Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Understanding SMS spam in a large cellular network
Jiang N., Jin Y., Skudlark A., Zhang Z. ACM SIGMETRICS Performance Evaluation Review41 (1):381-382,2013.Type:Article
Date Reviewed: Sep 24 2014

Jiang et al. conducted a good study of SMS spam in a large cellular network in the US. They collected a large set of SMS spam through user-generated spam reports, which are more reliable and cleaner compared with other sources. After that, they tried to find SMS spam campaigns and anomalous behavior patterns through clustering based on URL and content similarity.

By comparing different campaigns, the authors obtained several interesting observations. For example, the top ten spam campaigns cover nearly half of the spam reports. They “are all related to cash advance[s], gift card[s], and free device[s] for testing.” And even the shortest campaign “lasts for more than one month, and half of the campaigns have a duration of approximately one year.” Finally, they proposed a simple two-step detection algorithm based on the correlation of spam numbers in terms of spatial and temporal features. The result shows that their approach has high accuracy and a very low false alarm rate.

This paper is very useful for spam detection researchers since it provides a first-hand observation of “the intentions and strategies of SMS spammers” and also shows the initial step in detecting SMS spam. We are in a mobile era now, and the number of mobile devices has reached more than three billion. Detecting SMS spam means an improvement in user experiences, and, more importantly, protection of users from information leaks, phishing attacks, and so on. This paper is a good starting point for large-scale SMS spam detection research.

Reviewer:  De Wang Review #: CR142753 (1412-1050)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (C.2.0 ... )
 
 
Portable Devices (C.5.3 ... )
 
 
Use/ Abuse Of Power (K.4.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy