DOI QR코드

DOI QR Code

iVisher: Real-Time Detection of Caller ID Spoofing

  • Song, Jaeseung (Network Research Division, Sejong University) ;
  • Kim, Hyoungshick (Department of Computer Science and Engineering, Sungkyunkwan University) ;
  • Gkelias, Athanasios (Department of Electrical and Electronic Engineering, Imperial College London)
  • 투고 : 2013.08.18
  • 심사 : 2014.04.21
  • 발행 : 2014.10.01

초록

Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.

키워드

참고문헌

  1. S.T. Chow, C. Gustave, and D. Vinokurov, "Authenticating Displayed Names in Telephony," Bell Lab Techn. J., vol. 14, no. 1, 2009, pp. 267-282. https://doi.org/10.1002/bltj.20367
  2. "Voice Phishing Victims Retrieve Stolen Money," Yonhap News, Mar. 2012.
  3. J.-H. Chang, "Statistical Model-Based Voice Activity Detection Based on Second-Order Conditional MAP with Soft Decision," ETRI J., vol. 34, no. 2, Apr. 2012, pp. 184-189. https://doi.org/10.4218/etrij.12.0111.0344
  4. J. Evers, "Security Expert: User Education is Pointless," Oct. 2006. http://news.cnet.com/2100-7350_3-6125213.html
  5. S. Gorling, "The Myth of User Education," Proc. Virus Bulletin Int. Conf., Oct. 19, 2006.
  6. J.H. Chang and K.H. Lee, "Voice Phishing Detection Technique Based on Minimum Classification Error Method Incorporating Codec Parameters," IET Signal Process J., vol. 4, no. 5, Oct. 2010, pp. 502-509. https://doi.org/10.1049/iet-spr.2009.0066
  7. IETF RFC 3261, "SIP: Session Initiation Protocol," June 2002.
  8. E.-J. Yoon et al., "A Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks," Comput. Commun., vol. 33, no. 14, Sept. 2010, pp. 1674-1681. https://doi.org/10.1016/j.comcom.2010.03.026
  9. H. Dwivedi, "Unconventional VoIP Security Threats," in Hacking VoIP: Protocols, Attacks, and Countermeasures, No Starch Press, 2008.
  10. A. Majumder and J. Caffery Jr. "Power Line Communications," IEEE Potentials, vol. 23, no. 4, Oct. 2004, pp. 4-8.
  11. M. Qadeer and A. Imran, "Asterisk Voice Exchange: An Alternative to Conventional EPBX," Int. Conf. Comput. Electr. Eng., Phuket, Thailand, Dec. 20-22, 2008, pp. 652-656.
  12. R.P. Ejzak, C.K. Florkey, and R.W. Hemmeter, "Network Overload and Congestion: A Comparison of ISUP and SIP," Bell Labs Techn. J., vol. 9, no. 3, 2004, pp. 173-182.
  13. ETSI EN 300 356-1, Integrated Services Digital Network (ISDN); Signaling System No. 7; ISDN User Part (ISUP) Version 2 for the International Interface; Part 1: Basic Services, 1999.
  14. IETF RFC 3398, Integrated Services Digital Network (ISDN) User Part (ISUP) to Session Initiation Protocol (SIP) Mapping, Dec. 2002.
  15. S.E. Griffn and C.C. Rackley, "Vishing," Proc. Annual Conf. Inf. Security Curriculum Develop., 2008, pp. 33-35.
  16. F. Maggi, "Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds," IEEE Int. Conf. Comput. Inf. Technol., Bradford, UK, June 29-July 1, 2010, pp. 824-831.
  17. J. Quittek et al., "On Spam over Internet Telephony (SPIT) Prevention," IEEE Commun. Mag., vol. 46, no. 8, Aug. 2008, pp. 80-86.
  18. 3GPP TR 33.937, Study of Mechanisms for Protection against Unsolicited Communication for IMS (PUCI), 2012.
  19. A. Tsakountakis, G. Kambourakis, and S. Gritzalis, "SIPA: Generic and Secure Accounting for SIP," Security Commun. Netw., vol. 5, no. 9, Sept. 2012, pp. 1006-1027. https://doi.org/10.1002/sec.387
  20. G. Karopoulos, G. Kambourakis, and S. Gritzalis, "PrivaSIP: Adhoc Identity Privacy in SIP," Comput. Standard Interfaces J., vol. 33, no. 3, Mar. 2011, pp. 301-314. https://doi.org/10.1016/j.csi.2010.07.002
  21. X. Wang et al., "Voice Pharming Attack and the Trust of VoIP," Proc. Int. Conf. Security Privacy Commun. Netw., no. 24, 2008, pp. 1-11.
  22. M. Nassar et al., "Holistic VoIP Intrusion Detection and Prevention System," Proc. Int. Conf. Principles, Syst. Appl. IP Telecommun., 2007, pp. 1-9.
  23. 3GPP TS 23.014, Support of Dual Tone Multi-frequency (DTMF) Signaling, 2012.
  24. 3GPP TS 23.087, User-to-User Signaling (UUS) Supplementary Service; Stage 2, 2012.
  25. M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," Proc. USENIX Conf. Syst. Administration, 1999, pp. 229-238.
  26. W. Lee and S.J. Stolfo, "Data Mining Approaches for Intrusion Detection," Proc. USENIX Security Symp., vol. 7, 1998, p. 6.
  27. R.A. Kemmerer and G. Vigna "Intrusion Detection: A Brief History and Overview," Comput. Mag., vol. 35, no. 4, Apr. 2002, pp. 27-30.
  28. J. Lennox et al., "Interworking Internet Telephony and Wireless Telecommunications Networks," ACM SIGCOMM Comput. Commun. Rev., vol. 31, no. 5, Oct. 2001, pp. 25-36.
  29. 3GPP TS 29.002, Mobile Application Part (MAP) Specification, 2011.
  30. IETF RFC 1034, DOMAIN NAMES - Concepts and Facilities, Nov. 1987.
  31. ITU-T E.721, Network Grade of Service Parameters and Target Values for Circuit Switched Services in the Evolving ISDN, 1999.
  32. S.A. Ahson and M. Ilyas, "Measurement and Analysis on Quality of Skype VoIP," in VoIP Handbook: Applications, Technologies, Reliability, and Security, CRC Press, Inc., Dec. 2008.

피인용 문헌

  1. Host-based intrusion detection system for secure human-centric computing vol.72, pp.7, 2016, https://doi.org/10.1007/s11227-015-1506-9
  2. End-to-End Detection of Caller ID Spoofing Attacks vol.15, pp.3, 2014, https://doi.org/10.1109/tdsc.2016.2580509