Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks |
Lee, Jung-won
(Creble Inc.)
Eom, Jong-hoon (Creble Inc.) Park, Ta-hum (Creble Inc.) Kim, Sung-ho (Kyungpook National University School of Computer Science and Engineering) |
1 | Communications Fraud Control Association (CFCA), Global Fraud Loss Survey Report(2013), Retrieved Aug. 2014. |
2 | S. S. Kim, "Provider and consumers Unknown International Fraud calls," Retrieved Mar. 19, 2014, from http://www.etnews.com/201305270513 |
3 | KAIT, Trends on policy and technology of S&T and ICT, no. 4, 2013, Retrieved Mar. 19, 2015, from http://www.kait.or.kr/notice/board_view.jsp |
4 | TransNexus, INTRODUCTION TO VOIP FRAUD, 2012.10.18., Retrieved May 24, 2014, from http://transnexus.com/resources/telecomindustry-topics/fraud-detection/download-voipfraud-white-paper/ |
5 | J. T. Ryu, K. Y. Ryu, and B. Roh, "A SIP INVITE flooding detection algorithm considering upperbound of possible number of SIP messages," J. KICS, vol. 34, no. 8, pp. 797-804, Aug. 2009. |
6 | Y. H. Jung, K. M. Yang, J. W. Park, and K. C. Kim, "Denial of service detection on SIP-based VoIP client," in Proc. KICS Int. Conf. Commun., pp. 706-710, Korea, 2008. |
7 | J. W. Lee, H. J. Kim, J.-H. Eom, and S. H. Kim, "A study on toll bypass fraud and detection method of VoIP," in Proc. KICS Winter Conf. Commun., pp. 728-729, Korea, 2015. |
8 | D. Hoffstadt, A. Marold, and E. P. Rathgeb, "Analysis of SIP-Based threats using a VoIP honeynet system," IEEE TrustCom, pp. 541-548, Liverpool, Jun. 2012. |
9 | I. Murynets, M. Zabarankin, R. P. Jover, and A. Panagia, "Analysis and detection of SIMbox fraud in mobility networks," IEEE INFOCOM, pp. 1519-1526, 2014. |
10 | meucci, "SIM Box Detection-Service Description," 01, Mar. 2012, Retrieved Mar. 19, 2014, |
11 | metfone, ILLEGAL BYPASS FOR INTERNATIONAL CALLS: INDUSTRY POSITION, 2013.07. Retrieved Mar. 19, 2014, from http://www.slideshare.net/firdausf1/simbox-issue |
12 | http://www.meucci-solutions.com/ |
13 | http://www.asterisk.org/ |
14 | J. W. Lee and J. H. Eom, APPARATUS OF DETECTING Toll Bypass Fraud, Patent applied for 2015. |
15 | T. Okabe, T. Kitamura, and T. Shizuno, "Statistical traffic identification method based on flow-level behavior for fair VoIP service" IEEE Workshop VoIP MaSe, pp. 35-40, Apr. 2006. |
16 | Rafael C. Conzalez and Richard E. Woods, Digital Image Processing, 3rd Ed., Prentice Hall Press, 2008. |
17 | J. Rosenberg, et al., RFC 3261-SIP: Session Initiation Protocol, 2002. |