{"id":"https://openalex.org/W4280522059","doi":"https://doi.org/10.1016/j.cose.2022.102758","title":"On how VoIP attacks foster the malicious call ecosystem","display_name":"On how VoIP attacks foster the malicious call ecosystem","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4280522059","doi":"https://doi.org/10.1016/j.cose.2022.102758"},"language":"en","primary_location":{"id":"doi:10.1016/j.cose.2022.102758","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2022.102758","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.cose.2022.102758","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023617910","display_name":"Javier Carrillo-Mond\u00e9jar","orcid":"https://orcid.org/0000-0001-8371-4305"},"institutions":[{"id":"https://openalex.org/I79189158","display_name":"University of Castilla-La Mancha","ror":"https://ror.org/05r78ng12","country_code":"ES","type":"education","lineage":["https://openalex.org/I79189158"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"J. Carrillo-Mond\u00e9jar","raw_affiliation_strings":["Universidad de Castilla-La Mancha, Albacete, Spain"],"affiliations":[{"raw_affiliation_string":"Universidad de Castilla-La Mancha, Albacete, Spain","institution_ids":["https://openalex.org/I79189158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739715","display_name":"Jos\u00e9 Luis Mart\u00ednez","orcid":"https://orcid.org/0000-0001-5119-2418"},"institutions":[{"id":"https://openalex.org/I79189158","display_name":"University of Castilla-La Mancha","ror":"https://ror.org/05r78ng12","country_code":"ES","type":"education","lineage":["https://openalex.org/I79189158"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"J.L. Martinez","raw_affiliation_strings":["Universidad de Castilla-La Mancha, Albacete, Spain"],"affiliations":[{"raw_affiliation_string":"Universidad de Castilla-La Mancha, Albacete, Spain","institution_ids":["https://openalex.org/I79189158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004037873","display_name":"Guillermo Su\u00e1rez\u2010Tangil","orcid":"https://orcid.org/0000-0002-0455-2553"},"institutions":[{"id":"https://openalex.org/I2802499160","display_name":"IMDEA Networks","ror":"https://ror.org/04mm9fg30","country_code":"ES","type":"facility","lineage":["https://openalex.org/I105140100","https://openalex.org/I2802499160"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"G. Suarez-Tangil","raw_affiliation_strings":["IMDEA Networks Institute, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"IMDEA Networks Institute, Madrid, Spain","institution_ids":["https://openalex.org/I2802499160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023617910"],"corresponding_institution_ids":["https://openalex.org/I79189158"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":{"value":3190,"currency":"USD","value_usd":3190},"fwci":0.7957,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.76047793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"119","issue":null,"first_page":"102758","last_page":"102758"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9718000292778015,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9377527236938477},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.8922050595283508},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7551144361495972},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7366445064544678},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6380835175514221},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.515733540058136},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4830513596534729},{"id":"https://openalex.org/keywords/ipv4","display_name":"IPv4","score":0.48187097907066345},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.46678033471107483},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.41874241828918457},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.37449443340301514},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3587377667427063},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18035012483596802}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9377527236938477},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.8922050595283508},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7551144361495972},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7366445064544678},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6380835175514221},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.515733540058136},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4830513596534729},{"id":"https://openalex.org/C2779233093","wikidata":"https://www.wikidata.org/wiki/Q11103","display_name":"IPv4","level":4,"score":0.48187097907066345},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.46678033471107483},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.41874241828918457},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.37449443340301514},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3587377667427063},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18035012483596802},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.cose.2022.102758","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2022.102758","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.cose.2022.102758","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2022.102758","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2183548010","https://openalex.org/W2292723020","https://openalex.org/W2417941949","https://openalex.org/W2475947966","https://openalex.org/W2625588031","https://openalex.org/W2793804413","https://openalex.org/W2906928358","https://openalex.org/W2911812040","https://openalex.org/W4237197096","https://openalex.org/W4246841198","https://openalex.org/W4253251754","https://openalex.org/W4254211903","https://openalex.org/W4289038676","https://openalex.org/W4299522686","https://openalex.org/W4365806382","https://openalex.org/W6600388185","https://openalex.org/W6606406289","https://openalex.org/W6637397297","https://openalex.org/W6646814328","https://openalex.org/W6678025569","https://openalex.org/W6683776419","https://openalex.org/W6704398640","https://openalex.org/W6725194215","https://openalex.org/W6726059637","https://openalex.org/W6731047363","https://openalex.org/W6739683323","https://openalex.org/W6741713155","https://openalex.org/W6741728378","https://openalex.org/W6743493502","https://openalex.org/W6746525435","https://openalex.org/W6749615426","https://openalex.org/W6753896071","https://openalex.org/W6766826133","https://openalex.org/W6781622936","https://openalex.org/W7044308114"],"related_works":["https://openalex.org/W2800182044","https://openalex.org/W2079500346","https://openalex.org/W2134351293","https://openalex.org/W2044073281","https://openalex.org/W2185536772","https://openalex.org/W2349428606","https://openalex.org/W2360869876","https://openalex.org/W3004929566","https://openalex.org/W1849784828","https://openalex.org/W2374277641"],"abstract_inverted_index":{"Switched":[0],"telephone":[1],"networks":[2,20],"are":[3],"a":[4,100,142],"key":[5],"and":[6,15,49,84,105,167,196],"ubiquitous":[7],"infrastructure.":[8],"Recent":[9],"technological":[10],"advances":[11],"have":[12,113],"integrated":[13],"modern":[14],"inexpensive":[16],"systems":[17,132],"into":[18,190],"these":[19],"in":[21,46,150,184,208],"order":[22],"to":[23,27,43,57,78,98,134,152,164,213],"use":[24],"the":[25,47,52,62,157,168,177,191,194,197,210,215],"Internet":[26],"place":[28],"calls":[29,200],"via":[30],"Voice":[31],"over":[32],"IP":[33],"(VoIP).":[34],"The":[35],"evolution":[36],"of":[37,51,64,103,120,137,159,176,181,193,199,218],"this":[38,121,135,185],"technology":[39],"has":[40],"also":[41],"led":[42],"an":[44,174],"increase":[45],"number":[48,102],"sophistication":[50],"techniques":[53],"used":[54,72,183],"by":[55,73],"criminals":[56],"commit":[58],"fraud.":[59,138,220],"Specifically,":[60],"with":[61],"emergence":[63],"VoIP,":[65],"attackers":[66,161],"can":[67,91],"now":[68],"adapt":[69],"tools":[70],"commonly":[71],"cybercriminals,":[74],"such":[75],"as":[76],"botnets,":[77],"make":[79],"their":[80],"attacks":[81,129,195],"more":[82,108],"complex":[83],"insidious.":[85],"For":[86],"example,":[87],"through":[88,202],"bots":[89],"they":[90,170],"dial":[92],"multiple":[93],"numbers":[94],"automatically,":[95],"enabling":[96],"them":[97],"target":[99],"greater":[101],"victims,":[104],"do":[106],"so":[107],"quickly.":[109],"While":[110],"recent":[111],"studies":[112],"shed":[114],"light":[115],"on":[116,130],"how":[117,128,160],"certain":[118],"parts":[119],"ecosystem":[122],"work,":[123],"it":[124],"is":[125],"still":[126],"unclear":[127],"VoIP":[131,144],"contribute":[133],"type":[136],"This":[139],"paper":[140],"presents":[141],"novel":[143],"honeypot":[145,166],"that":[146],"captures":[147],"voice":[148],"interactions,":[149],"addition":[151],"employing":[153],"low-level":[154],"telemetry.":[155],"With":[156],"study":[158,214],"obtain":[162],"access":[163],"our":[165,203],"actions":[169,211],"perform,":[171],"we":[172,206],"present":[173],"overview":[175],"most":[178],"prevalent":[179],"types":[180,217],"fraud":[182],"ecosystem,":[186],"including":[187],"unique":[188],"insights":[189],"origin":[192],"destination":[198],"made":[201],"architecture.":[204],"Finally,":[205],"analyze":[207],"depth":[209],"taken":[212],"different":[216],"telephony":[219]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
