Log In Sign Up

A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks

by   Huichen Li, et al.

Malicious calls, i.e., telephony spams and scams, have been a long-standing challenging issue that causes billions of dollars of annual financial loss worldwide. This work presents the first machine learning-based solution without relying on any particular assumptions on the underlying telephony network infrastructures. The main challenge of this decade-long problem is that it is unclear how to construct effective features without the access to the telephony networks' infrastructures. We solve this problem by combining several innovations. We first develop a TouchPal user interface on top of a mobile App to allow users tagging malicious calls. This allows us to maintain a large-scale call log database. We then conduct a measurement study over three months of call logs, including 9 billion records. We design 29 features based on the results, so that machine learning algorithms can be used to predict malicious calls. We extensively evaluate different state-of-the-art machine learning approaches using the proposed features, and the results show that the best approach can reduce up to 90 a precision over 99.99 models are efficient to implement without incurring a significant latency overhead. We also conduct ablation analysis, which reveals that using 10 out of the 29 features can reach a performance comparable to using all features.


page 3

page 15


Comparison of Feature Extraction Methods and Predictors for Income Inference

Patterns of mobile phone communications, coupled with the information of...

Android Malware Detection based on Factorization Machine

With the increasing popularity of Android smart phones in recent years, ...

URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection

Malicious URLs host unsolicited content and are used to perpetrate cyber...

Using Lexical Features for Malicious URL Detection – A Machine Learning Approach

Malicious websites are responsible for a majority of the cyber-attacks a...

Toward more generalized Malicious URL Detection Models

This paper reveals a data bias issue that can severely affect the perfor...

One-Class Adversarial Nets for Fraud Detection

Many online applications, such as online social networks or knowledge ba...

Mining Sandboxes for Linux Containers

A container is a group of processes isolated from other groups via disti...