate Limit
For bulk calling, the spitters need to make a large number of calls to a large number of
callees within a short period of time. To restrict bulk calling, the AntiSPIT engine
employs a dynamic calling rate for each routable identity, e.g., SIP URI, interface IP
address such that abnormal calling behavior leads to a reduction of the ability to carry
Page 5
Eyeball Networks AntiSPIT Technology
out SPIT calls while not interfering with legitimate calls. The algorithm combines
various criteria related to SPIT, including the caller-callee relationship, and combines
this information into a single value used as dynamic calling rate limit for each caller.
Once the calling rate limit is exceeded, further calls can be blocked, challenged or
forwarded with a tag to the callee.
 Unique Callee Limit
Mass calling also requires a large number of callees. The unique callee limit can be
employed to restrict the number of unique callees for callers or caller groups.
The AntiSPIT engine computes dynamic calling rate limit and unique callee limit based on
various factors such as call patterns, caller location, and caller-callee relationship. The
Eyeball AntiSPIT engine combines those factors to compute a single value, which defines the
actual dynamic calling rate limit of a caller. Initially, callers are not limited in their capability
to make calls. Only incidents related to SPIT calls lead to a reduction of the calling rate.
Using this mechanism, only non-complying callers are affected by a reduction of their
capability to carry out further calls.
Based on the dynamic AntiSPIT engine, the Eyeball AntiSPIT technology provides a
complete SPIT prevention system for servers, gateways and end-point systems with the
following features:
 SPIT Rating for Incoming Calls
Adds a SPIT rating tag to call message based on caller’s calling rate, reputation and
caller-callee relation to enable call filtering at the receiver. The SPIT-rating can be used
by client applications such as the Eyeball SDK to indicate the nature of an incoming call.
 Caller Identification
Callers are identified using their SIP URI, SIP domain, IP address. Individual callers can
be monitored as well as a group of callers from a domain or behind a firewall or NAT
device.
 Challenge/Response Mechanism
The server uses a challenge/response mechanism whenever the calling rate limit of a
caller exceeds a predefined threshold. In this case, callers are challenged for manual
input before a call invitation is forwarded to the callee.
 Interoperability with 3rd Party SIP Proxy Servers and Gateways
Eyeball AntiSPIT Server can be configured to work with SIP proxies from Eyeball as well
as other 3rd party vendors such as Cisco/Dynamicsoft, Nortel, Iptel and Ubiquity.
Client-Side Features
Page 6
Eyeball Networks AntiSPIT Technology
Eyeball AntiSPIT technology also provides the following client-side features.
 Parental Control
Parents can control service usage using filtering techniques such as calling rate limit,
unique callee limit, total call duration, time-of-day, and call content monitoring (such as
skin-tone filtering).
 SPIT coding scheme
Client applications may indicate good, suspicious or bad calls using green, yellow or red
lights (or using different ring tones) respectively.
End-point protection example: SPIT notification using different colors informs about incoming calls
Potential Clients
VoIP hardware system manufacturers can incorporate Eyeball Anti-SPIT technology in
their gateways, servers and unified communication (UC) platforms. This will better
position competitively to address a potentially significant problem in the VoIP user
market. Additionaly, call termination point owners such as traditional telcos, UC
providers, ISPs, over-the-top service providers can utilize the Eyeball Anti-SPIT engine
to proactively address the SPIT problem.
Integration with existing VoIP Infrastructures
The Eyeball AntiSPIT technology is fully SIP-compliant. On the server side, the Eyeball
AntiSPIT technology is already integrated into the latest version of the Eyeball Video
Communication Server. Furthermore, the stand-alone AntiSPIT Server is available to
support existing SIP-based VoIP infrastructures. The stand-alone AntiSPIT Server
interoperates with a wide variety of different SIP servers, including Eyeball Video
Communications Server, Cisco/dynamicsoft, iptel.org SER, and others.
The client features such as parental control and SPIT-alerts using the coding scheme are
available in the latest Eyeball SDK, making the SPIT-rating available in any client based on
Good Call
Green
Good Call
Green
Potential SPIT call
Red
Potential SPIT call
Red
Page 7
Eyeball Networks AntiSPIT Technology
the SDK while remaining compliant and inter-operable with other standard-based SIP
servers.
Conclusion
With increasing popularity of open standard IP based real-time communication such as
WebRTC, the risk of being attacked and affected by SPIT of various kinds increases. This
includes not only mass calling and scan attempts but also harassment and exposure to
unacceptable content especially when using video phones. The problem does not only have
impact on IP based systems but may also spread to traditional PSTN via gateways.
Therefore, effective means for protecting IP telephony installations from mass calling
attempts, hacker attacks, and other threats are required.
The patented Eyeball AntiSPIT technology, a complete client and server solution for SPIT
protection and prevention, addresses the previously described security problems effectively.
About Eyeball Networks
Eyeball Networks is a world leader in VoIP and video telephony software for service
providers and device manufacturers. Eyeball's patented Any-Bandwidth™ and Any-
Firewall™ Technologies guarantee the best possible voice and video quality for every
subscriber, over any Internet connection, across any firewall, and on any device. Eyeball's
endpoint and server software supports more than 6 million VoIP and video telephony
subscribers and 10 billion call minutes for more than 100 service providers in North
America, Europe and Asia.
Founded in 2000, Eyeball Networks is a privately-held company headquartered in
Vancouver, British Columbia. For more information, visit www.eyeball.com.
Global Offices
Corporate Headquarters
Eyeball Networks Inc.
500 - 100 Park Royal
West Vancouver, B.C.
Canada, V7T 1A2
Phone: 604.921.5993
Fax: 604.921.5909
Regional Offices
USA
451 37th Street
New York, NY 10016
Phone: 646.428.5383
Japan
Tamachi East 803
2-16, Shibaura
3-chome, Minato-ku
Tokyo
Phone: +81 (3) 5440-4533
Fax: +81 (3) 5440-4533
Page 8
Eyeball Networks AntiSPIT Technology
United Kingdom
1A Orton Lane
Wombourne
Wolverhampton
WV5 9AN
Phone: +44 (0) 560 043 3364
Fax: +44 (0) 870 762 6001
Contact Eyeball Networks today for a live demonstration of our soft clients and servers.
Sales: sales@eyeball.com
Support: techsupport@eyeball.com
Page 9
Eyeball Networks AntiSPIT Technology
Standards and Codecs
A key to Eyeball’s success in providing the industry’s highest call completion is the
intelligence at the endpoints which discovers the type of firewall(s) in use and for smart
prediction of address and ports that can be used to complete a VoIP or video call.
Eyeball endpoint and server software is fully compliant with IETF standards and drafts
such as SIP and SIMPLE. Eyeball Any-Firewall™ Technology uses standard protocols
including STUN, TURN and ICE for exchanging connection information (such as address
and port options) for completion of voice and video calls.
 RFC 3261 (SIP: Session Initiation Protocol)
 ^ RFC 4474 (Enhancements for Authenticated Identity Management in the
Session Initiation Protocol (SIP))
 RFC 5039 (The Session Initiation Protocol (SIP) and Spam)
 3GPP TR33.937 version 11.0.0 Release 11 (Universal Mobile
Telecommunications System (UMTS); LTE; Study of mechanisms for
Protection against Unsolicited Communication for IMS (PUCI))
 "Unsolicited Communication/SPIT/multimedia-SPAM overview of this topic in
different SDOs," NEC Presentation, 3rd ETSI Security Workshop, Jan 2008.
 RFC 3665 (SIP Basic Call Flow)
 RFC 2617 (HTTP Authentication: Basic and Digest Access Authentication)
 RFC 3428 (SIP Extension for Instant Messaging)
 RFC 3263 (Locating SIP Servers)
 RFC 2327 (SDP: Session Description Protocol)
 RFC 2787 (DNS SRV)
 RFC 2190 (RTP Payload for H.263 Video Streams)
 RFC 3264 (Offer/Answer Model with SDP)
 RFC 3550 (RTP Protocol for Real-Time Applications)
 RFC 2833 (RTP Payload for DTMF Digits, Signals)
 RFC 3489 (STUN - Simple Traversal of User Datagram Protocol Through
Network Address Translators)
 RFC 3920 (Extensible Messaging and Presence Protocol (XMPP): Core)
 RFC 3921 (Extensible Messaging and Presence Protocol (XMPP): Instant
Messaging and Presence)
 Voice codecs: G.711, G.729A, GSM 6.10, iLBC, Speex, Speex-wb
 Video codecs: H.263, H.264, MPEG-4 and EyeStream
 http://forums.verizon.com/t5/Share-Your-Ideas-with-Verizon/FIOS-Voice-Mail-
Spam/idi-p/568561

Contenu connexe

Dernier

Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 

Dernier (20)

Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

AntiSpit Server Admin Guide

  • 2. Page 2 Eyeball Networks AntiSPIT Technology Introduction Voice-over-IP (VoIP) is getting widespread adoption both from business and residential customers. VoIP uses standard and open protocols such as Session Initiation Protocol (SIP) or Real-Time Protocol (RTP) for voice and video call establishment and data transfer. Using common computer technology and open standards for VoIP makes users vulnerable for the various security problems already occurring in common Internet applications. These vulnerabilities include: □ Bulk and unsolicited calls for telemarketing, recorded advertisements and other commercial purposes from anywhere in the world, at any time, □ Harassment and abuse such as repeated automated calls, □ Malicious service attacks leading to service disruptions (such as massive automated calling from multiple machines), and □ Exposure to unacceptable content such as illicit content or offensive language. We use the term VoIP “spam over Internet telephony" or just “SPIT” to refer to the problems described above and the term “spitter” describes VoIP users sending SPIT. If VoIP SPIT cannot be prevented it may victimize any user including traditional telephony system users (i.e. PSTN and mobile phone users). Over two-thirds of the emails sent through the Internet currently represent spam emails. However, if proper measures are not taken against VoIP SPIT, it will be a worse problem than the current email problem as VoIP calls require real-time attention from callees. According to NEC report, in Germany, a residential PSTN subscriber receives 2 voice spam calls per week on an average. SPIT is ~ 1000 times cheaper than voice spam over PSTN. With the implementation of IP Multimedia System (IMS), the mere volume of potential SPIT calls using VoIP technology, where making a million calls becomes as simple as making a single call, may render real-time communication systems e.g., PSTN, IP Multimedia Subsystem (IMS) unusable. Consequently, the mechanism employed by any AntiSPIT solution must not employ fixed limits for single sources, but be usable in a way that complying users will not notice the AntiSPIT mechanisms are in effect. Requirements for SPIT-prevention In a simplified view, a real-time communication system such as PSTN or a VoIP system consists of two main components, the server and/or gateway system maintained by the service providers and the end-points used by customers (residential or business). An end- point may be a PSTN phone, a smart phone, an IP phone, a softphone or a messenger. In order for VoIP and video telephony to be successful as a mainstream communication system, it should meet the following requirements with respect to SPIT protection: 1. The server or gateway system should be able to block SPIT, forward “good” calls, and flag suspicious calls before they are forwarded; and
  • 3. Page 3 Eyeball Networks AntiSPIT Technology 2. The end-points should provide robust, simple and flexible means to protect end users from SPIT calls. The server/ gateway system has the following desired features:  Dynamic monitoring and control of the service provided and the SPIT prevention mechanisms;  Preventing bulk unsolicited calling;  Blocking calls from non-complying callers.  Prevent “false positives”, i.e., avoiding complying users being blocked  Providing minimal additional administration effort  Using minimal and yet scalable computing and network resources The end-points have the following desired features:  Valid calls will not be blocked;  Callees must have an easy and simple way to avoid SPIT calls and bad content (such as using green, yellow and red color coding);  Call filters based on validated user IDs, geographic location of callers, time of day etc.  User interaction to avoid SPIT is minimal  Parental control mechanisms are available to restrict call sources, destinations, total calling time, time-of-day, and call content, in particular for video calls. The patented Eyeball AntiSPIT technology supports those previously outlined requirements, providing a safe environment for subscribers while keeping the overall administrative effort for service providers low. Eyeball’s AntiSPIT Technology secures existing SIP servers/ gateways to provide a SPIT-free environment. Available Solutions RFC 4474 proposes the identity management of the caller to avoid SPIT. RFC 5039 proposes some basic methods for the mitigation of telephone spam over SIP:  White Lists and Black Lists  Consent-Based Communications  Reputation Systems  Address Obfuscation and Limited-Use Addresses  Turing Tests, Captchas, Computational Puzzles  Payment  Legal actions Commercial VoIP software needs to use behavioral analysis tools based on the above methods to create an effective AntiSPIT policy.
  • 4. Page 4 Eyeball Networks AntiSPIT Technology Google Voice has used SPIT filtering since 2011. It has both the call screening option for unknown callers and the spam filtering option for known SPITTERs (spammers). NEC Corp. has developed VoIP SEAL tool that uses a Turning test for call filtering. Verizon recently implemented the policy to eliminate voice mails without messages as a remedy to acute Voice Mail SPAM problem, they were facing. Asterisk system provides random number based challenge mechanism to block SPIT. Eyeball AntiSPIT Technology The patented Eyeball AntiSPIT technology is fully compliant with SIP (RFC3261) based VoIP environments Dynamic AntiSPIT Engine Overview: Eyeball AntiSPIT Engine Input and Features The dynamic AntiSPIT engine as the foundation of the Eyeball AntiSPIT technology monitors call patterns, SPIT events and other relevant data to control calling rate limits of callers. The dynamic approach limits only callers showing suspicious behavior, thus ensures legitimate callers will not be affected while SPIT is effectively prevented. Two main metrics to differentiate legitimate callers from spitters are:  Dynamic Calling Rate Limit For bulk calling, the spitters need to make a large number of calls to a large number of callees within a short period of time. To restrict bulk calling, the AntiSPIT engine employs a dynamic calling rate for each routable identity, e.g., SIP URI, interface IP address such that abnormal calling behavior leads to a reduction of the ability to carry
  • 5. Page 5 Eyeball Networks AntiSPIT Technology out SPIT calls while not interfering with legitimate calls. The algorithm combines various criteria related to SPIT, including the caller-callee relationship, and combines this information into a single value used as dynamic calling rate limit for each caller. Once the calling rate limit is exceeded, further calls can be blocked, challenged or forwarded with a tag to the callee.  Unique Callee Limit Mass calling also requires a large number of callees. The unique callee limit can be employed to restrict the number of unique callees for callers or caller groups. The AntiSPIT engine computes dynamic calling rate limit and unique callee limit based on various factors such as call patterns, caller location, and caller-callee relationship. The Eyeball AntiSPIT engine combines those factors to compute a single value, which defines the actual dynamic calling rate limit of a caller. Initially, callers are not limited in their capability to make calls. Only incidents related to SPIT calls lead to a reduction of the calling rate. Using this mechanism, only non-complying callers are affected by a reduction of their capability to carry out further calls. Based on the dynamic AntiSPIT engine, the Eyeball AntiSPIT technology provides a complete SPIT prevention system for servers, gateways and end-point systems with the following features:  SPIT Rating for Incoming Calls Adds a SPIT rating tag to call message based on caller’s calling rate, reputation and caller-callee relation to enable call filtering at the receiver. The SPIT-rating can be used by client applications such as the Eyeball SDK to indicate the nature of an incoming call.  Caller Identification Callers are identified using their SIP URI, SIP domain, IP address. Individual callers can be monitored as well as a group of callers from a domain or behind a firewall or NAT device.  Challenge/Response Mechanism The server uses a challenge/response mechanism whenever the calling rate limit of a caller exceeds a predefined threshold. In this case, callers are challenged for manual input before a call invitation is forwarded to the callee.  Interoperability with 3rd Party SIP Proxy Servers and Gateways Eyeball AntiSPIT Server can be configured to work with SIP proxies from Eyeball as well as other 3rd party vendors such as Cisco/Dynamicsoft, Nortel, Iptel and Ubiquity. Client-Side Features
  • 6. Page 6 Eyeball Networks AntiSPIT Technology Eyeball AntiSPIT technology also provides the following client-side features.  Parental Control Parents can control service usage using filtering techniques such as calling rate limit, unique callee limit, total call duration, time-of-day, and call content monitoring (such as skin-tone filtering).  SPIT coding scheme Client applications may indicate good, suspicious or bad calls using green, yellow or red lights (or using different ring tones) respectively. End-point protection example: SPIT notification using different colors informs about incoming calls Potential Clients VoIP hardware system manufacturers can incorporate Eyeball Anti-SPIT technology in their gateways, servers and unified communication (UC) platforms. This will better position competitively to address a potentially significant problem in the VoIP user market. Additionaly, call termination point owners such as traditional telcos, UC providers, ISPs, over-the-top service providers can utilize the Eyeball Anti-SPIT engine to proactively address the SPIT problem. Integration with existing VoIP Infrastructures The Eyeball AntiSPIT technology is fully SIP-compliant. On the server side, the Eyeball AntiSPIT technology is already integrated into the latest version of the Eyeball Video Communication Server. Furthermore, the stand-alone AntiSPIT Server is available to support existing SIP-based VoIP infrastructures. The stand-alone AntiSPIT Server interoperates with a wide variety of different SIP servers, including Eyeball Video Communications Server, Cisco/dynamicsoft, iptel.org SER, and others. The client features such as parental control and SPIT-alerts using the coding scheme are available in the latest Eyeball SDK, making the SPIT-rating available in any client based on Good Call Green Good Call Green Potential SPIT call Red Potential SPIT call Red
  • 7. Page 7 Eyeball Networks AntiSPIT Technology the SDK while remaining compliant and inter-operable with other standard-based SIP servers. Conclusion With increasing popularity of open standard IP based real-time communication such as WebRTC, the risk of being attacked and affected by SPIT of various kinds increases. This includes not only mass calling and scan attempts but also harassment and exposure to unacceptable content especially when using video phones. The problem does not only have impact on IP based systems but may also spread to traditional PSTN via gateways. Therefore, effective means for protecting IP telephony installations from mass calling attempts, hacker attacks, and other threats are required. The patented Eyeball AntiSPIT technology, a complete client and server solution for SPIT protection and prevention, addresses the previously described security problems effectively. About Eyeball Networks Eyeball Networks is a world leader in VoIP and video telephony software for service providers and device manufacturers. Eyeball's patented Any-Bandwidth™ and Any- Firewall™ Technologies guarantee the best possible voice and video quality for every subscriber, over any Internet connection, across any firewall, and on any device. Eyeball's endpoint and server software supports more than 6 million VoIP and video telephony subscribers and 10 billion call minutes for more than 100 service providers in North America, Europe and Asia. Founded in 2000, Eyeball Networks is a privately-held company headquartered in Vancouver, British Columbia. For more information, visit www.eyeball.com. Global Offices Corporate Headquarters Eyeball Networks Inc. 500 - 100 Park Royal West Vancouver, B.C. Canada, V7T 1A2 Phone: 604.921.5993 Fax: 604.921.5909 Regional Offices USA 451 37th Street New York, NY 10016 Phone: 646.428.5383 Japan Tamachi East 803 2-16, Shibaura 3-chome, Minato-ku Tokyo Phone: +81 (3) 5440-4533 Fax: +81 (3) 5440-4533
  • 8. Page 8 Eyeball Networks AntiSPIT Technology United Kingdom 1A Orton Lane Wombourne Wolverhampton WV5 9AN Phone: +44 (0) 560 043 3364 Fax: +44 (0) 870 762 6001 Contact Eyeball Networks today for a live demonstration of our soft clients and servers. Sales: sales@eyeball.com Support: techsupport@eyeball.com
  • 9. Page 9 Eyeball Networks AntiSPIT Technology Standards and Codecs A key to Eyeball’s success in providing the industry’s highest call completion is the intelligence at the endpoints which discovers the type of firewall(s) in use and for smart prediction of address and ports that can be used to complete a VoIP or video call. Eyeball endpoint and server software is fully compliant with IETF standards and drafts such as SIP and SIMPLE. Eyeball Any-Firewall™ Technology uses standard protocols including STUN, TURN and ICE for exchanging connection information (such as address and port options) for completion of voice and video calls.  RFC 3261 (SIP: Session Initiation Protocol)  ^ RFC 4474 (Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP))  RFC 5039 (The Session Initiation Protocol (SIP) and Spam)  3GPP TR33.937 version 11.0.0 Release 11 (Universal Mobile Telecommunications System (UMTS); LTE; Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI))  "Unsolicited Communication/SPIT/multimedia-SPAM overview of this topic in different SDOs," NEC Presentation, 3rd ETSI Security Workshop, Jan 2008.  RFC 3665 (SIP Basic Call Flow)  RFC 2617 (HTTP Authentication: Basic and Digest Access Authentication)  RFC 3428 (SIP Extension for Instant Messaging)  RFC 3263 (Locating SIP Servers)  RFC 2327 (SDP: Session Description Protocol)  RFC 2787 (DNS SRV)  RFC 2190 (RTP Payload for H.263 Video Streams)  RFC 3264 (Offer/Answer Model with SDP)  RFC 3550 (RTP Protocol for Real-Time Applications)  RFC 2833 (RTP Payload for DTMF Digits, Signals)  RFC 3489 (STUN - Simple Traversal of User Datagram Protocol Through Network Address Translators)  RFC 3920 (Extensible Messaging and Presence Protocol (XMPP): Core)  RFC 3921 (Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence)  Voice codecs: G.711, G.729A, GSM 6.10, iLBC, Speex, Speex-wb  Video codecs: H.263, H.264, MPEG-4 and EyeStream  http://forums.verizon.com/t5/Share-Your-Ideas-with-Verizon/FIOS-Voice-Mail- Spam/idi-p/568561