Browse > Article
http://dx.doi.org/10.7840/kics.2015.40.10.1994

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks  

Lee, Jung-won (Creble Inc.)
Eom, Jong-hoon (Creble Inc.)
Park, Ta-hum (Creble Inc.)
Kim, Sung-ho (Kyungpook National University School of Computer Science and Engineering)
Abstract
Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.
Keywords
Toll Bypass Fraud; SIM Box; Traffic Analysis; VoIP; VoIP Fraud Detection;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Communications Fraud Control Association (CFCA), Global Fraud Loss Survey Report(2013), Retrieved Aug. 2014.
2 S. S. Kim, "Provider and consumers Unknown International Fraud calls," Retrieved Mar. 19, 2014, from http://www.etnews.com/201305270513
3 KAIT, Trends on policy and technology of S&T and ICT, no. 4, 2013, Retrieved Mar. 19, 2015, from http://www.kait.or.kr/notice/board_view.jsp
4 TransNexus, INTRODUCTION TO VOIP FRAUD, 2012.10.18., Retrieved May 24, 2014, from http://transnexus.com/resources/telecomindustry-topics/fraud-detection/download-voipfraud-white-paper/
5 J. T. Ryu, K. Y. Ryu, and B. Roh, "A SIP INVITE flooding detection algorithm considering upperbound of possible number of SIP messages," J. KICS, vol. 34, no. 8, pp. 797-804, Aug. 2009.
6 Y. H. Jung, K. M. Yang, J. W. Park, and K. C. Kim, "Denial of service detection on SIP-based VoIP client," in Proc. KICS Int. Conf. Commun., pp. 706-710, Korea, 2008.
7 J. W. Lee, H. J. Kim, J.-H. Eom, and S. H. Kim, "A study on toll bypass fraud and detection method of VoIP," in Proc. KICS Winter Conf. Commun., pp. 728-729, Korea, 2015.
8 D. Hoffstadt, A. Marold, and E. P. Rathgeb, "Analysis of SIP-Based threats using a VoIP honeynet system," IEEE TrustCom, pp. 541-548, Liverpool, Jun. 2012.
9 I. Murynets, M. Zabarankin, R. P. Jover, and A. Panagia, "Analysis and detection of SIMbox fraud in mobility networks," IEEE INFOCOM, pp. 1519-1526, 2014.
10 meucci, "SIM Box Detection-Service Description," 01, Mar. 2012, Retrieved Mar. 19, 2014,
11 metfone, ILLEGAL BYPASS FOR INTERNATIONAL CALLS: INDUSTRY POSITION, 2013.07. Retrieved Mar. 19, 2014, from http://www.slideshare.net/firdausf1/simbox-issue
12 http://www.meucci-solutions.com/
13 http://www.asterisk.org/
14 J. W. Lee and J. H. Eom, APPARATUS OF DETECTING Toll Bypass Fraud, Patent applied for 2015.
15 T. Okabe, T. Kitamura, and T. Shizuno, "Statistical traffic identification method based on flow-level behavior for fair VoIP service" IEEE Workshop VoIP MaSe, pp. 35-40, Apr. 2006.
16 Rafael C. Conzalez and Richard E. Woods, Digital Image Processing, 3rd Ed., Prentice Hall Press, 2008.
17 J. Rosenberg, et al., RFC 3261-SIP: Session Initiation Protocol, 2002.