Mining Potential Spammers from Mobile Call Logs

With the rapid development of mobile telecommunication, voice call spam has become a growing problem in China. Many mobile phone users have become the victim of spam calls and suffered heavy financial loss. Discovering of call spammers can benefit mobile network operators as well as users. Nowadays,...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhipeng Liu, Dechang Pi, Yunfang Chen
Format: Article
Language:English
Published: Wiley 2015-04-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2015/143745
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849744373229551616
author Zhipeng Liu
Dechang Pi
Yunfang Chen
author_facet Zhipeng Liu
Dechang Pi
Yunfang Chen
author_sort Zhipeng Liu
collection DOAJ
description With the rapid development of mobile telecommunication, voice call spam has become a growing problem in China. Many mobile phone users have become the victim of spam calls and suffered heavy financial loss. Discovering of call spammers can benefit mobile network operators as well as users. Nowadays, the popular method for the task of mining call spammers has been performed by different applications on smartphones. These applications combine manual and automatic methods to detect spammers. Although the results of these client-based solutions are quite satisfying, it is extremely unfortunate that many people still use feature phones, which can not be equipped with third party applications. In this paper, we propose a server-based solution and take a call log file as an example, to analyze the characteristics of mobile call patterns. A time-based graph model and a simple and effective call log rank (CLRank) algorithm with ranking and classification were proposed to find potential call spammers. Compared with existing methods, our model just uses link information, and thus protects user privacy to the maximum extent. Experimental results show that our proposed model can find spammers from call logs automatically, dynamically, and effectively (with 84.5~91.8% of accuracy) without any manual interventions.
format Article
id doaj-art-a2776bbec2f545b59bce05edb73bd6d1
institution DOAJ
issn 1550-1477
language English
publishDate 2015-04-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-a2776bbec2f545b59bce05edb73bd6d12025-08-20T03:19:57ZengWileyInternational Journal of Distributed Sensor Networks1550-14772015-04-011110.1155/2015/143745143745Mining Potential Spammers from Mobile Call LogsZhipeng Liu0Dechang Pi1Yunfang Chen2 Department of Software Engineering, Nanjing University of Posts and Communications, Nanjing, Jiangsu 210003, China College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu 210016, China Department of Software Engineering, Nanjing University of Posts and Communications, Nanjing, Jiangsu 210003, ChinaWith the rapid development of mobile telecommunication, voice call spam has become a growing problem in China. Many mobile phone users have become the victim of spam calls and suffered heavy financial loss. Discovering of call spammers can benefit mobile network operators as well as users. Nowadays, the popular method for the task of mining call spammers has been performed by different applications on smartphones. These applications combine manual and automatic methods to detect spammers. Although the results of these client-based solutions are quite satisfying, it is extremely unfortunate that many people still use feature phones, which can not be equipped with third party applications. In this paper, we propose a server-based solution and take a call log file as an example, to analyze the characteristics of mobile call patterns. A time-based graph model and a simple and effective call log rank (CLRank) algorithm with ranking and classification were proposed to find potential call spammers. Compared with existing methods, our model just uses link information, and thus protects user privacy to the maximum extent. Experimental results show that our proposed model can find spammers from call logs automatically, dynamically, and effectively (with 84.5~91.8% of accuracy) without any manual interventions.https://doi.org/10.1155/2015/143745
spellingShingle Zhipeng Liu
Dechang Pi
Yunfang Chen
Mining Potential Spammers from Mobile Call Logs
International Journal of Distributed Sensor Networks
title Mining Potential Spammers from Mobile Call Logs
title_full Mining Potential Spammers from Mobile Call Logs
title_fullStr Mining Potential Spammers from Mobile Call Logs
title_full_unstemmed Mining Potential Spammers from Mobile Call Logs
title_short Mining Potential Spammers from Mobile Call Logs
title_sort mining potential spammers from mobile call logs
url https://doi.org/10.1155/2015/143745
work_keys_str_mv AT zhipengliu miningpotentialspammersfrommobilecalllogs
AT dechangpi miningpotentialspammersfrommobilecalllogs
AT yunfangchen miningpotentialspammersfrommobilecalllogs