Understanding SMS spam in a large cellular network: Characteristics, strategies and defenses

Nan Jiang, Yu Jin, Ann Skudlark, Zhi Li Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

In this paper, using a year (June 2011 to May 2012) of user reported SMS spam messages together with SMS network records collected from a large US based cellular carrier, we carry out a comprehensive study of SMS spamming. Our analysis shows various characteristics of SMS spamming activities, such as spamming rates, victim selection strategies and spatial clustering of spam numbers. Our analysis also reveals that spam numbers with similar content exhibit strong similarity in terms of their sending patterns, tenure, devices and geolocations. Using the insights we have learned from our analysis, we propose several novel spam defense solutions. For example, we devise a novel algorithm for detecting related spam numbers. The algorithm incorporates user spam reports and identifies additional (unreported) spam number candidates which exhibit similar sending patterns at the same network location of the reported spam number during the nearby time period. The algorithm yields a high accuracy of 99.4% on real network data. Moreover, 72% of these spam numbers are detected at least 10 hours before user reports.

Original languageEnglish (US)
Title of host publicationResearch in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Proceedings
Pages328-347
Number of pages20
DOIs
StatePublished - Dec 2 2013
Event16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013 - Rodney Bay, Saint Lucia
Duration: Oct 23 2013Oct 25 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8145 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013
CountrySaint Lucia
CityRodney Bay
Period10/23/1310/25/13

Fingerprint Dive into the research topics of 'Understanding SMS spam in a large cellular network: Characteristics, strategies and defenses'. Together they form a unique fingerprint.

Cite this