[Sipping] Re: [VOIPSEC] VoIP Spam paper

"vijay arvind" <vijay.arvind@gmail.com> Fri, 30 November 2007 08:25 UTC

Return-path: <sipping-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1Iy1C4-0003Cs-2y; Fri, 30 Nov 2007 03:25:52 -0500
Received: from sipping by megatron.ietf.org with local (Exim 4.43) id 1IxXb7-00044s-JX for sipping-confirm+ok@megatron.ietf.org; Wed, 28 Nov 2007 19:49:45 -0500
Received: from sipping by megatron.ietf.org with local (Exim 4.43) id 1IxXb7-00044k-A8 for sipping@ietf.org; Wed, 28 Nov 2007 19:49:45 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IxXKm-0006gg-7P for sipping@ietf.org; Wed, 28 Nov 2007 19:32:52 -0500
Received: from rn-out-0910.google.com ([64.233.170.189] helo=rn-out-0102.google.com) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IxXKk-0003Ih-59 for sipping@ietf.org; Wed, 28 Nov 2007 19:32:52 -0500
Received: by rn-out-0102.google.com with SMTP id a46so1290471rne for <sipping@ietf.org>; Wed, 28 Nov 2007 16:32:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; bh=Od5Jk/7lHm0rusYkWW7S0+V1fGTOIt6Y1LkRGkyI3G4=; b=IzaxILVRUU0AQS7mLrpAt6TKpBVeFyFgOwCdoIi32ZZMHC84Upw5K8C8wM5fmxfjf+AHEBWSOu3VInGuu9rmB/g60HfNRVFWx5nlcquUvwSbk0sLG/3evDDdzEC3Yq2qoQZ1jgx7RGoH9Rh359S40R9SX2UfLfrnpq5eOtB4DSc=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=SKWdgp5Nx02Q7NVmK+9esAFcG9mlCDdXy0HMjnf5DtXljHNJ6Wh4IfmWvdozy8h1zUVEqThchFyJw7cFhPOnK3jYlec+MhflKd8IKjoGj2lDeipgVBpaxi5mIRAMyU76JgjsG5CbGPAh/PlSgReDYPzENU5yXq3DnWm/+TZx9bk=
Received: by 10.142.217.17 with SMTP id p17mr1743710wfg.1196296369107; Wed, 28 Nov 2007 16:32:49 -0800 (PST)
Received: by 10.142.79.19 with HTTP; Wed, 28 Nov 2007 16:32:48 -0800 (PST)
Message-ID: <740d64a0711281632t7ef7a335y61764b7e8090e138@mail.gmail.com>
Date: Wed, 28 Nov 2007 16:32:49 -0800
From: vijay arvind <vijay.arvind@gmail.com>
To: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
In-Reply-To: <47497983.20009@gmx.net>
MIME-Version: 1.0
References: <47497983.20009@gmx.net>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 10dcc25e55b9b5f7d6ded516404bdc4c
X-TMDA-Confirmed: Wed, 28 Nov 2007 19:49:45 -0500
X-Mailman-Approved-At: Fri, 30 Nov 2007 03:25:49 -0500
Cc: voipsec@voipsa.org, SIPPING LIST <sipping@ietf.org>
Subject: [Sipping] Re: [VOIPSEC] VoIP Spam paper
X-BeenThere: sipping@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "SIPPING Working Group \(applications of SIP\)" <sipping.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sipping@ietf.org>
List-Help: <mailto:sipping-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1190864133=="
Errors-To: sipping-bounces@ietf.org

Hello Hannes,
Thanks for introducing the paper to the larger community. Was away for
thanksgiving so could not respond earlier. I have a few
additions/corrections to what has been mentioned in your mail:

1) The contents of the call credential:
The call credential contains the following information, in addition, to
provide sender authentication and remove the possibility of credential
misuse:
Identity of Caller, Public Key of Caller, Identity of Call Recipient, Public
Key of Call Recipient, Call Duration, Timestamp, {all the previous info
encrypted with the callers private key}.
This ensures multiple things
a) If Alice and Bob know each other (and have each others public keys as
described in work
http://www-static.cc.gatech.edu/~vijayab/locating_SIP_users.pdf), then when
Charlie calls with a credential from Bob, Alice can actually ensure the
credential is from Bob.

2) Deployment:
Quoting Hannes: "Although not stated explicitly, I assume that information
about a users
call patters are stored with its VoIP provider."
This is not how the paper extracts information about a user. Consider user
Alice who uses say Vonage's VOIP service and thus all calls to and from
Alice pass through Vonage's proxy server. Now lets say user Dave wants to
call Alice and is using some VoIP provider X. Then Dave's reputation (if he
doesnt have an SN credential) is assigned by the Vonage proxy and built on
all the interactions (call history) that Vonages' customers have had with
him. So the reputation for an incoming call is assigned by the proxy of the
call recipient (that is Alice's Vonage proxy). So Vonage will thus have a
reputation matrix of all users of Vonage and all users that Vonage users
have interacted with and then assign reputations (based on
Eigentrust(pagerank)) to them. Daves proxy X has no say in this matter.
Therefore if a particular VoIP provider provides this reputation calculating
mechanism, users of that VoIP provider can utilize it and we expect the
deployment to work that way.

3) Privacy aspects:
The paper as it stands now has privacy issues with regards to its credential
sharing mechanism. We have come up with a way to address that and that will
be available along with an actual implementation of CallRank that we are
building on MjSip as a client and OpenSER as the proxy server.

4) Future work:
In addition to what is already mentioned we realize that for each proxy to
calculate the reputation matrix for a large number of users we need far more
intelligent, efficient ways of calcualting the reputation matrix. We find
that there are ways in which we can organize the matrix to come up with
efficient and accurate reputation calculations. All this and more are part
of the next paper that we are working on.

I hope I have clarified certain things that we could not provide in all
detail in the paper due to space constraints.

Bye,
Vijay

On Nov 25, 2007 5:32 AM, Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
wrote:

> Hi  all
>
> BACKGROUND
>
> In the IETF SIPPING WG we had discussions regarding SPIT prevention
> mechanism. Particularly with regard to the SPIT marking techniques it
> seems that there is some disagreement about the usefulness of
> statistical techniques. A number of ideas have been discussed already on
> various IETF mailing lists.
> I would like to bring another paper to your attention that has been
> posted to the VOIPSEC mailing list.
>
> THE PAPER
>
> The paper says that it exploit the fact that in regular communication
> users both make and receive calls, while spammers are interested in only
> making calls and disseminating information. This paper takes existing
> work from the email environment and applies it to VoIP (as it seems).
>
> The basic idea is to observe communication and call duration in
> particular. Thereby, the call duration is used to create, so-called call
> credentials. A call credential CC consists of A, the identity of the
> caller, B, the identity of the call recipient, t, the call duration and
> TS, the time stamp of the call along with a digital signature of the
> same information.
>
> Although not stated explicitly, I assume that information about a users
> call patters are stored with its VoIP provider. Then, when a user makes
> a call information about the call patters (i.e., in the form of call
> credentials) are made available to the receiving domain or other end
> point. Sharing information about the sender with the recipient's domain
> or the recipient itself has been described in
> http://tools.ietf.org/id/draft-schwartz-sipping-spit-saml-01.txt
> (although no reference to that document is included in the paper). This
> work on utilizing social networks, as described in
> http://tools.ietf.org/id/draft-ono-trust-path-discovery-02.txt, might
> also be applicable.
>
> To deal with the introduction problem turing tests are suggested.
>
> Working on draft-schwartz-sipping-spit-saml-01.txt we encountered
> problems, such as
>
> * Deployment challenge to get SPIT SAML to deploy. Without it being
> widely deployed the receiving domain does not have a way to know
> anything about the call statistics. Hence, the mechanism would only work
> within a single domain. Without sufficient deployment the mechanisms
> described in the paper wouldn't be so useful either. As such, this
> deployment challenge has nothing todo with SAML but is rather a generic
> problem with the solution approach outlined in the paper (although the
> authors claim it differently in Section 2.4 "Related Work").
>
> * Privacy aspects: It is not clear whether it is actually possible to
> distribute some of this information from one domain to another one
> without violating some privacy laws.
>
> * Trusting the information provided by the sending domain is likely to
> work only for larger VoIP providers. In the worst case the Spammer might
> provide this information since he is acting as a VoIP provider.
>
> The idea of using call patterns for SPIT prevention is not new. Still,
> the provided details for using the call duration (using the Eigentrust
> algorithm) in a SPIT prevention scenario are nice. Maybe this paper
> provides a different spin to our SPIT marking discussion.
>
> Ciao
> Hannes
>
> PS: http://tools.ietf.org/id/draft-schwartz-sipping-spit-saml-01.txt did
> not describe which algorithms to use to compute some of the parameters.
> I believe that this is fine for an IETF document given that there are a
> lot of implementation specific aspects that are not relevant for
> standardization.
>
>
> -----Ursprüngliche Nachricht-----
> Von: voipsec-bounces@voipsa.org [mailto:voipsec-bounces@voipsa.org] Im
> Auftrag von ext vijay arvind
> Gesendet: Montag, 12. November 2007 00:34
> An: voipsec@voipsa.org
> Betreff: [VOIPSEC] VoIP Spam paper
>
> Hello All,
>
> Attached is a link to a VoIP spam approach that we at the Georgia Tech
> Information Security center (GTISC) are working on and was presented at
> the
> 4th conference of Email and Anti Spam:
> http://www.ceas.cc/2007/papers/paper-63.pdf
>
> The basic idea is to try and exploit the fact that in regular
> communication
> users both make and receive calls, while spammers are interested in only
> making calls and disseminating information. Users rarely call a spammer
> and
> even if they inadvertently do so, the call will last for a small duration.
> Hence we use call duration and the directionality of calling patterns to
> distinguish between a regular user and a spammer. We use basic
> cryptographic
> primitives to encapsulate call duration as call credentials. How we
> combine
> these call credentials using social networking theory and the Eigentrust
> algorithm (PageRank) to create a spammer detecting mechanism forms the
> crux
> of the paper.
>
> Bouquets and Brickbats are most welcome.
>
> Thanks,
> Vijay
> _______________________________________________
> Voipsec mailing list
> Voipsec@voipsa.org
> http://voipsa.org/mailman/listinfo/voipsec_voipsa.org
>
>
_______________________________________________
Sipping mailing list  https://www1.ietf.org/mailman/listinfo/sipping
This list is for NEW development of the application of SIP
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sip@ietf.org for new developments of core SIP